Butlincat's blog...a seeker of the truth, the whole truth, and nothing but the truth...

“As long as justice is postponed we always stand on the verge of these darker nights of social disruption.” - so said Martin Luther King Jr. in a speech on March 14, 1968, just three weeks before he was assassinated.

Edward Snowden: “I don’t want to live in a society that does these sort of things… I do not want to live in a world where everything I do and say is recorded.”

...hello + welcome!....FAIR USE NOTICE: This site may contain copyrighted (© ) material. Such material is made available to advance understanding of ecological, political, human rights, economic, democracy, scientific, moral, ethical, and social justice issues. This constitutes a 'fair use' of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, this material is distributed for analysis, commentary, educational and intellectual purposes. In some cases comedy and parody have been recognized as fair use.

Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License..... For more information please visit:

http://www.law.cornell.edu/uscode/text/17/107

See also: VICTIMS OF THE STATE https://butlincat.com/

This blog is for for regular updates + info connected to recent UFO sightings, ALIEN RACES, ILLUMINATI, 911, 7/7, CHEMTRAILS, MORGELLONS [98% OF WORLDS POPULATION HAS MORGELLONS DISEASE], MIND CONTROL {MK ULTRA.MANNEQUIN etc.}, ELECTRONIC SURVEILLANCE, JOHN LEAR, ALEX COLLIER, PROJECT CAMELOT, PROJECT AVALON, MICHAEL TSARION, JORDAN MAXWELL, PRESTON NICHOLS, AL BIELEK, STEWART SWERDELOW, DUNCAN CAMERON, WILLIAM COOPER, PHIL SCHNEIDER, David Wilcock, FRITZ SPRINGMEIER, BILLY MEIER, MAX IGAN, STEW WEBB, "Democracy Now!", Henry Makow, Linda Moulton-Howe, Dan Burisch, Webster Tarpley, Brother Nathaniel, Timothy Good, Miles Johnson, Jim Marrs, John Hutchison, Wikileaks, Julian Assange, Dr. John Hall, Edward Snowden, Vladimir Putin, John Lennon, Bob Zimmerman + many more who can only be described as heroes...

Wordpress: VICTIMS OF THE STATE https://butlincat.com/

Twitter: http://www.twitter.com/butlincat

facebook: https://www.facebook.com/#!/butlin.cat.9

"Do not be deceived, God is not mocked; for whatever a man sows, this he will also reap." Galatians 6:7

......Namaste.....John Graham - butlincat

Jai guru deva om जय गुरुदेव ॐ











Saturday, 18 March 2017

WIKILEAKS UPDATES 18 MARCH 2017 - EXACTLY HOW AGENCIES SPY, TRUMPS $1.5BN FOR CYBER-SECURITY


NEWS





Of course there are strings attached to WikiLeaks' act of goodwill
It looks like WIkiLeaks' promise to work with tech companies to fix their security vulnerabilities may come with a few strings attached after all. In a move ...
Google Plus Facebook Twitter Flag as irrelevant



How Russia and WikiLeaks Became Allies Against the West
Then, on March 7, WikiLeaks released “Vault 7,” a trove of documents detailing CIA surveillance and cyber warfare capabilities. Among its many ...
Google Plus Facebook Twitter Flag as irrelevant



Once and for all: Podesta Emails Were NOT Released By RT Before Wikileaks
During the interview, Caplin made a charge against Wikileaks that has often been repeated -- especially on Maddow's show -- but is misleading at ...
Google Plus Facebook Twitter Flag as irrelevant





Brazile Defends Wikileaks Scandal: 'You Want to Make Sure That Those Questions' Are 'Out There'
Thursday on Comedy Central's The Daily Show, former DNC chair and ex-CNN analyst Donna Brazile appeared to talk about her time as chair and ...
Google Plus Facebook Twitter Flag as irrelevant



Pamela Anderson Shares Topless Instagram Pic And WikiLeaks Julian Assange Love
Now, Anderson has been sharing her love for WikiLeaks founder Julian Assange, calling him “sexy.” The former Baywatch star also recently shared ...
Google Plus Facebook Twitter Flag as irrelevant



House Democrat says Trump may have leaked government secrets
The president may have been referring to the recent publishing of what are alleged to be CIA documents and hacking tools by the website WikiLeaks.
Google Plus Facebook Twitter Flag as irrelevant



Rants & Raves
Wikileaks is the enemy of American democracy. To use Wikileaks as justification of political views or positions is asinine. Wikileaks is in collusion with ...
Google Plus Facebook Twitter Flag as irrelevant





Trump Alludes To NSA Wiretap Of Merkel: "We Have Something In Common, Perhaps"
At a joint press conference with Angela Merkel at the White House on Friday, President Trump alluded to the time WikiLeaks revealed President ...
Google Plus Facebook Twitter Flag as irrelevant






