Powells.com" | Keyword Analytics Tool

Sticky: FAQs and suggested resources!

Welcome to CombinedTraining - your hub to discuss hybrid training regimens, and becoming the best overall athlete you can be!
Below, you'll find a few basic questions you might have, and then some suggested resources for those wishing to combine multiple training regimens.
-----------------------
What exactly is Combined Training?
In a sentence — a structured effort to improve at multiple, substantially different sports or athletic endeavours at the same time.
You're probably already familiar with the principle in the form of pairing strength work with cardio; many exercise regimens will involve both some resistance training (weights etc.) and some form of cardiovascular exercise (usually running).
But how exactly do we best accomplish that? We might raise all sorts of questions:
And so on. There are no clear answers to these questions, but individuals can and will find that some approaches will work better than others for them. This sub is an attempt to help guide people towards those personalised training improvements in a more efficient matter.
Furthermore, the classic breakdown of "resistance training plus cardio" is only one form of combined training. Perhaps you want to be a strongman and a swimmer, or balance your football training with armwrestling once a week. What changes when we think about how to blend those?
-----------------------
Is Combined Training an intelligent way to train / is it for me?
Unless you have an extremely specific athletic goal in mind for a single sport (e.g. winning a tournament), we think you should probably diversify your training at least a little.
Most people are familiar with the idea of an 'interference' effect between multiple athletic endeavours. This might include sub-ideas like:
And in fact it's true that some interference effects exist! You probably won't be able to run 6x a week without having some negative effect on your heavy squat days, for example.
However, both the magnitude and the inevitability of these interference effects are vastly overstated. With intelligent training, nutrition, and recovery, you can heavily minimise the downsides, possibly even to the extent that intermediate athletes (most of us!) won't notice downsides at all.
On the OTHER hand, there are some enormous upsides to combining multiple training styles.
For example, if you knew that adding substantial amounts of cardio to your training program (in an intelligent manner) would lower your powerlifting 1 Rep Maxes by 5%, but massively improve your overall health, appearance, quality of life, and general physical preparedness... would that be a good trade?
It's up to you, but we think that's a pretty good hypothetical deal.
This is the general philosophy of CombinedTraining — not only can you pursue multiple athletic endeavours which you find enjoyable, but if pursued intelligently, it can be an overall improvement to your fitness and health and life by making smart tradeoffs in where you make progress.
-----------------------
Isn't Combined Training just Crossfit?
No, but they're philosophically similar.
CrossFit does try to build similar General Physical Preparedness (GPP) in its athletes, which is similar to this sub's goal.
However:
If you train with CrossFit, you're more than welcome here - CrossFit certainly fits within this sub's purview. But the intent of the sub is a little broader than that specific style of training.
(Note that this is also why this sub is called "Combined Training" and not "Concurrent Training*. The latter is an existing term with similar intent, but it also has existing connotations of specifically contrasting resistance training against endurance training, which isn't as all-encompassing as we want it to be. Training for both bouldering and cycling, for example, doesn't fit well into that dichotomy, so we're using a different term.)
-----------------------
What is the best way to combine Sport X and Sport Y into a training program?
Unfortunately, you're almost certainly never going to get a coherent 'optimal' answer... at least not within our lifetimes.
The literature on concurrent training (remember, traditionally "resistance & cardio") is limited enough already, though there are some useful takeaways. If you want to get even more niche in your sport combinations, or even combine 3+ athletic endeavours into a single program, there's going to be almost no solid science on exactly how to balance them.
What you can do, though, is:
  1. Familiarise yourself with the basic principles of training for each sport / endeavour
  2. Start training seriously and pay attention to your recovery
  3. Run some controlled experiments after a few months to test different "archetypes" of training
  4. Repeat after giving each new program reasonable time & effort
To wit — we've not yet mastered 'flight' when it comes to the technology of combined training, but that doesn't mean you need to reinvent the wheel.
A good bet is to pick some basic, established programs for each discipline, written by experts, and see if you can find a reasonable way to blend them or supplement one activity with another. You might remove 3 sets of front squats so you can go for a short run, or replace an entire workout on Fridays with rock climbing. Be sensible.
It's going to be tempting to try to get fancy here, and convince yourself that you can get the 'best of both worlds' and sneak extra workouts in, promising yourself you'll pay more attention to recovery. But being conservative at first, and then building up, will likely yield better results.
Then... just run the program. Eat well, sleep well, practice your form. Really get used to each activity and how your body responds. Pay attention to what times & on which days you feel energetic, depleted, sore, injured. Think about why that might be.
After a few months of training (perhaps 6 months if you're new to 1+ of the sports, perhaps 3 otherwise), you can start to run some experiments. Common ideas include:
Try to only introduce 1-2 experiments at at time, otherwise your ability to actually determine casuality will be removed.
Then... based on how it goes after a few months of REASONABLE effort — really give each program your all! — you can rinse and repeat with a new program. If one training style didn't work out for you, try going in the opposite direction. On the other hand, if it did work well, you can cement & refine it based on what you've learned, and move on to other experiments.
Additionally, try to stay conscious of not straying too far from the established principles of training for each endeavour, over time. If you want to be an intermediate-level runner, and you take a look at your custom program and realise it looks nothing like the programs other intermediate-level athletes are using... it may be time to re-evaluate.
-----------------------
SUGGESTED RESOURCES:
General Principles of Combined Training:
A note on The Hybrid Athlete - we aren't affiliated with any recommended book, and you should be skeptical of Viada himself as some of his claimed run times don't have much backing. But you may enjoy the book as a resource.
Sport Specific Books & Starting Points:
This section will be slowly expanded with 1-2 "core" books on each major sport - the idea being to serve as an entry point for those picking up the training fundamentals. If you have suggestions, let us know!
submitted by CombinedTraining to CombinedTraining [link] [comments]

[Game Thread] (1) Florida State @ Florida (12:00pm ET)

NCAA Football: Week 14
Florida State #1 ( 11 - 0 ) @ Florida ( 4 - 7 )
Kick-Off:
Venue:
Join the live IRC chat!
Television:
  • ESPN
Radio:
Internet Streams:
Note - If you are going to use these streams, I highly recommend installing the NoScript for Firefox, or ScriptNo for Chrome, as well as the AdBlock extensions on your browser. This allows you to control the ads and other javascript stuff that shows up on these pages.
Preview:
Betting Odds
  • Game Line: FSU -28.0
  • OveUnder: 45.0 source
History:
Today's game marks the 58th meeting in the annual rivalry between the Seminoles and Gators. Their first matchup took place in 1958 at Florida Field in Gainesville, and the two teams have met every year since (as well as twice in the Sugar Bowl).
Florida currently leads the all-time series 34-21-2. The Gators are 20-9-1 against the Seminoles in Gainesville. Since the first season of the BCS in 1998, Florida holds a slight advantage at 8-7 in the series. Florida State head coach Jimbo Fisher is 2-1 against the Gators; Florida's Will Muschamp is 1-1 against the 'Noles.
The last time these two teams played in Gainesville, the Seminoles won 21-7 in a very ugly game. All 28 points came off of turnovers in a defensive battle where the winning team did not even eclipse 100 yards.
The last meeting between these two teams period resulted in Florida's first win since Bowden left. The Gators won 37-26 in Tallahassee thanks to a 24-point fourth quarter. The Gators capitalized on a 5:1 turnover ratio to get Will Muschamp his first win against the 'Noles.
With a win today, Florida State would capture its first ever Florida Cup. The trophy is given to whichever one of the big three football programs (Florida, Florida State, and Miami) that manages to beat the other two in the same season. FSU has already beaten Miami this year, 41-14. The trophy began in 2002 and this year will be the fifth time it will be awarded. It marks the first time in that span Florida State enters this game eligible for it, as Florida State hasn't beaten Miami in the same year Miami has beaten Florida. The two teams will also be playing for the Governor's Cup.
For a list of notable games, see this comment.
A huge thanks to tallg8tor for putting this together.
Season Leaders:
Florida State Florida
Passing Jameis Winston: 199-286, 3163 yds, 32 tds Tyler Murphy: 112-185, 1216 yds, 6 tds
Rushing Devonta Freeman: 131 car, 808 yds, 11 tds Mack Brown: 140 car, 527 yds, 4 tds
Receiving Rashad Greene: 57 rec, 889 yds, 9 tds Solomon Patton: 39 rec, 554 yds, 6 tds
Tackles Telvin Smith: 64 tkls, 42 solo, 7 tfl Michael Taylor: 62 tkls, 30 solo, 2 tfl
Sacks Lamarcus Joyner: 5.0 sacks, 3 ffs Ronald Powell: 4.0 sacks, 0 ffs
Interceptions Nate Andrews: 4 ints, 91 yds, 1 tds Vernon Hargreaves: 3 ints, 39 yds, 0 tds
Want to know more about these teams?
Fun Fact:
and have coached together at Auburn in the mid 1990s under Terry Bowden and again at LSU in the early 2000s under Nick Saban. They also co-own a beachhouse in Pensacola.
Check out some more notes about this game in this comment from FLPacker.
Thread Notes:
  • Discuss whatever you wish. You can trash talk, but keep it civil. !!! Please refamiliarize yourself with the CFB rules if you are not sure what constitutes "being civil." !!!
  • Turning comment sort to 'new' will help you see the newest posts.
  • Try Chrome Refresh or Firefox's ReloadEvery to auto-refresh this tab.
  • You may also like reddit stream to keep up with comments.
  • Check in on the /CFB chat: #redditcfb on FreeNode. (open in browser)
  • Show your team affiliation - get a team logo by clicking 'edit' in the column on the right
Subscribe to these communities
Scoring
1st Quarter
  • 03:43 - FSU FG - FSU 3 - UF 0 - R. Aguayo 49 yard field goal good. Watch Highlight
2nd Quarter
  • 04:24 - FSU TD - FSU 10 - UF 0 - J. Winston 45 yard touchdown pass to K. Benjamin. R. Aguayo PAT good. Watch Highlight
  • 00:25 - FSU TD - FSU 17 - UF 0 - J. Winston 29 yard touchdown pass to K. Benjamin. R. Aguayo PAT good. Watch Highlight
3rd Quarter
  • 11:02 - FSU FG - FSU 20 - UF 0 - R. Aguayo 40 yard field goal good. Watch Highlight
  • 07:08 - FSU TD - FSU 27 - UF 0 - D. Freeman 11 yard rush for a touchdown. R. Aguayo PAT good. Watch Highlight
4th Quarter
  • 13:39 - UF TD - FSU 27 - UF 7 - S. Mornhinweg 5 yard touchdown pass to H. Joyer. F. Velez PAT good. Watch Highlight
  • 08:06 - FSU TD - FSU 34 - UF 7 - J. Winston 4 yard touchdown pass to K. Benjamin. R. Aguayo PAT good. Watch Highlight
  • 03:14 - FSU FG - FSU 37 - UF 7 - R. Aguayo 28 yard field goal good. Watch Highlight

Final: FSU 37 - UF 7

submitted by n1ffuM to CFB [link] [comments]

OSU NEW: Courtney Smith's Mother Comes Forward, Siding With Zach Smith.

Source: https://www.facebook.com/permalink.php?story_fbid=10211911720977265&id=1498798014
via Jeff Snook --
COURTNEY SMITH'S MOTHER CLAIMS ZACH SMITH WAS NOT ABUSIVE AND SHOULD NEVER HAVE BEEN FIRED -- AND POWELL POLICE COMMUNICATED EVIDENCE TO OHIO STATE
BY JEFF SNOOK Tina Carano, Courtney Carano Smith’s mother, originally didn’t want to speak publicly about her daughter’s and her ex-husband Zach Smith’s volatile relationship that resulted in Smith’s firing and the current investigation of the Ohio State football program, leaving head coach Urban Meyer on paid-administrative leave.But “enough is enough,” she said Monday morning.“I wanted to stay out of this mess,” she said. “But I can’t take it anymore. I can’t take all of these lies that are being written. I just want the truth out there once and for all. What’s right is right. It’s been horrible for me to see the lies that were being written about Zach when he didn’t do what he was accused of doing.“He lost his job over something that didn’t happen.”Smith, her former son-in-law, was fired as Ohio State’s receivers coach July 23 after it was revealed his ex-wife had obtained a protective order against him July 20 In Delaware County. He also had received a misdemeanor citation for criminal trespass after a May 12 incident at her Powell, Ohio, residence, in an incident when Zach Smith dropped off his son. He has pleaded not guilty.“When Zach got fired, I was in disbelief that it happened the way it did. I was trying to stay out of it, but I really wanted to come forward and tell the whole story,” Tina Carano said. “I do want to see and have a relationship with my grandchildren someday.“But the fact is that Courtney set him up in this whole thing. She was determined to bring him down and she wanted to keep her current boyfriend, who didn’t want Zach around.”Carano, who currently is estranged from her 33-year-old daughter, said she was shocked when the scandal led to Meyer, who was placed on paid-administrative leave Aug. 3.“I was in even more disbelief,” she said. “The first thing that came to my mind is that is what she wanted all along. She was trying to take him down, too. If Urban Meyer gets fired over this, that is frightening to me. My grandson is about to go into the third grade and he would be bullied over this. Kids are so mean to each other and this really concerns me. (Meyer) doesn’t deserve this. He didn’t cover up anything, because there was nothing to cover up. This entire mess was all about revenge and about my daughter being vindictive.’’When asked about the nine police calls to Courtney Smith’s residence from 2012 to 2018, Tina Carano answered, “When the police came to the house all the time, there was no reason to charge him. That’s why there are no charges or arrests for domestic violence. Courtney claimed that Ohio State knew. Well, there were charges to know about. What are they supposed to do, take her word over his if there is no evidence? They can’t do that.”A 2015 incident in which the Powell police were called to Courtney Smith’s residence is at the heart of the investigation into Meyer’s role. Meyer said in a statement two weeks ago that he properly reported the incident to university officials.Carano also said she is sure the Powell police communicated what they had discovered to the Ohio State athletic department over this incident, too. Thus, she claimed, there would have been no reason to fire Smith then.“In 2015, if any of this was justified, he should have been fired then,” she said. “He wasn’t because none of this was justified. They couldn’t fire him if there was nothing to it.”Carano claims Zach Smith was the one who could have had her daughter arrested in the past.Carano, who now lives in Marco Island, Fla., detailed her daughter’s rage in one episode when she hosted her two grandchildren, now 8 and 6, at her residence at 10400 Braemar Drive in Powell.“In June or July of 2015 after they got separated, we all were at my condo and Zach was picking up or dropping off the kids,” she explained. “Courtney got mad about something, she then got into her car and she deliberately tried to run him over with her car. Zach had to jump out of the way and I thought she actually had run him over. Courtney didn’t care that her own kids were there at the time.”Asked why Zach then did not call the police, Tina responded, “He could have gone to the police and had her arrested, but he would never do that.”In another incident more recently, in 2017, Tina claims Courtney believed Zach had placed a hidden video camera in her residence, so she called the Powell police department.“They sent someone out … I think it was a detective and they did a clean sweep of the place and found nothing,” Tina said. “She then found somebody to go through it a second time, and that person found nothing. She was just paranoid.”Zach Smith confirmed both incidents Monday, but did not want to elaborate.Carano says her daughter’s obsession for getting payback at her ex-husband likely stems from the fact Zach Smith was unfaithful, which he has admitted.“Zach realizes he was 100 percent wrong,” Tina explained. “I am not excusing that. He admits he was a horrible husband. He doesn’t deny that, but he never hit my daughter. It was just the opposite: She hit him often. She would start hitting him just to start a fight. He would have to grab her arms tight to get control of her. I am sure that left the marks on her arms which everybody saw the pictures of.“It is wrong for anybody to put their hands on anybody else and that includes a wife beating her husband. Why is that it that people think of domestic abuse and they only think of it the other way around? That is not right. I have known all along who was at fault here. I know how she gets. He told me several times, ‘She hits me.’“Let me tell you another thing: If my daughter was being beaten by her husband, my ex-husband (Courtney’s father) would step in, but both of us knew the real picture. The fact is that she is out of control when she drinks. We all know that. He just doesn’t want anything to do with making it public – and I felt the same way at first.”Carano also said her daughter “has been verbally abusive to me and my 84-year-old mother, her grandmother. Nobody in my family wants anything to do with her anymore, and it has nothing to do with Zach. It is how she has treated us.“I came up in May to help her and we got into an argument with my mother there. She then called me every name in the book, then turned on my mother and then kicked me and my mother out of her house. We both have helped her so much throughout her life. My mom helped her with her student loans, cooked for her and the kids, did her laundry. And who kicks their grandmother, 84 years old, out of their house like that? She just gets out of control when she drinks.”Tina also claimed most of Courtney’s friends have ended their friendships in recent years, because “they got tired of hearing her obsess over Zach all the time.”Tina also set the Smiths met at the University of Kentucky when one of her sorority sisters, who happened to be a classmate of Zach Smith’s at Dublin Coffman, set the two up on a date. That sorority sister are no longer close to Courtney Smith, either, Tina claimed.“I think she has two or three friends left locally,” she said. “And then there’s Michelle ...”As in Michelle Herman, wife of Texas Longhorns head coach Tom Herman. While Ohio State’s offensive coordinator from 2012-14, Herman and Smith became close at one time. Their wives, Tina said, became even closer.“They were best friends,” she said. “But Michelle doesn’t live local (sic) anymore, so now it’s a long-distance friendship now. Courtney and Michelle are still very close. They still talk and text … absolutely. Michelle even told Courtney a while ago that she knew the right people and that she could get interviews and that she could also get her a book deal.”Carano also said Michelle Herman “Once called a high-profile attorney to see if he would represent Courtney. They needed someone that wasn’t OSU-affiliated.”Courtney Smith’s current attorney, Julia Leveridge, received her undergraduate degree at the University of Kentucky in 1997 and her law degree from Capital University in 2000.On Saturday, Herman denied being involved in Courtney Smith-Zach Smith situation, and denied playing a role in how it became public with Brett McMurphy’s initial reporting, but he did admit to helping Courtney with a “one-time loan.” The money was to pay for Courtney’s attorney fees, several sources said.Tina claimed that Courtney received “a substantial amount monthly” from Zach Smith, which covered alimony and child support, since their divorce, which she filed for in November, 2015, following a five-month separation. Courtney Smith is currently enrolled in nursing school at Chamberlain University.When Zach Smith received a raise in the off-season to increase his salary to $340,000 annually, Courtney planned to file the appropriate paperwork to ask for her child support to be increased, her mother claimed.As far as her own texts she supposedly sent to Zach Smith in 2015, which McMurphy published, she said she doesn’t remember sending them. “If they are real, and they do exist, I cannot honestly remember it,” she said. “If I did it, and I am not sure I did it, I think I told (Zach) not to touch her and the arguing has got to stop … something just so those two would stop fighting and stop arguing. I just wanted peace in their relationship, for the kids’ sake.”Carano wanted to make another thing perfectly clear: “Both of them are great parents,” she said. “Zach is a great father and Courtney is a great mother, in spite of all this. They both love their kids. But now their kids are exposed to this mess.“It breaks my heart, because we were so close once, but I know someone has to do the right thing. Somebody had to tell the truth about all this. I wouldn’t just go around making stuff up about my own daughter. If someone asks about my motive for speaking out this way against my own daughter, it’s that I really think she needs professional help. I hope she reads this and gets that help … I still love her very much.”The Columbus Dispatch reported Sunday that Zach Smith will meet with the six-member OSU investigative committee this week, and also ask to be reinstated.“I never thought he deserved to be fired,” Carano said. “So sure, he deserves his job back. How could they not do the right thing? They didn’t have a good reason to fire him in the first place.”
submitted by DrHandyman to OhioStateFootball [link] [comments]

Today's Stock Market News [Thursday, Jan. 31st, 2019]

Good morning traders and investors of the stocks sub! Welcome to the final trading day of January! Here are your pre-market movers & news this AM-

Today's Top Headlines for Thursday, January 31st, 2019

STOCK FUTURES CURRENTLY:

(CLICK HERE FOR STOCK FUTURES CHARTS!)

YESTERDAY'S MARKET MAP:

(CLICK HERE FOR YESTERDAY'S MARKET MAP!)

TODAY'S MARKET MAP:

(CLICK HERE FOR TODAY'S MARKET MAP!)

YESTERDAY'S S&P SECTORS:

(CLICK HERE FOR YESTERDAY'S S&P SECTORS CHART!)

TODAY'S S&P SECTORS:

(CLICK HERE FOR TODAY'S S&P SECTORS CHART!)

TODAY'S ECONOMIC CALENDAR:

(CLICK HERE FOR TODAY'S ECONOMIC CALENDAR!)

THIS WEEK'S ECONOMIC CALENDAR:

(CLICK HERE FOR THIS WEEK'S ECONOMIC CALENDAR!)

THIS WEEK'S UPCOMING IPO'S:

(CLICK HERE FOR THIS WEEK'S UPCOMING IPO'S!)

THIS WEEK'S EARNINGS CALENDAR:

($AMZN $AAPL $AMD $FB $MSFT $BABA $TSLA $CAT $GE $BA $T $PYPL $VZ $UPS $V $MCD $LMT $MA $MMM $PFE $XOM $MO $AKS$SALT $ALGN $NUE $BIIB $NOK $WYNN $EBAY $RTN $ARLP $QCOM $HOG $BOH $GLW $BX $X $BMRC $SAP $AGN $WHR $SIRI $CVX $CADE)
(CLICK HERE FOR THIS WEEK'S EARNINGS CALENDAR!)

THIS MORNING'S PRE-MARKET EARNINGS CALENDAR:

($GE $UPS $MA $MO $CELG $NOK $RTN $BX $ABMD $NOC $DWDP $VLO $APRN $COP $S $SHW $RACE $KEM $TSCO $IP $ATTU $BHGE$CHTR $ABC $EPD $HSY $YRCW $RDS.A $BAX $WRK $FLWS $IIVI $ETN $OMN $PH $MMP $KIM $APO $TUES $APTV $MAN $NS)
(CLICK HERE FOR THIS MORNING'S EARNINGS CALENDAR!)

THIS AFTERNOON'S POST-MARKET EARNINGS CALENDAR:

()
([CLICK HERE FOR THIS AFTERNOON'S EARNINGS CALENDAR!]())
T.B.A.

EARNINGS RELEASES BEFORE THE OPEN TODAY:

(CLICK HERE FOR THIS MORNING'S EARNINGS RELEASES LINK #1!)
(CLICK HERE FOR THIS MORNING'S EARNINGS RELEASES LINK #2!)

EARNINGS RELEASES AFTER THE CLOSE TODAY:

(CLICK HERE FOR THIS AFTERNOON'S EARNINGS RELEASES!)

THIS MORNING'S ANALYST UPGRADES/DOWNGRADES:

(CLICK HERE FOR THIS MORNING'S UPGRADES/DOWNGRADES!)

THIS MORNING'S INSIDER TRADING FILINGS:

(CLICK HERE FOR THIS MORNING'S INSIDER TRADING FILINGS!)

TODAY'S DIVIDEND CALENDAR:

(CLICK HERE FOR TODAY'S DIVIDEND CALENDAR LINK #1!)
(CLICK HERE FOR TODAY'S DIVIDEND CALENDAR LINK #2!)
(CLICK HERE FOR TODAY'S DIVIDEND CALENDAR LINK #3!)

THIS MORNING'S MOST ACTIVE TRENDING TICKERS:

  • GE
  • FB
  • TSLA
  • MSFT
  • PYX
  • NOK
  • MA
  • MO
  • NOW
  • S
  • UPS
  • DWDP
  • PYPL
  • V
  • ATTU
  • XLK
  • CHTR
  • AMD
  • MSCI
  • RFP
  • WDAY
  • NOC
  • HSY
  • MAN
  • ABMD
  • NTWK
  • BAX
  • KIM
  • RTN
  • VLO

THIS MORNING'S STOCK NEWS MOVERS:

(source: cnbc.com)
DowDupont – The chemical maker earned an adjusted 88 cents per share for the fourth quarter, a penny a share above estimates. Revenue was short of estimates, however, on lower demand for automotive and appliance-related products.

STOCK SYMBOL: DWDP

(CLICK HERE FOR LIVE STOCK QUOTE!)
General Electric – GE missed estimates by 5 centss a share, with adjusted quarterly profit of 17 cents per share. Revenue beat forecasts, however, and GE said it was making progress in strengthening its businesses and deleveraging its balance sheet.

STOCK SYMBOL: GE

(CLICK HERE FOR LIVE STOCK QUOTE!)
Blackstone – The private-equity firm posted quarterly economic net loss of 2 cents per share, compared to estimates of a breakeven quarter. Revenue was well above estimates, however, and CEO Stephen Schwarzman said nearly all of Blackstone's flagship strategies beat their relevant benchmarks in 2018. Distributable net income also topped Wall Street forecasts.

STOCK SYMBOL: BX

(CLICK HERE FOR LIVE STOCK QUOTE!)
Hershey – The chocolate maker missed estimates by a penny a share, with adjusted quarterly profit of $1.26 per share. Revenue was also shy of estimates. Hershey saw sales increases in recently acquired snack brands, but that was offset by a drop in North American chocolate sales.

STOCK SYMBOL: HSY

(CLICK HERE FOR LIVE STOCK QUOTE!)
UPS – The delivery service earned an adjusted $1.94 per share for the fourth quarter, 4 cents a share above estimates. Revenue fell short of forecasts amid global trade turbulence, but higher fees helped bottom line results.

STOCK SYMBOL: UPS

(CLICK HERE FOR LIVE STOCK QUOTE!)
Microsoft – Microsoft reported adjusted quarterly profit of $1.10 per share, beating consensus estimates by a penny a share. Revenue came in slightly short of forecasts, however, despite a gain in its cloud-computing business as several other product areas saw slower growth.

STOCK SYMBOL: MSFT

(CLICK HERE FOR LIVE STOCK QUOTE!)
Facebook – Facebook beat estimates by 19 cents a share, with quarterly profit of $2.38 per share. The social media giant's revenue also beat forecasts. The results are lessening investor concerns about increased spending on privacy and security-related matters.

STOCK SYMBOL: FB

(CLICK HERE FOR LIVE STOCK QUOTE!)
Tesla – Tesla earned an adjusted $1.93 per share for its latest quarter, missing the $2.20 a share consensus estimate. The automaker's revenue beat Street forecasts, however, and CEO Elon Musk expressed confidence that Tesla can be profitable every quarter. Separately, the company announced the departure of chief financial officer Deepak Ahuja.

STOCK SYMBOL: TSLA

(CLICK HERE FOR LIVE STOCK QUOTE!)
Tailgrass Energy – Affiliates of Blackstone will acquired a controlling stake in the energy infrastructure company for $3.3 billion in cash.

STOCK SYMBOL: TGE

(CLICK HERE FOR LIVE STOCK QUOTE!)
Qualcomm – Qualcomm reported adjusted quarterly profit of $1.20 per share, 11 cents a share above estimates. The chipmaker's revenue fell short of Wall Street forecasts. Qualcomm gave a forecast that was in line with analysts' estimates, soothing some concerns about weakness in the China smartphone market.

STOCK SYMBOL: QCOM

(CLICK HERE FOR LIVE STOCK QUOTE!)
Visa – Visa beat estimates by 5 cents a share, with adjusted quarterly profit of $1.30 per share. The payment network's revenue beat estimates, as well. Results were boosted by an 11 percent increase in payment volume, and the company also announced an $8.5 billion stock buyback program.