Brazile Defends Giving Questions to Clinton: 'Want to Make Sure That Those Questions' Are 'Out ...
Brazile then blamed the Russians and Wikileaks for Clinton losing the election, saying how “tough” it was to “navigate” Clinton's campaign after ...
Google Plus Facebook Twitter Flag as irrelevant



Trump announces $1.5bn for cyber-security and critical infrastructure
It was not long after WikiLeaks hosted a massive leak, taken from inside the Democratic National Committee in the heat of an already spicy ...
Google Plus Facebook Twitter Flag as irrelevant



How Likely Are Remote Car Hacks? Car Makers Respond
The CIA documents leaked by WikiLeaks recently seemed to have shown that the intelligence agency may be able to take control of cars remotely, ...
Google Plus Facebook Twitter Flag as irrelevant



Did Trump accidentally leak classified information? President says 'CIA was hacked' during Obama ...
The CIA has not confirmed the documents released by WikiLeaks were CIA documents, but experts have said that they appear to be authentic.
Google Plus Facebook Twitter Flag as irrelevant



So What Is New On Apple's iOS 10.3 Beta 7?
Again, this points back to the recent WikiLeaks document suggesting the government's lead intelligence agency, the CIA, has the technology to bypass ...
Google Plus Facebook Twitter Flag as irrelevant





Latest videos
Spring cleaning applies to more than just sorting out your home. Use these apps to clear out the clutter, from physical items to digital... Play video.
Google Plus Facebook Twitter Flag as irrelevant



Susan Says: Was Orwell Right?
If WikiLeaks is correct, the DHS (Department of Homeland Security) has taken the definition of reasonable to new heights. Or maybe I should say new ...
Google Plus Facebook Twitter Flag as irrelevant



Tenta For Android Protects All Your Browsing Data From The CIA And Other Hackers
WikiLeaks' Vault 7 opened eyes wider to the possibility of being hacked and spied on by the government. Former NSA contractor Edward Snowden ...
Google Plus Facebook Twitter Flag as irrelevant



Part 2: No evidence of Roger Stone's collaboration with 'Guccifer 2.0'; 'Low confidence' of Russian ...
WikiLeaks recent publication of CIA-related documents suggest the CIA has the capability of creating a false path of evidence by planting “fingerprints” ...
Google Plus Facebook Twitter Flag as irrelevant



WikiLeaks ayudará a firmas tecnológicas hackeadas por la CIA
Wikileaks publicará todos los archivos sobre el arsenal cibernético de la Agencia Central de Inteligencia (CIA estadunidense), sugirió este jueves el ...
Google Plus Facebook Twitter Flag as irrelevant



New Poll Shows Bernie Sanders Is Most Liked Politician
The bottom five results were Donald Trump (-9), Paul Ryan (-10), Wikileaks (-15), ... Wikileaks received a 0 net favorability rating by Republicans.
Google Plus Facebook Twitter Flag as irrelevant



How to stop your smart devices from spying on you
A new WikiLeaks release may affect you personally. Thanks to the rogue info-dumping network, Americans have now learned that the CIA can easily ...

WikiLeaks Vault 7: Here's exactly how

agencies spy on you

Jay FayzaRebel Columnist 
It is said that within the Soviet Union, one out people people [typo?...ed.] — that’s 20 per cent — were informants or agents working on behalf of the central government



Today, we have automated machines and unmanned drones that do the dirty work, for groups like the NSA and CIA.

Take your laptop, as an example.
For most people, the form of protection they use is a password or a series of passwords. But an automated machine can go through millions of password combinations, and then access most of your personal information, especially if you use the same password for more than one login.
As we’ve recently found out with Wikileaks’s Vault 7 document release,

government agencies don’t necessarily need to hack into your laptop any more; they either hack into the databases of various companies that store your password, or compel the company to change their encryption so that they can have access to it.
The FBI tried to do that to Apple in 2016, even taking them to court. Thankfully, Apple chose not to compel with the FBI. But, unfortunately, it’s rumoured that the government can already hack into the company's servers as well as the technology itself.

Another method of mass surveillance involves using unmanned drones for warrantless domestic spying.

These unmanned drones can have IMSI-catchers attached to them that pick up the signals from your phone heading towards radio towers.
Everyone’s phone has a SIM chip that carries the user’s basic information. Imsi-catchers act like middlemen between you and the cell phone tower by sending out louder electrical signals that disrupt your connection. They then are able to not only listen in on your conversations, but also track where you’re going.
If there’s an established connection between you and the IMSI-catcher, it’s difficult to shake them off, especially if they’re using a drone. Other carriers of IMSI-catchers can be cars and motorcycles.

It’s pretty easy to get your hands on one. Most American law enforcement departments have an IMSI-catcher.

A number of top US government agencies utilize hacking software systems and unmanned drones. The most famous agencies, of course, are the NSA and CIA, but other agencies include FBI, DIA(or Defense Intelligence Agency) and the DHS.

Automated hacking softwares and unmanned drones are the two most glaring methods of mass surveillance. There are other methods of mass surveillance, of course, and, as tech increases and government protection of your rights decreases this problem will only get worse.