STOCK SYMBOL: V

(CLICK HERE FOR LIVE STOCK QUOTE!)
PayPal – PayPal reported adjusted quarterly profit of 69 cents per share, 2 cents a share above estimates. The payment service's revenue was essentially in line with forecasts, however PayPal gave a lower-than-expected revenue outlook for the current quarter.

STOCK SYMBOL: PYPL

(CLICK HERE FOR LIVE STOCK QUOTE!)
Mondelez International – Mondelez matched Street forecasts with adjusted quarterly profit of 63 cents per share, and the snack maker's revenue was in line with expectations, as well. The company's sales fell in the latest quarter, but higher prices helped boost bottom line results.

STOCK SYMBOL: MDLZ

(CLICK HERE FOR LIVE STOCK QUOTE!)
Wynn Resorts – Wynn earned an adjusted $1.06 per share for its latest quarter, missing the consensus estimate of $1.35 a share. The casino operator's revenue came in above Wall Street forecasts.

STOCK SYMBOL: WYNN

(CLICK HERE FOR LIVE STOCK QUOTE!)
Unilever – The consumer products giant reported weaker-than-expected fourth-quarter results and warned of a challenging 2019, due to tougher competition in the North American market.

STOCK SYMBOL: UL

(CLICK HERE FOR LIVE STOCK QUOTE!)
General Motors –GM temporarily suspended production at 11 Michigan plants and its Warren Tech Center. The move comes after a local utility requested that users conserve natural gas during the extreme cold snap.

STOCK SYMBOL: GM

(CLICK HERE FOR LIVE STOCK QUOTE!)
United Natural Foods – United Natural sued Goldman Sachs and Bank of America/Merrill Lynch. The food distributor claimed the investment banks put their own financial interests ahead of United Natural's when advising it on the acquisition of Supervalu last year. A Goldman spokeswoman said the suit has no merit.

STOCK SYMBOL: UNFI

(CLICK HERE FOR LIVE STOCK QUOTE!)
UnitedHealth Group – The health insurer is suing to stop former executive David Smith from joining the new joint health care venture formed by Amazon, Berkshire Hathaway, and JPMorgan Chase. UnitedHealth claims the move violates Smith's noncompete agreement.

STOCK SYMBOL: UNH

(CLICK HERE FOR LIVE STOCK QUOTE!)

DISCUSS!

What is on everyone's radar for today's trading day ahead here at stocks?

I hope you all have an excellent trading day ahead today on this Thursday, January 31st, 2019! :)

submitted by bigbear0083 to stocks [link] [comments]

Top 100 Sports Business Twitter Follows

Editor Note: With the assistance of a few well-respected industry veterans, I compiled a list of 100 twitter handles – in alphabetical order – that should be followed if you work in sports business. Some are entertaining, others are insightful, but all are well respected amongst their peers. Without further ado…
@AndrewBrandt – Lawyer. NFL business insider. Columnist for MMQB.
@AndrewMarchand – NY Post sports media columnist. On the Mike Francesa beat.
@AngelaRuggiero – Olympian. Founder of the Sports Innovation Lab. Sports tech intelligence. Market research.
@AnotherDanCohen – Heads up Octagon’s Global Media Rights Consulting Division.
@A_S12 – Adam Stern is on SBJ/SBD’s NASCAR business beat.
@barryjanoff – Executive Editor of the sports marketing website NYSportsJournalism.com. Publishes a sports marketing newsletter.
@BenFischerSBJ – Among SBJ/SBD’s most talented writers. On the esports and Olympics beat.
@BFawkesESPN – Editor of Chalk. Sports gambling trends, picks and predictions.
@Bill_Shea19 – Senior reporter at Crains Detroit. Covers sports business in the Motor City.
@brandonBTIG – Equity Analyst. Brandon Ross covers technology, media and telecom.
@brettsmiley – EIC of Sports Handle. Focus is on U.S. gambling legislation. Reporting and analysis.
@cannonjw – J.W. has a knack for finding odd-ball promotions and fan giveaways.
@carronJphillips – Columnist for NY Daily News. Plays at the intersection of social issues, race & sports.
@chadmillman – The brains behind The Action Network.
@ChrisSchlosser – SVP MLS/SUM Media. Digital strategy, content creation, and product development guru.
@chrisyates11 – Director of Video Production & Social Media at Huddle Productions. Expertise in content marketing, social media and video production.
@Cnyari – Cristian Nyari is Head of Media for FC Bayern Munich. Offers commentary on all things sports media, digital, social and tech.
@ConvergenceTR – Former NFL and NHL exec. Tom Richardson. Digital media/marketing thought leader. Professor in Columbia’s Sports Management program.
@DarrenHeitner – Sports attorney with a niche in contracts and IP.
@darrenrovell – Among the best follows on Twitter, which explains why he has over 2 million followers. Move to Action Network means more gambling related content, but Big Cat’s arch enemy still covers everything from shoe releases to half-time acts.
@david_schwab – EVP, Octagon. Plays at the intersection of brands and influencers.
@deepenparikh – Partner at Courtside Ventures. Plays at the intersection of sports, tech and media.
@TheDonnyWhite – CEO of Satisfi Labs. Expertise in AI, robotics and machine learning.
@DustinGouker – Head of Content for LegalSportsReport.com. Has finger on the pulse of the legal online sports betting (and DFS) market. Always opinionated.
@EKANardini – Barstool Sports’ CEO Erika Nardini. Leading the podcast revolution.
@elwinter – Eric Winter is the former GM for Rivals/Yahoo Sports & SVP, UFC. Tends to focus on event marketing and fight sports.
@EricFisherSBJ – Covers MLB, digital media and technology for SBJ/SBD.
@Eric_Ramsey – News and perspective on the regulated gambling industry for LegalSportsReport.com.
@FormulaMoney – No one has a better grasp on business of F1 than Christian Sylt.
@frntofficesport – The handle associated with Adam White’s daily newsletter. FOS tends to play in the sports marketing and sports sponsorship space.
@garyvee – Entrepreneur with 1.8 million followers. CEO of Vayner Sports. Progressive thinker. Future Jets owner?
@GeoffBakerTIMES – Sports enterprise and investigative reporter for the Seattle Times. Focuses on teams in the PNW.
@Hawk – Andrew Hawkins is the Director of Business Development at Uninterrupted. ESPN media personality. NFL vet. Perspective on an athlete’s post-playing career.
@HowieLongShort – The handle affiliated with JohnWallStreet’s daily email newsletter. Offers context and commentary on the biggest stories/trends in sports business. A MUST-READ if you work in the industry.
@JacobFeldman4 – Writes for SINow. Perspective on how the internet has changed/is changing sports.
@JamesEmmett – Editor-at-Large, Leaders. Weekly newsletter is a mix of original thoughts and aggregated content. U.K. based, so there’s a European slant in terms of the sports covered.
@JayKapoorNYC – Early stage VC investor. Tweets about sports, media, tech and commerce.
@_JaySharman – CEO of TeamWorks Media. Authority on digital media and purpose marketing.
@jbooton – Jen Booton is a Senior Writer for SportTechie. Expertise in action sports.
@JeffEisenband – NBA 2K League sideline reporter. Authority on esports.
@JKosner – John Kosner built ESPN’s digital presence. President of Kosner Media. Digital media thought leader.
@joefav – Publishes a MUST-READ sports marketing and PR newsletter. Hosts a weekly sports business podcast. Long-time industry stalwart.
@kbadenhausen – Kurt Badenhausen is a Senior Editor at Forbes. Niche is athletes’ earnings and franchise valuations.
@kerrykeating3 – Former NCAA basketball coach. NBA analyst. Sports tech advisor.
@kenshropshire – CEO of the Global Sport Institute at ASU. Consultant to NFL. Well-respected educator.
@Koufish – Long-time front-office executive Andy Dolich. Sports business consultant.
@laurafrofro – Leads Twitter’s sports content ambitions.
@LemireJoe – Senior Writer, SportTechie. Has a passion for MLB technology.
@MarcEdelman – Well-respected educator. Sports, antitrust, gaming & IP Attorney.
@MariaTaylor – Fast-rising ESPN talent. Mentors young women in sports business.
@markjburns88 – Sports Business Reporter for Morning Consult. On the Barstool beat.
@MartysaurusRex – Outgoing NFL star turned entrepreneur Martellus Bennett. Founded digital story telling company for children.
@MattRybaltowski – Writes about sports betting for Sports Handle and US Bets. Covers stadium financing and sports tech for Forbes.
@mkerns – Mike Kerns is the President of Digital at The Chernin Group. Authority in social and mobile spaces.
@michaelaneuman – Managing Partner, Scout Sports & Entertainment. Sports marketing thought leader.
@MikeDSykes – Reporter for Axios Sports. SportsCenter in a newsletter format.
@MMcCarthyREV – Michael McCarthy covers sports business, media and marketing for Sporting News.
@NateSilver538 – EIC, FiveThirtyEight. Statistical analysis of sports data.
@neildemause – Co-author of Field of Schemes. Go-to source for stadium and arena news.
@njh287 – Neil Horowitz is a social media and digital marketing pro. #smsports community member.
@NoahCoslov – Broadcaster. Media and marketing authority. Equity investor.
@novy_williams – Eben Novy Williams is the junior half of Bloomberg’s talented sports business duo. Co-hosts Bloomberg’s “Business of Sports” podcast.
@NPDMattPowell – Senior retail industry advisor, NPD Group. Perspective on the footwear and apparel industries.
@OPReport – Chris Grove is a gambling industry authority. Writes for OnlinePokerReport.com, Eilers Research and LegalSportsReport.com.
@Ourand_SBJ – John Ourand Writes for SBJ/SBD. Focuses on media.
@PaulRabil – Co-founder of Premier League Lacrosse. Lacrosse’s 1st “Million Dollar Man”. Start-up investor.
@PeterChernin – CEO, Chernin Group. Invested in Barstool Sports and The Action Network.
@phkeane – Patrick Keane is CEO of The Action Network. Digital marketing authority. PE investor.
@PRyanTexas – Co-Founder, Eventellect. Patrick Ryan has been called “the smartest guy in ticketing.”
@readDanwrite – Dan Roberts covers sports business for Yahoo Finance. Host of YFi AM and the “Sportsbook” podcast.
@restivo – Matt Restivo is the head of product & engineering at The Action Network. Authority on product design and software development.
@richarddeitsch – Covers sports media for The Athletic. Will also dabble in women’s sports and Olympics.
@RichBTIG – BTIG Equity Research Analyst Rich Greenfield. Covers media and technology. Media futurist.
@RickHorrow – aka the Sports Professor. Attorney. Dealmaker. Host of the Reuters “Keeping Score” podcast.
@rscibetti – Former NFL, NHL exec Russell Scibetti. President of KORE Planning and Insights. Offers CRM and database expertise.
@RyanGMundy – Steelers alum. Venture capital investor. NFLPA One Collective board member.
@SaraSlaneAGA – SVP of Public Affairs, American Gaming Association. Industry strategist. Spokesperson.
@scottrosner – Academic Director of Sports Management Program, Columbia University. Sports business/sports law educator.
@ScottStanchak – VP of emerging technology, NBA. Insights on digital media, tech strategy, emerging platforms.
@Seth_Everett – Forbes contributor. Host of the “Sports with Friends” podcast. Sports broadcaster.
@Slasher – Rod Breslau writes about esports for ESPN. esports consultant. Competitive gaming insider.
@soshnick – Scott Soshnick is the senior half of Bloomberg’s talented sports business duo. Co-hosts Bloomberg’s “Business of Sports” podcast.
@SportsBizNews – Howard Bloom’s account serves as an aggregator of industry headlines.
@sportsdoinggood – Sab Singh brings “the bright side” of sports into the light. Social Responsibility. Development. Charity. Entrepreneurship. Great Performances.
@SportsTaxMan – Robert Raiola is the Director of Sports & Entertainment at PKF O’Connor Davies. Foremost authority on the jock tax.
@SportsTVRatings – Robert Seidman will keep you apprised of how many people watched last night’s game.
@StephenEspinoza – President of Showtime Sports. Outspoken. Boxing enthusiast.
@Sutton_ImpactU – Long-time NBA league office executive Bill Sutton. Director of the Vinik Sport Business Grad Program, USF. Highly respected educator.
@TannerSimkins – Certified sports agent. Founder of Complete SET Agency. Industry moveshaker.
@TedLeonsis – Wizards and Capitals owner. Venue and media networks owner. Venture capitalist. Progressive thinker.
@terrylyons – EIC, Digital Sports Desk. Boston-based sports marketing and communications professional.
@thekendallbaker – Voice of Axios Sports. SportsCenter in newsletter form.
@themarkuskuhn – NFL alum. Media personality. Leading the NFL’s efforts to grow the game in Germany.
@TheRealNate – Nathan Lundburg is the Director of Global eSports Sponsorships at Twitch. Plays at the intersection of brands, esports and marketing.
@TKGore – Business Development for Comscore. Digital media thought leader.
@VegasandVine – Chris Purcell is the EIC of Cynopsis Sports. Aggregating sports business, eSports, media, and sponsorship news in a wire release format.
@WallachLegal – Gaming law and sports betting attorney Daniel Wallach. Sports legal analyst.
@WerlySportsLaw – Sports lawyer Dan Werly. Founder of the blog TheWhiteBronco.com.
@WilliamsBob75 – Sport Business is a U.K. based sports biz news, data and event business. Bob is their U.S. correspondent. Soccer centric account.
@ZidanSports – Karim Zidan covers stories at intersection of sports and politics. Authority on MMA.
Interested in Sports Business? Sign-up for our free daily email newsletter list, here!
submitted by HowieLongShort to Sportsbusiness [link] [comments]

The Koch Brothers

Not a lot of people know this but there are actually 4 brothers.
Charles and David operate Koch Industries from Kansas, though David tends to spend more time at the New York office and in DC as the companies face. Charles beliefs unsettle people.
The other two brothers are William and Frederick.
William is Davids twin brother and Frederick is the oldest.
Their share of Koch Industries was bought out by the other two brothers in 1983 for 800 million dollars.
They soon claimed the company had been undervalued and spent the next 20 years suing them.
William lives in Florida and used his share of the family inheritance + the sale to start his own energy company Oxbow Group, boats to compete in the Americas Cup, and NIMBY efforts to stop offshore wind farms. As well as from the late 1980s-early 2000s funding a civil corruption suit against Koch Industries for stealing oil from Indian Reservations (!), dumping toxic waste, knowingly poisoning workers with mercury and not informing them until they became too sick to work and refusing to pay them compensation, knowingly operating leaking pipelines that killed people under the rationale it would be cheaper to pay compo than fix, and other illegal practices at the same time he was suing the owners his brothers over the sale of the company.
He hired to carry out this civil case several retired FBI agents and EPA lawyers that had been working on similar cases in the 1980s that got shut down when Bush Snr appointed a friendly DA. Their job wasn't that hard as Koch Industries staunchly refuses to adhere to safety regulations, maintain records, update or maintain old equipment, dispose of waste properly, operate a safe workplace, or cooperate with investigations. Charles Kochs has advocated in industry journals that they should fight tooth and claw investigations and regulators with everything at their disposal. Investigators and lawyers have reported being followed, their offices bugged, their garbage rummaged through, etc. One FBI agent said the Kochs are worse than mob cases he has worked on. Journalists have come under this scrutiny as well.
Frederick spends his inheritence + share of the sale on collecting art and restoring classical architecture. He lives in NYC and still catches the train and bus in his 80s.
Allegedly in the 1960s the three other brothers tried to blackmail Frederick into selling them his share of the company. In a board room meeting of just the brothers, Charles claimed to have obtained evidence that Frederick was gay after breaking into and ransacking his Greenwich Village apartment and threatened to reveal this to their father if he did not sell.
Meanwhile, Charles own son Chase ran a red light and killed a 12 year old in 1996. Remarkably he was only sentenced to 100 hours community work. Today he is the CEO of Koch Industries subsidiary Koch Fertilizer.
Their father Fred Koch built oil refineries and aviation fuel refineries for military aircraft for the Nazis in the 1930s. He thought the Nazis had the right idea in 1938 when he concluded business there and brought home a nanny that was a member of the Nazi Party to help raise his children correctly. He believed in stern discipline for his children and encouraged fierce competition between them, including fighting which once saw Frederick break Charles nose. He was later co-founder of the John Birch Society in the 1950s. For those of you too young to remember the Birchers, they were old school crazy: they thought every social ill was a Communist conspiracy, everyone in politics and the media was controlled by international bankers and Jews, they even accused Eisenhower of being a secret Communist.
Charles Koch went to work for it as a young man as well as founding schools like the "Freedom School" and "Rampart College" and magazine that employed Holocaust Deniers, and later funding Reason Magazines early days when it did special issues on Holocaust Deniers.
And do you notice that now the far Rights biggest concern is cabals of crooked Democrats and 'Globalists' undermining America, just like the Birchers. Is this the influence of the Kochs?
When their mother died in 1990 relations between the two camps were so bad Charles and David did not tell William and Frederick until it was too late for them to attend the funeral, William only managed to make the wake by chartering a private plane. Charles and David walked right past him without acknowledging him. Frederick was unable to attend at all. Their mothers will stipulated that no share could go to any brother engaged in legal action against another, disinheriting Wlliam and Frederick. They spent a decade contesting this alleging their brothers had manipulated her into inserting this clause in her final frail years on top of their case over the sale of the Koch Industries.
Williams civil corruption suit against Charles and David finally concluded in a victory in the early 2000s with the court fining Koch Industires over 200 million, on appeal this was reduced to 23 million. The laws on civil corruption suits awarded him 1/4 and the government the rest. With this turn of events Charles and David decided to settle with their brothers, stipulating all four would have to sign NDA preventing them for speaking negatively of the others with incrementally increasing fines for each instance.
When David Koch ran for the Vice President on the Libertarian Party ticket in 1980 William F. Buckley Jr described the brothers beliefs as "anarcho totalitarian".
Since then they have joined other wealthy recluses like the Mellon Scaifes and Olins inspired by the Powell Memorandum in constructing a dense web of right wing libertarian Think Tanks like Heritage Foundation and Cato Institute and American Enterprise Institute, magazines like Reason, public educational 'charities' like ALEC, and faux grass roots groups all shifting money back and forth between one another ultimately hiding the source, allowing the Kochs and their wealthy friends to raise hundreds of millions of dollars to spend on election campaigns in secret - and often even tax deductible because of the on paper charitable status of the groups advocating their beliefs.
This is organised at regular 'donor network' meetings where Charles and William invite select groups from the ultra rich to get together and discuss matters, hear talks from politicians or lawyers or judges or people from their think tanks and fronts.
Its not that different to a Bircher meeting.
They have also set their sights on education.
In high schools they're funding lesson plans and textbooks that claim the New Deal made the Great Depression worse and government regulation created the GFC, economic textbooks that claim its good for businesses to make unsafe and thus cheaper products, history textbooks that deny and whitewash Americas history with racism.
And in colleges they have very serious interests. Donations are tied to the right to select and fire professors, endowments to influence course material, and establishing their own schools on college campuses - It’s mostly inside the university where you get some resistance from administrators getting the power to decide how money is spent, and they say ‘oh, you have to do this.’ And then I’ve used the phrase, ‘are you sure that the Koch foundation’s lawyers will read that the same way you are?’ And then they figure well they must have pretty good lawyers. - all produces the framework for rationalising their beliefs and generating the ideological warriors that will make the legislation for and promote in the media their beliefs.
Or to put it in their own words:
In support of building their own youth movement, another speaker, the libertarian historian Leonard Liggio, cited the success of the Nazi model. In his paper titled "National Socialist Political Startegy: Social Change in a Modern Industrial Society with an Authoritarian Tradition," Liggio, who was affiliated with the Koch-funded Institute for Humane Studies (IHS) from 1974 to 1998, described the Nazis' successful creation of a youth movement a key to their capture of the state. Like the Nazis, he suggested, libertarians should organise university students to create group identity.
They were also behind those campus lecture tours that caused so much ruckus. More group identity?
They now fund Neo-Confederate professors.
Huge sums are pumped into climate change denial, the people doing this are total cynics.
More is channeled into taking over state legislatures and gerrymandering redrawing congressional districts as part of the REDMAP program.
The anti-union initiatives like the Janus trial are their brainchild.
They have also begun to involve themselves in the Prison Reform campaign, but this is little more than an effort to get in on prison privatisation and insert Evangelical and Neo-Confederate doctrine into prisoner outreach.
And finally despite their professed libertarian beliefs, they also fund groups in the Rightwings Culture Wars, anti-abortion groups, have a real hard on against individuals having access to their own Solar Panels, and their group ALEC is writing laws for legislatures to adopt that criminalise protest. What kind of Libertarian does that?
You might say, well hold on a minute Mr. Cranston what about George Soros? True enough, in the 2004 election the height of his political involvement he spent 20 million dollars campaigning against George Bush. In the 2016 election the Koch brothers and their donor network raised 889 million to campaign for Republican candidates. And last year donors bluntly stated that if the ACA wasn't repealed and tax reform passed then they would not provide 400 million for the midterms.
Koch Industries being in fossil fuels and notorious for refusing to adhere to regulations is naturally opposed to the EPA, Clean Air Act, Clean Water Act, Endangered Species Act, and taking action on Climate Change.
So of course the libertarian politics they and their fronts espouse advocate a small government that is uninvolved in these things, 'states rights' that means a national problem is divided up into 50 little fights, and casts doubt on climate change.
Koch Industries abuses its work force.
Ergo their libertarian politics argue against unions, collective bargaining, OSHA, minimum wage, etc.
Is it mere a coincidence that a campus they fund employs a professor who speculates on the value of researching the alleged link between IQ and race, and eugenics, or their prison "reform" movement is led by a professor linked to the League of the South when we consider their fathers history, Charles early involvement with their fathers work and Holocaust deniers, involvement with Neo-Confederate groups, their founding of the Tea Party movement, and in an interview one endorsed the birther conspiracy theory? This sort of seemingly benign academic inquiry is a mask for their true motivation, racism.
It goes on and on like this. The liberty and freedom they believe in is a shroud for the cynical right of the ultra wealthy to do as they please at everyone else's expense.
Their ideal period of American history was the Gilded Age.
Mark Twain coined the name because the gold gild work hid the rotten core.
And they are determined to rescind every social improvement, every New Deal policy, every advance made in the Progressive Era, and drag the country back to that time.
submitted by Lamont-Cranston to conspiracyundone [link] [comments]

Culminating Analysis of DNC/DCCC/Soros/Colin-Powell/NATO-General-Breedlove/NSA-Equation-Group/Podesta Leaks and Hacks

It has been a running theme lately that the U.S. government blaming Russia for the DNC/Podesta leaks is an attempt at deflection and is false. In the past few days, however, some very interesting pieces of information have come out from three different well-respected cybersecurity companies tasked with investigating the leaks or the groups behind these leaks. These companies are CrowsdStrike, Symantec, and SecureWorks. I think it is important that we cast away the media's non-technical analyses and go straight to the source.
The founder of CrowdStrike is a Russian-American and his company has been tasked with investigating the DNC/Podesta leaks. He blames Mother Russia. Relevant excerpts:
At six o'clock on the morning of May 6, Dmitri Alperovitch woke up in a Los Angeles hotel to an alarming email. Alperovitch is the thirty-six-year-old cofounder of the cybersecurity firm CrowdStrike, and late the previous night, his company had been asked by the Democratic National Committee to investigate a possible breach of its network. A CrowdStrike security expert had sent the DNC a proprietary software package, called Falcon, that monitors the networks of its clients in real time. Falcon "lit up," the email said, within ten seconds of being installed at the DNC: Russia was in the network.
Alperovitch, a slight man with a sharp, quick demeanor, called the analyst who had emailed the report. "Are we sure it's Russia?" he asked.
The analyst said there was no doubt. Falcon had detected malicious software, or malware, that was stealing data and sending it to the same servers that had been used in a 2015 attack on the German Bundestag. The code and techniques used against the DNC resembled those from earlier attacks on the White House and the State Department. The analyst, a former intelligence officer, told Alperovitch that Falcon had identified not one but two Russian intruders: Cozy Bear, a group CrowdStrike's experts believed was affiliated with the FSB, Russia's answer to the CIA; and Fancy Bear, which they had linked to the GRU, Russian military intelligence.
Alperovitch then called Shawn Henry, a tall, bald fifty-four-year-old former executive assistant director at the FBI who is now CrowdStrike's president of services. Henry led a forensics team that retraced the hackers' steps and pieced together the pathology of the breach. Over the next two weeks, they learned that Cozy Bear had been stealing emails from the DNC for more than a year. Fancy Bear, on the other hand, had been in the network for only a few weeks. Its target was the DNC research department, specifically the material that the committee was compiling on Donald Trump and other Republicans. Meanwhile, a CrowdStrike group called the Overwatch team used Falcon to monitor the hackers, a process known as shoulder-surfing.
Ultimately, the teams decided it was necessary to replace the software on every computer at the DNC. Until the network was clean, secrecy was vital. On the afternoon of Friday, June 10, all DNC employees were instructed to leave their laptops in the office. Alperovitch told me that a few people worried that Hillary Clinton, the presumptive Democratic nominee, was clearing house. "Those poor people thought they were getting fired," he says.
For the next two days, three CrowdStrike employees worked inside DNC headquarters, replacing the software and setting up new login credentials using what Alperovitch considers to be the most secure means of choosing a password: flipping through the dictionary at random. (After this article was posted online, Alperovitch noted that the passwords included random characters in addition to the words.) The Overwatch team kept an eye on Falcon to ensure there were no new intrusions. On Sunday night, once the operation was complete, Alperovitch took his team to celebrate at the Brazilian steakhouse Fogo de Chão.
...
Aperovitch's June 14 blog post garnered so much media attention that even its ebullient author felt slightly overwhelmed. Inevitably there were questions about the strange names his company had given the Russian hackers. As it happened, "Fancy Bear" and "Cozy Bear" were part of a coding system Alperovitch had created. Animals signified the hackers' country of origin: Russians were bears, Chinese were pandas, Iranians were kittens, and North Koreans were named for the chollima, a mythical winged horse. By company tradition, the analyst who discovers a new hacker gets to choose the first part of the nickname. Cozy Bear got its nickname because the letters coz appeared in its malware code. Fancy Bear, meanwhile, used malware that included the word Sofacy, which reminded the analyst who found it of the Iggy Azalea song "Fancy."
The day after the media maelstrom, the reporters were back with less friendly questions: Had Alperovitch gotten his facts right? Was he certain Russia was behind the DNC hacks? The doubts were prompted by the appearance of a blogger claiming to be from Eastern Europe who called himself Guccifer 2.0. Guccifer said that the breach was his, not Russia's. "DNC'S servers hacked by a lone hacker," he wrote in a blog post that included stolen files from the DNC. "I guess CrowdStrike customers should think twice about company's competence," Guccifer wrote. "Fuck CrowdStrike!!!!!!!!!"
an incorrect attribution in public. "Did we miss something?" he asked CrowdStrike's forensics team. Henry and his staff went back over the evidence, all of which supported their original conclusion.
Alperovitch had also never seen someone claim to be the only intruder on a site. "No hacker goes into the network and does a full forensic investigation," he told me. Being called out, he said, was "very shocking. It was clearly an attack on us as well as on the DNC."
Alperovitch initially thought that the leaks were standard espionage and that Guccifer's attacks on CrowdStrike were just a noisy reaction to being busted. "I thought, Okay, they got really upset that they were caught," he said. But after documents from the DNC continued to leak, Alperovitch decided the situation was far worse than that. He concluded that the Russians wanted to use the leaked files to manipulate U. S. voters—a first. "It hit me that, holy crap, this is an influence operation. They're actually trying to inject themselves into the election," he said. "I believe that we may very well wake up on the morning the day after the election and find statements from Russian adversaries saying, 'Do not trust the result.' "
...
Days later, Alperovitch got a call from a Reuters reporter asking whether the Democratic Congressional Campaign Committee had been hacked. CrowdStrike had, in fact, been working on a breach at the DCCC; once again, Alperovitch believed that Russia was responsible. Now, however, he suspected that only Fancy Bear was involved. A lawyer for the DCCC gave Alperovitch permission to confirm the leak and to name Russia as the suspected author.
Two weeks later, files from the DCCC began to appear on Guccifer 2.0's website. This time he released information about Democratic congressional candidates who were running close races in Florida, Ohio, Illinois, and Pennsylvania. On August 12, he went further, publishing a spreadsheet that included the personal email addresses and phone numbers of nearly two hundred Democratic members of Congress.
...
Alperovitch's friends in government told him privately that an official attribution so close to the election would look political. If the government named Russia, it would be accused of carrying water for Hillary Clinton. The explanations upset Alperovitch. The silence of the American government began to feel both familiar and dangerous. "It doesn't help us if two years from now someone gets indicted," he said. After Michelle Obama's passport was published online, on September 22, Alperovitch threw up his hands in exasperation. "That is Putin giving us the finger," he told me.
Source: The Russian Expat Leading the Fight to Protect America
The guy responsible for ousting Stuxnet as being an American/Israeli cyberworm (no friend of the U.S. government/establishment) also says that his company, Symantec, has found that Russia was responsible for the leaks:
It is pretty clear judging by the indicators of compromise [IOCs]. The binaries that were used to hack the DNC as well as Podesta’s email as well as some other Democratic campaign folks, those IOCs match binaries and also infrastructure that was used in attacks that were previously recorded by others as having Russian origin. That much we can confirm. So if you believe other people’s—primarily government’s—attribution that those previous attacks were Russian, then these attacks are definitely connected. We’re talking about the same binaries, the same tools, the same infrastructure.
We’ve analyzed the tools, the binaries, and the infrastructure that was used in the attack, and from that we can confirm that it’s connected to a group that has two names. One is Sofacy, or “Cozy Bear,” and The Dukes, which is also known as “Fancy Bear.” From the binary analysis point of view, I can tell you that the activities of these attackers have been during Russian working hours, either centered on UTC+3 or UTC+4; they don’t work Russian holidays; they work Monday to Friday; there are language identifiers inside that are Russian; when you look at all the victim profiles they would be in interest to the Russian nation-state. So all of that stuff fits the profile. Now, could all those things be false flags? Sure. Other government entities obviously have come out and said it is the Russian state, and the binary forensics would definitely match that.
There was another attack that happened in the Ukraine. So in December, in the Ukraine, all the power went out to about 260,000 households, or customers. They basically infiltrated the power company, got access to the machines that controlled the power, they flipped the computer switches off and shut down the power, and then they began to wipe all the machines and devices—overriding the hard drives and trashing the machines so that they couldn’t be started up again, or so that the switches couldn’t come on again. Ukrainians were able to get power back after six hours by switching to manual mode. They went off their computer monitor mode and physically flipped the switches to bring the power back up. What’s interesting about that case is the fact that they were more behind technologically actually helped them. Something very similar could easily happen in the U.S. and we’re much more beholden to computing infrastructure here, so our ability to switch to manual mode here would be much more difficult.
Is there linkage between the DNC and Podesta hacks and the 2014 State Department hacks that were also believed to be carried out by Russia?
Yeah, these are being conducted by the same groups. We know that from the IOCs—by looking at the tools they use and the infrastructure they use.
Many of these attacks were happening prior to the nomination of Trump. Based on that theory, people believe that there was a general plan for disruption, and it may be the case now that the easiest and best way to do so is in the manner you speak, but these attacks did not just start happening post-Trump’s nomination. So in that sense, there is a feeling that it’s not a very Trump-specific activity versus an election disruption activity. This is the easiest way for them to disrupt the election.
Source: Cybersecurity Expert: Proof Russia Behind DNC, Podesta Hacks
Another cybersecurity company, SecureWorks, has published some interesting blogposts about all this:
In mid-2015, CTU researchers discovered TG-4127 using the accoounts-google . com domain in spearphishing attacks targeting Google Account users. The domain was used in a phishing URL submitted to Phishtank, a website that allows users to report phishing links (see Figure 1).
Figure 1. Example of accoounts-google . com used in a phishing URL.
Recipients who clicked the link were presented with a fake Google Account login page (see Figure 2). The threat actors could use entered credentials to access the contents of the associated Gmail account.
Figure 2. Fake Google Account login page.
Encoded target details
Analysis of the phishing URL revealed that it includes two Base64-encoded values (see Figure 3). The decoded Base64 values (see Table 1) match the Gmail account and its associated Google Account username. If a target clicks the phishing link, the username field of the displayed fake Google Account login page is prepopulated with the individual’s email address.
Figure 3. Spearphishing URL.
Table 1. Decoded Base64 values from the phishing URL used by TG-4127.
Use of the Bitly URL-shortening service
A Bitly URL was uploaded to Phishtank at almost the same time as the original spearphishing URL (see Figure 4).
Figure 4. Bitly phishing URL submitted at same time as accoounts-google . com phishing URL.
Using a tool on Bitly’s website, CTU researchers determined that the Bitly URL redirected to the original phishing URL (see Figure 5). Analysis of activity associated with the Bitly account used to create the shortened URL revealed that it had been used to create more than 3,000 shortened links used to target more than 1,800 Google Accounts.
Figure 5. Link-shortener page for bit.ly/1PXQ8zP that reveals the full URL.
Target analysis
CTU researchers analyzed the Google Accounts targeted by TG-4127 to gain insight about the targets and the threat group’s intent.
Focus on Russia and former Soviet states
Most of the targeted accounts are linked to intelligence gathering or information control within Russia or former Soviet states. The majority of the activity appears to focus on Russia’s military involvement in eastern Ukraine; for example, the email address targeted by the most phishing attempts (nine) was linked to a spokesperson for the Ukrainian prime minister. Other targets included individuals in political, military, and diplomatic positions in former Soviet states, as well as journalists, human rights organizations, and regional advocacy groups in Russia.
Other targets worldwide
Analysis of targeted individuals outside of Russia and the former Soviet states revealed that they work in a wide range of industry verticals (see Figure 6). The groups can be divided into two broad categories:
TG-4127 likely targeted the groups in the first category because they criticized Russia. The groups in the second category may have information useful to the Russian government.
Figure 6. TG-4127 targeting outside of Russia and former Soviet states.
Authors and journalists
More than half (53%) of the targeted authors and journalists are Russia or Ukraine subject matter experts (see Figure 7). It is likely that the Russian state has an interest in how it is portrayed in the media. U.S.-based military spouses who wrote online content about the military and military families were also targeted. The threat actors may have been attempting to learn about broader military issues in the U.S., or gain operational insight into the military activity of the target’s spouse.
Figure 7. Subject matter expertise of authors and journalists targeted by TG-4127.
Government supply chain
CTU researchers identified individuals who were likely targeted due to their position within the supply chain of organizations of interest to TG-4127 (e.g., defense and government networks). Figure 8 shows the distribution by category. The targets included a systems engineer working on a military simulation tool, a consultant specializing in unmanned aerial systems, an IT security consultant working for NATO, and a director of federal sales for the security arm of a multinational technology company. The threat actors likely aimed to exploit the individuals’ access to and knowledge of government clients’ information.
Figure 8. Categories of supply chain targets.
Government / military personnel
TG-4127 likely targeted current and former military and government personnel for potential operational insight gained from access to their personal communications. Most of the activity focused on individuals based in the U.S. or working in NATO-linked roles (see Figure 9).
Figure 9. Nation or organization of government/military targets.
TG-4127 targeted high-profile Syrian rebel leaders, including a leader of the Syrian National Coalition. Russian forces have supported Syrian President Bashar al-Assad’s regime since September 2015, so it is likely the threat actors are seeking to gain intelligence on rebel forces to assist Russian and Assad regime military operations.
Success of the phishing campaign
CTU researchers analyzed 4,396 phishing URLs sent to 1,881 Google Accounts between March and September, 2015. More than half (59%) of the URLs were accessed, suggesting that the recipients at least opened the phishing page. From the available data, it is not possible to determine how many of those Google Accounts were compromised. Most of the targeted accounts received multiple phishing attempts, which may indicate that previous attempts had been unsuccessful. However, 35% of accounts that accessed the malicious link were not subject to additional attempts, possibly indicating that the compromise was successful.
Of the accounts targeted once, CTU researchers determined that 60% of the recipients clicked the malicious Bitly. Of the accounts that were targeted more than once, 57% of the recipients clicked the malicious link in the repeated attempts. These results likely encourage threat actors to make additional attempts if the initial phishing email is unsuccessful.
Source: Threat Group-4127 Targets Google Accounts
Here's another article by SecureWorks:
Spearphishing details
The short links in the spearphishing emails redirected victims to a TG-4127-controlled URL that spoofed a legitimate Google domain. A Base64-encoded string containing the victim's full email address is passed with this URL, prepopulating a fake Google login page displayed to the victim. If a victim enters their credentials, TG-4127 can establish a session with Google and access the victim's account. The threat actors may be able to keep this session alive and maintain persistent access.
Hillary for America
TG-4127 exploited the Hillary for America campaign's use of Gmail and leveraged campaign employees' expectation of the standard Gmail login page to access their email account. When presented with TG-4127's spoofed login page (see Figure 1), victims might be convinced it was the legitimate login page for their hillaryclinton.com email account.
Figure 1. Example of a TG-4127 fake Google Account login page.
CTU researchers observed the first short links targeting hillaryclinton.com email addresses being created in mid-March 2016; the last link was created in mid-May. During this period, TG-4127 created 213 short links targeting 108 email addresses on the hillaryclinton.com domain. Through open-source research, CTU researchers identified the owners of 66 of the targeted email addresses. There was no open-source footprint for the remaining 42 addresses, suggesting that TG-4127 acquired them from another source, possibly other intelligence activity.
The identified email owners held a wide range of responsibilities within the Hillary for America campaign, extending from senior figures to junior employees and the group mailboxes for various regional offices. Targeted senior figures managed communications and media affairs, policy, speech writing, finance, and travel, while junior figures arranged schedules and travel for Hillary Clinton's campaign trail. Targets held the following titles:
Publicly available Bitly data reveals how many of the short links were clicked, likely by a victim opening a spearphishing email and clicking the link to the fake Gmail login page. Only 20 of the 213 short links have been clicked as of this publication. Eleven of the links were clicked once, four were clicked twice, two were clicked three times, and two were clicked four times.
Democratic National Committee
CTU researchers do not have evidence that these spearphishing emails are connected to the DNC network compromise that was revealed on June 14. However, a coincidence seems unlikely, and CTU researchers suspect that TG-4127 used the spearphishing emails or similar techniques to gain an initial foothold in the DNC network.
Personal email accounts
CTU researchers identified TG-4127 targeting 26 personal gmail.com accounts belonging to individuals linked to the Hillary for America campaign, the DNC, or other aspects of U.S. national politics. Five of the individuals also had a hillaryclinton.com email account that was targeted by TG-4127. Many of these individuals held communications, media, finance, or policy roles. They include the director of speechwriting for Hillary for America and the deputy director office of the chair at the DNC. TG-4127 created 150 short links targeting this group. As of this publication, 40 of the links have been clicked at least once.
Related activity and implications
Although the 2015 campaign did not focus on individuals associated with U.S. politics, open-source evidence suggests that TG-4127 targeted individuals connected to the U.S. White House in early 2015. The threat group also reportedly targeted the German parliament and German Chancellor Angela Merkel's Christian Democratic Union party. CTU researchers have not observed TG-4127 use this technique (using Bitly short links) to target the U.S. Republican party or the other U.S. presidential candidates whose campaigns were active between mid-March and mid-May.
Source: Threat Group-4127 Targets Hillary Clinton Presidential Campaign
Read these two articles for more context:
How Hackers Broke Into John Podesta and Colin Powell’s Gmail Accounts
How Russia Pulled Off the Biggest Election Hack in U.S. History
Guccifer2.0, The Shadow Brokers, and DCLeaks, who have all leaked U.S. documents/cyberweapons, love talking about the "U.S. elite" and "corruption" in America, along with saying "the elections are rigged." I wonder why these people suddenly became so interested in the U.S. election?
Regardless, we know from the Bit.ly victim profiles that Podesta, the DNC, Ukrainian/Russian journalists, Bellingcat and other enemies of Russia were targeted by these groups. This also means that those targeted by DCLeaks and Guccifer2.0 were the same people, and that the aforementioned entities are actually one.
Why would they lie about being separate groups?
Lastly, I have gone through all the public statements made by these groups, by going through their TwitteTumblMedium/WordPress/web posts. Here are some of the comments made by DCLeaks, Guccifer2.0 and The Shadow Brokers. Tell me if you notice a common theme:
DCLeaks
Known for hacking the emails of former Secretary of State Colin Powell and former NATO General Breedlove, as well as Soros' OSF intranet documents.
George Soros is a Hungarian-American business magnate, investor, philanthropist, political activist and author who is of Hungarian-Jewish ancestry and holds dual citizenship. He drives more than 50 global and regional programs and foundations. Soros is named an architect and a sponsor of almost every revolution and coup around the world for the last 25 years. The USA is thought to be a vampire due to him and his puppets, not a lighthouse of freedom and democracy. His minions spill blood of millions and millions of people just to make him even more rich. Soros is an oligarch sponsoring the Democratic party, Hillary Clinton, hundreds of politicians all over the world. This website is designed to let everyone inside George Soros’ Open Society Foundation and related organisations. We present you the workplans, strategies, priorities and other activities of Soros. These documents shed light on one of the most influential network operating worldwide.
Source: http://soros.dcleaks.com
Welcome another cog in the U.S. political and military machine. CAPT Pistole's emails released
documents reveal the billionaire’s attempt to organize a “national movement” to create a federalized police force.
Looks like Clinton's staff doesn't care about security.Wonder from whom did they learn it..
FBI hq is a great place for club meeting especially when Clinton is under investigation
A further look at their Twitter account reveals that they mostly re-tweet WikiLeaks/RT/PressTV, hate Clinton, like Trump, love talking about the email scandal, post conspiracy theories about Mark Zuckerberg, exclusively target Russia's enemies (like former NATO General Breedlove, Soros, Colin Powell, etc,.), defend Russia from being attacked, and have a penchant for focusing on news portraying the U.S. elections/debates as "rigged":
Check the private correspondence between Philip Breedlove and Harlan Ullman
Check restricted documents of George Soros’ Open Society Foundation
Check restricted documents leaked from Hillary Clinton's presidential campaign staff
Emails show Obama saw US involvement in Russia talks as a 'threat'
'Gen. plotted against Obama on Russia'
Check George Soros's OSF plans to counter Russian policy and traditional values
Check Soros internal files
A New McCarthyism: @ggreenwald on Clinton Camp's Attempts to Link @wikileaks, Trump & @DrJillStein to Russia
Source: https://twitter.com/dcleaks_
Guccifer 2.0
Known for hacking the DNC and DCCC.
Together we’ll be able to throw off the political elite, the rich clans that exploit the world!
Fuck the lies and conspirators like DNC!!!
Who inspires me? Not the guys like Rambo or Terminator or any other like them. The world has changed. Assange, Snowden, and Manning are the heroes of the computer age. They struggle for truth and justice; they struggle to make our world better, more honest and clear. People like them make us hope for tomorrow. They are the modern heroes, they make history right now.
Marcel Lazar is another hero of mine. He inspired me and showed me the way. He proved that even the powers that be have weak points.
Anyway it seems that IT-companies and special services can’t realize that people like me act just following their ideas but not for money. They missed the bus with Assange and Snowden, they are not ready to live in the modern world. They are not ready to meet people who are smart and brave, who are eager to fight for their ideals, who can sacrifice themselves for the better future. Working for a boss makes them slow I suppose. Do you need more proof?
don’t want to disappoint anyone, but none of the candidates has my sympathies. Each of them has skeletons in the closet and I think people have a right to know the truth about the politicians.
As for me, I see great differences between Hillary Clinton and Donald Trump. Hillary seems so much false to me, she got all her money from political activities and lobbying, she is a slave of moguls, she is bought and sold. She never had to work hard and never risked everything she had. Her words don’t meet her actions. And her collusion with the DNC turned the primaries into farce.
Opposite to her, Donald Trump has earned his money himself. And at least he is sincere in what he says. His position is straight and clear.
Anyway that doesn’t mean that I support him. I’m totally against his ideas about closing borders and deportation policy. It’s a nonsense, absolute bullshit.
I have nothing to say about Bernie Sanders. It seems he never had a chance to win the nomination as the Democratic Party itself stood against him!
Here are the DCCC docs on Florida: reports, memos, briefings, dossiers, etc. You can have a look at who you are going to elect now. It may seem the congressional primaries are also becoming a farce.
As you can see, the private server of the Clinton clan contains docs and donors lists of the Democratic committees, PACs, etc. Does it surprise you?
It looks like big banks and corporations agreed to donate to the Democrats a certain percentage of the allocated TARP funds.
I found out something interesting in emails between DNC employees and Hillary Clinton campaign staff. Democrats prepare a new provocation against Trump. After Trump sent his financial report in May it appeared on DNC servers at once. DNC rushed to analyze it and asked the Jones Mandel company to make an effective investigation. I won’t be surprised if some mainstream media like the New York Times or CNN publish soon Trump’s financial docs. No doubt who could give them.
I’d like to warn you that the Democrats may rig the elections on November 8. This may be possible because of the software installed in the FEC networks by the large IT companies.
As I’ve already said, their software is of poor quality, with many holes and vulnerabilities.
I have registered in the FEC electronic system as an independent election observer; so I will monitor that the elections are held honestly.
I also call on other hackers to join me, monitor the elections from inside and inform the U.S. society about the facts of electoral fraud.
Source: https://guccifer2.wordpress.com
Here and here he claims that he's the source of WikiLeaks' DNC documents, something that has gone unreported in the media.
He frequently re-tweets WikiLeaks, just like DCLeaks. He re-tweets and follows conspiracy theory outlets like Alex Jones and Roger Stone, just like DCLeaks followed RT and PressTV. Of course, he sprang back to life two days ago, right before Election Day, to complain about "Democrats rigging the election." I thought he didn't favour any political party?
Source: https://twitter.com/GUCCIFER_2
The Shadow Brokers
Known for leaking the NSA's elite hacking entity's, Equation Group's, cyberweapons.
!! Attention Wealthy Elites !!!
We have final message for “Wealthy Elites”. We know what is wealthy but what is Elites? Elites is making laws protect self and friends, lie and fuck other peoples. Elites is breaking laws, regular peoples go to jail, life ruin, family ruin, but not Elites. Elites is breaking laws, many peoples know Elites guilty, Elites call top friends at law enforcement and government agencies, offer bribes, make promise future handjobs, (but no blowjobs). Elites top friends announce, no law broken, no crime commit. Reporters (not call journalist) make living say write only nice things about Elites, convince dumb cattle, is just politics, everything is awesome, check out our ads and our prostitutes. Then Elites runs for president. Why run for president when already control country like dictatorship? What this have do with fun Cyber Weapons Auction? We want make sure Wealthy Elite recognizes the danger cyber weapons, this message, our auction, poses to their wealth and control. Let us spell out for Elites. Your wealth and control depends on electronic data. You see what “Equation Group” can do. You see what cryptolockers and stuxnet can do. You see free files we give for free. You see attacks on banks and SWIFT in news. Maybe there is Equation Group version of cryptolocker+stuxnet for banks and financial systems? If Equation Group lose control of cyber weapons, who else lose or find cyber weapons? If electronic data go bye bye where leave Wealthy Elites? Maybe with dumb cattle? “Do you feel in charge?” Wealthy Elites, you send bitcoins, you bid in auction, maybe big advantage for you?
Source: https://archive.is/WkT7o#selection-337.0-341.1595
TheShadowBrokers is having special trick or treat for Amerikanskis tonight. But first questions.
Why is DirtyGrandpa threating CIA cyberwar with Russia? Why not threating with NSA or CyberCommand? CIA is cyber B-Team, yes? Where is cyber A-Team? Maybe threating is not being for external propaganda? Maybe is being for internal propaganda? Oldest control trick in book, yes? Waving flag, blaming problems on external sources, not taking responsibility for failures. But neverminding, hacking DNC is way way most important than EquationGroup losing capabilities. Amerikanskis is not knowing USSA cyber capabilities is being screwed? Where is being “free press”? Is ABC, NBC, CBS, FOX negligent in duties of informing Amerikanskis? Guessing “Free Press” is not being “Free as in free beer” or “Free as in free of government influence?
Let us be speaking regarding corruption. If Peoples#1 is having $1.00 and Peoples#2 is having $1000.00 which peoples is having more money? Which peoples is having more spending power? Voter$1 is giving $1 to politician and Voter$1000 is giving $1000 to politician, which voters is having more political power? Is both voters having equal political power? “one person, one vote”? Politicians, lobbyist, media, even SCOTUS (supreme court) is saying this is being true, money is not corrupting. In binary world, maybe. But world is not being binary, is it? What about peoples#3, VoterUndecided? VoterUndecided is giving no moneys and no votes. Politician is needing money for campaign to buy advertising, positive media stories, advisors, pollsters, operatives to be making VoterUndecided vote for politician. Political fundrasing, now which voter is having more political power? VoterUndecided votes for politician and politician wins. Re-election is coming. Government budget decision is required. Voter$1 is wanting politician to be spending taxes on education for making children into great thinkers, leaders, scientists. Voter$1000 is shareholder of defense & intelligence company is wanting politician spending taxes on spying and war to be making benefit self, for great profit. Political favors, now, which voter is having more political power? Did theshadowbrokers lose Amerikanskis? Amerikanskis is still thinking “one person, one vote”? Money isn’t corrupting elections, politics, govenments?
USSA elections is coming! 60% of Amerikansky never voting. Best scenario is meaning half of remaining red or blue fanatics or 20% of the most fanatical is picking USSA government? A great power. A free country. A good-doer. TheShadowBrokers is having suggestion. On November 8th, instead of not voting, maybe be stopping the vote all together? Maybe being grinch who stopped election from coming? Maybe hacking election is being the best idea? #hackelection2016. If peoples is not being hackers, then #disruptelection2016, #disruptcorruption2016. Maybe peoples not be going to work, be finding local polling places and protesting, blocking , disrupting , smashing equipment, tearing up ballots? The wealthy elites is being weakest during elections and transition of power. Is being why USSA is targeting elections in foreign countries. Don’t beleiving? Remembering Iran elections? Rembering stuxnet? Maybe is not Russia hacking election, maybe is being payback from Iran?
Ok peoples theshadowbrokers is promising you a trick or treating, here it is
https://mega.nz/#F!D1Q2EQpD!Lb09shM5XMZsQ_5_E1l4eQ https://yadi.sk/d/NCEyJQsBxrQxz
Password = payus
This is being equation group pitchimpair (redirector) keys, many missions into your networks is/was coming from these ip addresses. Is being unfortunate no peoples is already owning eqgrp_auction_file. Auction file is having tools for to making connect to these pitchimpairs. Maybe tools no more installed? Maybe is being cleaned up? To peoples is being owner of pitchimpair computers, don’t be looking for files, rootkit will self destruct. Be making cold forensic image. @GCHQ @Belgacom TheShadowBrokers is making special effort not to using foul language, bigotry, or making any funny. Be seeing if NBC, ABC, CBS, FOX is making stories about now? Maybe political hacks is being more important?
How bad do you want it to get? When you are ready to make the bleeding stop, payus, so we can move onto the next game. The game where you try to catch us cashing out! Swag us out!
Source: https://medium.com/@shadowbrokerss/message-5-trick-or-treat-e43f946f93e6#.9cfljtkx3
Again, the usual old spiel of brave hackers fighting "USSA"/"Amerikansky" "corruption". It's gotten quite repetitive by now.
Bizarrely, they began posting Bill Clinton and Lorreta Lynch erotic fan fiction at some point:
https://medium.com/@shadowbrokerss/begin-pgp-signed-message-hash-sha1-2a9aa03838a4#.896d0iqpi
submitted by DownWithAssad to geopolitics [link] [comments]

Thoughts on my culminating analysis of Russia's involvement in the U.S elections?

It has been a running theme lately that the U.S. government blaming Russia for the DNC/Podesta leaks is an attempt at deflection and is false. In the past few days, however, some very interesting pieces of information have come out from three different well-respected cybersecurity companies tasked with investigating the leaks or the groups behind these leaks. These companies are CrowsdStrike, Symantec, and SecureWorks. I think it is important that we cast away the media's non-technical analyses and go straight to the source.
The proof is that the hackers used Bitly to mask the malicious URL and trick people into thinking the URL was legitimate. They made two mistakes, however.
First, they accidentally left two of their Bitly accounts public, rather than setting them to private. This allowed security researchers to view some general account information, like what URLs were shortened and what they were changed to.
Second, they used Gmail's official numeric ID for each person inside of their maliciously crafted URLs. This allowed cybersecurity researchers to find out exactly who had been targeted.
The founder of CrowdStrike is a Russian-American and his company has been tasked with investigating the DNC/Podesta leaks. He blames Mother Russia. Relevant excerpts:
Alperovitch is the thirty-six-year-old cofounder of the cybersecurity firm CrowdStrike, and late the previous night, his company had been asked by the Democratic National Committee to investigate a possible breach of its network. A CrowdStrike security expert had sent the DNC a proprietary software package, called Falcon, that monitors the networks of its clients in real time. Falcon "lit up," the email said, within ten seconds of being installed at the DNC: Russia was in the network.
Alperovitch, a slight man with a sharp, quick demeanor, called the analyst who had emailed the report. "Are we sure it's Russia?" he asked.
The analyst said there was no doubt. Falcon had detected malicious software, or malware, that was stealing data and sending it to the same servers that had been used in a 2015 attack on the German Bundestag. The code and techniques used against the DNC resembled those from earlier attacks on the White House and the State Department. The analyst, a former intelligence officer, told Alperovitch that Falcon had identified not one but two Russian intruders: Cozy Bear, a group CrowdStrike's experts believed was affiliated with the FSB, Russia's answer to the CIA; and Fancy Bear, which they had linked to the GRU, Russian military intelligence.
Alperovitch then called Shawn Henry, a tall, bald fifty-four-year-old former executive assistant director at the FBI who is now CrowdStrike's president of services. Henry led a forensics team that retraced the hackers' steps and pieced together the pathology of the breach. Over the next two weeks, they learned that Cozy Bear had been stealing emails from the DNC for more than a year. Fancy Bear, on the other hand, had been in the network for only a few weeks. Its target was the DNC research department, specifically the material that the committee was compiling on Donald Trump and other Republicans. Meanwhile, a CrowdStrike group called the Overwatch team used Falcon to monitor the hackers, a process known as shoulder-surfing.
For the next two days, three CrowdStrike employees worked inside DNC headquarters, replacing the software and setting up new login credentials using what Alperovitch considers to be the most secure means of choosing a password: flipping through the dictionary at random. (After this article was posted online, Alperovitch noted that the passwords included random characters in addition to the words.) The Overwatch team kept an eye on Falcon to ensure there were no new intrusions. On Sunday night, once the operation was complete, Alperovitch took his team to celebrate at the Brazilian steakhouse Fogo de Chão.
...
Aperovitch's June 14 blog post garnered so much media attention that even its ebullient author felt slightly overwhelmed. Inevitably there were questions about the strange names his company had given the Russian hackers. As it happened, "Fancy Bear" and "Cozy Bear" were part of a coding system Alperovitch had created. Animals signified the hackers' country of origin: Russians were bears, Chinese were pandas, Iranians were kittens, and North Koreans were named for the chollima, a mythical winged horse. By company tradition, the analyst who discovers a new hacker gets to choose the first part of the nickname. Cozy Bear got its nickname because the letters coz appeared in its malware code. Fancy Bear, meanwhile, used malware that included the word Sofacy, which reminded the analyst who found it of the Iggy Azalea song "Fancy."
The day after the media maelstrom, the reporters were back with less friendly questions: Had Alperovitch gotten his facts right? Was he certain Russia was behind the DNC hacks? The doubts were prompted by the appearance of a blogger claiming to be from Eastern Europe who called himself Guccifer 2.0. Guccifer said that the breach was his, not Russia's. "DNC'S servers hacked by a lone hacker," he wrote in a blog post that included stolen files from the DNC. "I guess CrowdStrike customers should think twice about company's competence," Guccifer wrote. "Fuck CrowdStrike!!!!!!!!!"
an incorrect attribution in public. "Did we miss something?" he asked CrowdStrike's forensics team. Henry and his staff went back over the evidence, all of which supported their original conclusion.
Alperovitch had also never seen someone claim to be the only intruder on a site. "No hacker goes into the network and does a full forensic investigation," he told me. Being called out, he said, was "very shocking. It was clearly an attack on us as well as on the DNC."
Alperovitch initially thought that the leaks were standard espionage and that Guccifer's attacks on CrowdStrike were just a noisy reaction to being busted. "I thought, Okay, they got really upset that they were caught," he said. But after documents from the DNC continued to leak, Alperovitch decided the situation was far worse than that. He concluded that the Russians wanted to use the leaked files to manipulate U. S. voters—a first. "It hit me that, holy crap, this is an influence operation. They're actually trying to inject themselves into the election," he said. "I believe that we may very well wake up on the morning the day after the election and find statements from Russian adversaries saying, 'Do not trust the result.' "
...
Days later, Alperovitch got a call from a Reuters reporter asking whether the Democratic Congressional Campaign Committee had been hacked. CrowdStrike had, in fact, been working on a breach at the DCCC; once again, Alperovitch believed that Russia was responsible. Now, however, he suspected that only Fancy Bear was involved. A lawyer for the DCCC gave Alperovitch permission to confirm the leak and to name Russia as the suspected author.
Two weeks later, files from the DCCC began to appear on Guccifer 2.0's website. This time he released information about Democratic congressional candidates who were running close races in Florida, Ohio, Illinois, and Pennsylvania. On August 12, he went further, publishing a spreadsheet that included the personal email addresses and phone numbers of nearly two hundred Democratic members of Congress.
...
Alperovitch's friends in government told him privately that an official attribution so close to the election would look political. If the government named Russia, it would be accused of carrying water for Hillary Clinton. The explanations upset Alperovitch. The silence of the American government began to feel both familiar and dangerous. "It doesn't help us if two years from now someone gets indicted," he said. After Michelle Obama's passport was published online, on September 22, Alperovitch threw up his hands in exasperation. "That is Putin giving us the finger," he told me.
Source: The Russian Expat Leading the Fight to Protect America
The guy responsible for ousting Stuxnet as being an American/Israeli cyberworm (no friend of the U.S. government/establishment) also says that his company, Symantec, has found that Russia was responsible for the leaks:
It is pretty clear judging by the indicators of compromise [IOCs]. The binaries that were used to hack the DNC as well as Podesta’s email as well as some other Democratic campaign folks, those IOCs match binaries and also infrastructure that was used in attacks that were previously recorded by others as having Russian origin. That much we can confirm. So if you believe other people’s—primarily government’s—attribution that those previous attacks were Russian, then these attacks are definitely connected. We’re talking about the same binaries, the same tools, the same infrastructure.
We’ve analyzed the tools, the binaries, and the infrastructure that was used in the attack, and from that we can confirm that it’s connected to a group that has two names. One is Sofacy, or “Cozy Bear,” and The Dukes, which is also known as “Fancy Bear.” From the binary analysis point of view, I can tell you that the activities of these attackers have been during Russian working hours, either centered on UTC+3 or UTC+4; they don’t work Russian holidays; they work Monday to Friday; there are language identifiers inside that are Russian; when you look at all the victim profiles they would be in interest to the Russian nation-state. So all of that stuff fits the profile. Now, could all those things be false flags? Sure. Other government entities obviously have come out and said it is the Russian state, and the binary forensics would definitely match that.
There was another attack that happened in the Ukraine. So in December, in the Ukraine, all the power went out to about 260,000 households, or customers. They basically infiltrated the power company, got access to the machines that controlled the power, they flipped the computer switches off and shut down the power, and then they began to wipe all the machines and devices—overriding the hard drives and trashing the machines so that they couldn’t be started up again, or so that the switches couldn’t come on again. Ukrainians were able to get power back after six hours by switching to manual mode. They went off their computer monitor mode and physically flipped the switches to bring the power back up. What’s interesting about that case is the fact that they were more behind technologically actually helped them. Something very similar could easily happen in the U.S. and we’re much more beholden to computing infrastructure here, so our ability to switch to manual mode here would be much more difficult.
Is there linkage between the DNC and Podesta hacks and the 2014 State Department hacks that were also believed to be carried out by Russia?
Yeah, these are being conducted by the same groups. We know that from the IOCs—by looking at the tools they use and the infrastructure they use.
Many of these attacks were happening prior to the nomination of Trump. Based on that theory, people believe that there was a general plan for disruption, and it may be the case now that the easiest and best way to do so is in the manner you speak, but these attacks did not just start happening post-Trump’s nomination. So in that sense, there is a feeling that it’s not a very Trump-specific activity versus an election disruption activity. This is the easiest way for them to disrupt the election.
Source: Cybersecurity Expert: Proof Russia Behind DNC, Podesta Hacks
Another cybersecurity company, SecureWorks, has published some interesting blogposts about all this:
In mid-2015, CTU researchers discovered TG-4127 using the accoounts-google . com domain in spearphishing attacks targeting Google Account users. The domain was used in a phishing URL submitted to Phishtank, a website that allows users to report phishing links (see Figure 1).
Figure 1. Example of accoounts-google . com used in a phishing URL.
Recipients who clicked the link were presented with a fake Google Account login page (see Figure 2). The threat actors could use entered credentials to access the contents of the associated Gmail account.
Figure 2. Fake Google Account login page.
Encoded target details
Analysis of the phishing URL revealed that it includes two Base64-encoded values (see Figure 3). The decoded Base64 values (see Table 1) match the Gmail account and its associated Google Account username. If a target clicks the phishing link, the username field of the displayed fake Google Account login page is prepopulated with the individual’s email address.
Figure 3. Spearphishing URL.
Table 1. Decoded Base64 values from the phishing URL used by TG-4127.
Use of the Bitly URL-shortening service
A Bitly URL was uploaded to Phishtank at almost the same time as the original spearphishing URL (see Figure 4).
Figure 4. Bitly phishing URL submitted at same time as accoounts-google . com phishing URL.
Using a tool on Bitly’s website, CTU researchers determined that the Bitly URL redirected to the original phishing URL (see Figure 5). Analysis of activity associated with the Bitly account used to create the shortened URL revealed that it had been used to create more than 3,000 shortened links used to target more than 1,800 Google Accounts.
Figure 5. Link-shortener page for bit.ly/1PXQ8zP that reveals the full URL.
Target analysis
CTU researchers analyzed the Google Accounts targeted by TG-4127 to gain insight about the targets and the threat group’s intent.
Focus on Russia and former Soviet states
Most of the targeted accounts are linked to intelligence gathering or information control within Russia or former Soviet states. The majority of the activity appears to focus on Russia’s military involvement in eastern Ukraine; for example, the email address targeted by the most phishing attempts (nine) was linked to a spokesperson for the Ukrainian prime minister. Other targets included individuals in political, military, and diplomatic positions in former Soviet states, as well as journalists, human rights organizations, and regional advocacy groups in Russia.
Other targets worldwide
Analysis of targeted individuals outside of Russia and the former Soviet states revealed that they work in a wide range of industry verticals (see Figure 6). The groups can be divided into two broad categories:
TG-4127 likely targeted the groups in the first category because they criticized Russia. The groups in the second category may have information useful to the Russian government.
Figure 6. TG-4127 targeting outside of Russia and former Soviet states.
Authors and journalists
More than half (53%) of the targeted authors and journalists are Russia or Ukraine subject matter experts (see Figure 7). It is likely that the Russian state has an interest in how it is portrayed in the media. U.S.-based military spouses who wrote online content about the military and military families were also targeted. The threat actors may have been attempting to learn about broader military issues in the U.S., or gain operational insight into the military activity of the target’s spouse.
Figure 7. Subject matter expertise of authors and journalists targeted by TG-4127.
Government supply chain
CTU researchers identified individuals who were likely targeted due to their position within the supply chain of organizations of interest to TG-4127 (e.g., defense and government networks). Figure 8 shows the distribution by category. The targets included a systems engineer working on a military simulation tool, a consultant specializing in unmanned aerial systems, an IT security consultant working for NATO, and a director of federal sales for the security arm of a multinational technology company. The threat actors likely aimed to exploit the individuals’ access to and knowledge of government clients’ information.
Figure 8. Categories of supply chain targets.
Government / military personnel
TG-4127 likely targeted current and former military and government personnel for potential operational insight gained from access to their personal communications. Most of the activity focused on individuals based in the U.S. or working in NATO-linked roles (see Figure 9).
Figure 9. Nation or organization of government/military targets.
TG-4127 targeted high-profile Syrian rebel leaders, including a leader of the Syrian National Coalition. Russian forces have supported Syrian President Bashar al-Assad’s regime since September 2015, so it is likely the threat actors are seeking to gain intelligence on rebel forces to assist Russian and Assad regime military operations.
Success of the phishing campaign
CTU researchers analyzed 4,396 phishing URLs sent to 1,881 Google Accounts between March and September, 2015. More than half (59%) of the URLs were accessed, suggesting that the recipients at least opened the phishing page. From the available data, it is not possible to determine how many of those Google Accounts were compromised. Most of the targeted accounts received multiple phishing attempts, which may indicate that previous attempts had been unsuccessful. However, 35% of accounts that accessed the malicious link were not subject to additional attempts, possibly indicating that the compromise was successful.
Of the accounts targeted once, CTU researchers determined that 60% of the recipients clicked the malicious Bitly. Of the accounts that were targeted more than once, 57% of the recipients clicked the malicious link in the repeated attempts. These results likely encourage threat actors to make additional attempts if the initial phishing email is unsuccessful.
Source: Threat Group-4127 Targets Google Accounts
Here's another article by SecureWorks:
Spearphishing details
The short links in the spearphishing emails redirected victims to a TG-4127-controlled URL that spoofed a legitimate Google domain. A Base64-encoded string containing the victim's full email address is passed with this URL, prepopulating a fake Google login page displayed to the victim. If a victim enters their credentials, TG-4127 can establish a session with Google and access the victim's account. The threat actors may be able to keep this session alive and maintain persistent access.
Hillary for America
TG-4127 exploited the Hillary for America campaign's use of Gmail and leveraged campaign employees' expectation of the standard Gmail login page to access their email account. When presented with TG-4127's spoofed login page (see Figure 1), victims might be convinced it was the legitimate login page for their hillaryclinton.com email account.
Figure 1. Example of a TG-4127 fake Google Account login page.
CTU researchers observed the first short links targeting hillaryclinton.com email addresses being created in mid-March 2016; the last link was created in mid-May. During this period, TG-4127 created 213 short links targeting 108 email addresses on the hillaryclinton.com domain. Through open-source research, CTU researchers identified the owners of 66 of the targeted email addresses. There was no open-source footprint for the remaining 42 addresses, suggesting that TG-4127 acquired them from another source, possibly other intelligence activity.
The identified email owners held a wide range of responsibilities within the Hillary for America campaign, extending from senior figures to junior employees and the group mailboxes for various regional offices. Targeted senior figures managed communications and media affairs, policy, speech writing, finance, and travel, while junior figures arranged schedules and travel for Hillary Clinton's campaign trail. Targets held the following titles:
Publicly available Bitly data reveals how many of the short links were clicked, likely by a victim opening a spearphishing email and clicking the link to the fake Gmail login page. Only 20 of the 213 short links have been clicked as of this publication. Eleven of the links were clicked once, four were clicked twice, two were clicked three times, and two were clicked four times.
Democratic National Committee
CTU researchers do not have evidence that these spearphishing emails are connected to the DNC network compromise that was revealed on June 14. However, a coincidence seems unlikely, and CTU researchers suspect that TG-4127 used the spearphishing emails or similar techniques to gain an initial foothold in the DNC network.
Personal email accounts
CTU researchers identified TG-4127 targeting 26 personal gmail.com accounts belonging to individuals linked to the Hillary for America campaign, the DNC, or other aspects of U.S. national politics. Five of the individuals also had a hillaryclinton.com email account that was targeted by TG-4127. Many of these individuals held communications, media, finance, or policy roles. They include the director of speechwriting for Hillary for America and the deputy director office of the chair at the DNC. TG-4127 created 150 short links targeting this group. As of this publication, 40 of the links have been clicked at least once.
Related activity and implications
Although the 2015 campaign did not focus on individuals associated with U.S. politics, open-source evidence suggests that TG-4127 targeted individuals connected to the U.S. White House in early 2015. The threat group also reportedly targeted the German parliament and German Chancellor Angela Merkel's Christian Democratic Union party. CTU researchers have not observed TG-4127 use this technique (using Bitly short links) to target the U.S. Republican party or the other U.S. presidential candidates whose campaigns were active between mid-March and mid-May.
Source: Threat Group-4127 Targets Hillary Clinton Presidential Campaign
Read these two articles for more context:
How Hackers Broke Into John Podesta and Colin Powell’s Gmail Accounts
How Russia Pulled Off the Biggest Election Hack in U.S. History
Guccifer2.0, The Shadow Brokers, and DCLeaks, who have all leaked U.S. documents/cyberweapons, love talking about the "U.S. elite" and "corruption" in America, along with saying "the elections are rigged." I wonder why these people suddenly became so interested in the U.S. election?
Regardless, we know from the Bit.ly victim profiles that Podesta, the DNC, Ukrainian/Russian journalists, Bellingcat and other enemies of Russia were targeted by these groups. This also means that those targeted by DCLeaks and Guccifer2.0 were the same people, and that the aforementioned entities are actually one.
Why would they lie about being separate groups?
Lastly, I have gone through all the public statements made by these groups, by going through their TwitteTumblMedium/WordPress/web posts. Here are some of the comments made by DCLeaks, Guccifer2.0 and The Shadow Brokers. Tell me if you notice a common theme:
DCLeaks
Known for hacking the emails of former Secretary of State Colin Powell and former NATO General Breedlove, as well as Soros' OSF intranet documents.
George Soros is a Hungarian-American business magnate, investor, philanthropist, political activist and author who is of Hungarian-Jewish ancestry and holds dual citizenship. He drives more than 50 global and regional programs and foundations. Soros is named an architect and a sponsor of almost every revolution and coup around the world for the last 25 years. The USA is thought to be a vampire due to him and his puppets, not a lighthouse of freedom and democracy. His minions spill blood of millions and millions of people just to make him even more rich. Soros is an oligarch sponsoring the Democratic party, Hillary Clinton, hundreds of politicians all over the world. This website is designed to let everyone inside George Soros’ Open Society Foundation and related organisations. We present you the workplans, strategies, priorities and other activities of Soros. These documents shed light on one of the most influential network operating worldwide.
Source: http://soros.dcleaks.com
Welcome another cog in the U.S. political and military machine. CAPT Pistole's emails released
documents reveal the billionaire’s attempt to organize a “national movement” to create a federalized police force.
Looks like Clinton's staff doesn't care about security.Wonder from whom did they learn it..
FBI hq is a great place for club meeting especially when Clinton is under investigation
A further look at their Twitter account reveals that they mostly re-tweet WikiLeaks/RT/PressTV, hate Clinton, like Trump, love talking about the email scandal, post conspiracy theories about Mark Zuckerberg, exclusively target Russia's enemies (like former NATO General Breedlove, Soros, Colin Powell, etc,.), defend Russia from being attacked, and have a penchant for focusing on news portraying the U.S. elections/debates as "rigged":
Check the private correspondence between Philip Breedlove and Harlan Ullman
Check restricted documents of George Soros’ Open Society Foundation
Check restricted documents leaked from Hillary Clinton's presidential campaign staff
Emails show Obama saw US involvement in Russia talks as a 'threat'
'Gen. plotted against Obama on Russia'
Check George Soros's OSF plans to counter Russian policy and traditional values
Check Soros internal files
A New McCarthyism: @ggreenwald on Clinton Camp's Attempts to Link @wikileaks, Trump & @DrJillStein to Russia
Source: https://twitter.com/dcleaks_
Guccifer 2.0
Known for hacking the DNC and DCCC.
Together we’ll be able to throw off the political elite, the rich clans that exploit the world!
Fuck the lies and conspirators like DNC!!!
Who inspires me? Not the guys like Rambo or Terminator or any other like them. The world has changed. Assange, Snowden, and Manning are the heroes of the computer age. They struggle for truth and justice; they struggle to make our world better, more honest and clear. People like them make us hope for tomorrow. They are the modern heroes, they make history right now.
Marcel Lazar is another hero of mine. He inspired me and showed me the way. He proved that even the powers that be have weak points.
Anyway it seems that IT-companies and special services can’t realize that people like me act just following their ideas but not for money. They missed the bus with Assange and Snowden, they are not ready to live in the modern world. They are not ready to meet people who are smart and brave, who are eager to fight for their ideals, who can sacrifice themselves for the better future. Working for a boss makes them slow I suppose. Do you need more proof?
don’t want to disappoint anyone, but none of the candidates has my sympathies. Each of them has skeletons in the closet and I think people have a right to know the truth about the politicians.
As for me, I see great differences between Hillary Clinton and Donald Trump. Hillary seems so much false to me, she got all her money from political activities and lobbying, she is a slave of moguls, she is bought and sold. She never had to work hard and never risked everything she had. Her words don’t meet her actions. And her collusion with the DNC turned the primaries into farce.
Opposite to her, Donald Trump has earned his money himself. And at least he is sincere in what he says. His position is straight and clear.
Anyway that doesn’t mean that I support him. I’m totally against his ideas about closing borders and deportation policy. It’s a nonsense, absolute bullshit.
I have nothing to say about Bernie Sanders. It seems he never had a chance to win the nomination as the Democratic Party itself stood against him!
Here are the DCCC docs on Florida: reports, memos, briefings, dossiers, etc. You can have a look at who you are going to elect now. It may seem the congressional primaries are also becoming a farce.
As you can see, the private server of the Clinton clan contains docs and donors lists of the Democratic committees, PACs, etc. Does it surprise you?
It looks like big banks and corporations agreed to donate to the Democrats a certain percentage of the allocated TARP funds.
I found out something interesting in emails between DNC employees and Hillary Clinton campaign staff. Democrats prepare a new provocation against Trump. After Trump sent his financial report in May it appeared on DNC servers at once. DNC rushed to analyze it and asked the Jones Mandel company to make an effective investigation. I won’t be surprised if some mainstream media like the New York Times or CNN publish soon Trump’s financial docs. No doubt who could give them.
I’d like to warn you that the Democrats may rig the elections on November 8. This may be possible because of the software installed in the FEC networks by the large IT companies.
As I’ve already said, their software is of poor quality, with many holes and vulnerabilities.
I have registered in the FEC electronic system as an independent election observer; so I will monitor that the elections are held honestly.
I also call on other hackers to join me, monitor the elections from inside and inform the U.S. society about the facts of electoral fraud.
Source: https://guccifer2.wordpress.com
Here and here he claims that he's the source of WikiLeaks' DNC documents.
He frequently re-tweets WikiLeaks, just like DCLeaks. He re-tweets and follows conspiracy theory outlets like Alex Jones and Roger Stone, just like DCLeaks followed RT and PressTV. Of course, he sprang back to life two days before Election Day, to complain about "Democrats rigging the election." I thought he didn't favour any political party?
Source: https://twitter.com/GUCCIFER_2
The Shadow Brokers
Known for leaking the NSA's elite hacking entity's, Equation Group's, cyberweapons.
!! Attention Wealthy Elites !!!
We have final message for “Wealthy Elites”. We know what is wealthy but what is Elites? Elites is making laws protect self and friends, lie and fuck other peoples. Elites is breaking laws, regular peoples go to jail, life ruin, family ruin, but not Elites. Elites is breaking laws, many peoples know Elites guilty, Elites call top friends at law enforcement and government agencies, offer bribes, make promise future handjobs, (but no blowjobs). Elites top friends announce, no law broken, no crime commit. Reporters (not call journalist) make living say write only nice things about Elites, convince dumb cattle, is just politics, everything is awesome, check out our ads and our prostitutes. Then Elites runs for president. Why run for president when already control country like dictatorship? What this have do with fun Cyber Weapons Auction? We want make sure Wealthy Elite recognizes the danger cyber weapons, this message, our auction, poses to their wealth and control. Let us spell out for Elites. Your wealth and control depends on electronic data. You see what “Equation Group” can do. You see what cryptolockers and stuxnet can do. You see free files we give for free. You see attacks on banks and SWIFT in news. Maybe there is Equation Group version of cryptolocker+stuxnet for banks and financial systems? If Equation Group lose control of cyber weapons, who else lose or find cyber weapons? If electronic data go bye bye where leave Wealthy Elites? Maybe with dumb cattle? “Do you feel in charge?” Wealthy Elites, you send bitcoins, you bid in auction, maybe big advantage for you?
Source: https://archive.is/WkT7o#selection-337.0-341.1595
TheShadowBrokers is having special trick or treat for Amerikanskis tonight. But first questions.
Why is DirtyGrandpa threating CIA cyberwar with Russia? Why not threating with NSA or CyberCommand? CIA is cyber B-Team, yes? Where is cyber A-Team? Maybe threating is not being for external propaganda? Maybe is being for internal propaganda? Oldest control trick in book, yes? Waving flag, blaming problems on external sources, not taking responsibility for failures. But neverminding, hacking DNC is way way most important than EquationGroup losing capabilities. Amerikanskis is not knowing USSA cyber capabilities is being screwed? Where is being “free press”? Is ABC, NBC, CBS, FOX negligent in duties of informing Amerikanskis? Guessing “Free Press” is not being “Free as in free beer” or “Free as in free of government influence?
Let us be speaking regarding corruption. If Peoples#1 is having $1.00 and Peoples#2 is having $1000.00 which peoples is having more money? Which peoples is having more spending power? Voter$1 is giving $1 to politician and Voter$1000 is giving $1000 to politician, which voters is having more political power? Is both voters having equal political power? “one person, one vote”? Politicians, lobbyist, media, even SCOTUS (supreme court) is saying this is being true, money is not corrupting. In binary world, maybe. But world is not being binary, is it? What about peoples#3, VoterUndecided? VoterUndecided is giving no moneys and no votes. Politician is needing money for campaign to buy advertising, positive media stories, advisors, pollsters, operatives to be making VoterUndecided vote for politician. Political fundrasing, now which voter is having more political power? VoterUndecided votes for politician and politician wins. Re-election is coming. Government budget decision is required. Voter$1 is wanting politician to be spending taxes on education for making children into great thinkers, leaders, scientists. Voter$1000 is shareholder of defense & intelligence company is wanting politician spending taxes on spying and war to be making benefit self, for great profit. Political favors, now, which voter is having more political power? Did theshadowbrokers lose Amerikanskis? Amerikanskis is still thinking “one person, one vote”? Money isn’t corrupting elections, politics, govenments?
USSA elections is coming! 60% of Amerikansky never voting. Best scenario is meaning half of remaining red or blue fanatics or 20% of the most fanatical is picking USSA government? A great power. A free country. A good-doer. TheShadowBrokers is having suggestion. On November 8th, instead of not voting, maybe be stopping the vote all together? Maybe being grinch who stopped election from coming? Maybe hacking election is being the best idea? #hackelection2016. If peoples is not being hackers, then #disruptelection2016, #disruptcorruption2016. Maybe peoples not be going to work, be finding local polling places and protesting, blocking , disrupting , smashing equipment, tearing up ballots? The wealthy elites is being weakest during elections and transition of power. Is being why USSA is targeting elections in foreign countries. Don’t beleiving? Remembering Iran elections? Rembering stuxnet? Maybe is not Russia hacking election, maybe is being payback from Iran?
Ok peoples theshadowbrokers is promising you a trick or treating, here it is
https://mega.nz/#F!D1Q2EQpD!Lb09shM5XMZsQ_5_E1l4eQ https://yadi.sk/d/NCEyJQsBxrQxz
Password = payus
This is being equation group pitchimpair (redirector) keys, many missions into your networks is/was coming from these ip addresses. Is being unfortunate no peoples is already owning eqgrp_auction_file. Auction file is having tools for to making connect to these pitchimpairs. Maybe tools no more installed? Maybe is being cleaned up? To peoples is being owner of pitchimpair computers, don’t be looking for files, rootkit will self destruct. Be making cold forensic image. @GCHQ @Belgacom TheShadowBrokers is making special effort not to using foul language, bigotry, or making any funny. Be seeing if NBC, ABC, CBS, FOX is making stories about now? Maybe political hacks is being more important?
How bad do you want it to get? When you are ready to make the bleeding stop, payus, so we can move onto the next game. The game where you try to catch us cashing out! Swag us out!
Source: https://medium.com/@shadowbrokerss/message-5-trick-or-treat-e43f946f93e6#.9cfljtkx3
Again, the usual old spiel of brave hackers fighting "USSA"/"Amerikansky" "corruption". It's gotten quite repetitive by now.
Bizarrely, they began posting Bill Clinton and Lorreta Lynch erotic fan fiction at some point:
https://medium.com/@shadowbrokerss/begin-pgp-signed-message-hash-sha1-2a9aa03838a4#.896d0iqpi
submitted by MangekyouSharinganKa to AskTrumpSupporters [link] [comments]

Powell's Books 800 878 7323. An independent bookseller in Portland, Oregon since 1971, Powell's stocks more than 1.5 million used, new, rare, and out-of-print titles for sale. 100% satisfaction is our goal. Here about 30 popular Popular Reading, Rare Books, Social Science, Used Books sites such as powells.com (Used, New, and Out of Print Books - We Buy and Sell - Powell's Books). The best 3 similar sites: borders.com, stumptowncomics.com, chapters.in... To make finding and purchasing books and audios easier, we have set up an affiliate arrangement with the online store of the world famous independent bookstore, Powell's City of Books. Powells.com carries everything we cover and has prompt and efficient customer service. They also stock a wide assortment of out-of-print and used books. Make money with multiple health affiliate programs and unique offers. This is a two-tier program paying residual commission of 30% on the first tier plus 5% on second tier sales. no minimum payout, unlimited cookies, get paid every 2 weeks. SEO rating for powells.com. On-page Analysis, Page Structure, Backlinks, Competitors and Similar Websites.

[index] [2177] [5229] [13343] [5114] [4658] [9228] [12086] [14654] [9447] [4723]