Jul
09
2023

The Equation Group, Vault 7, and the arrest of Julian Assange for computer hacking and espionage

Last month, Julian Assange, who has been held in Belmarsh prison since being forcibly removed from the Ecuadorian embassy in London in 2019, lost his appeal in the UK’s High Court to reverse the UK government’s decision to extradite him to the USA to face charges of espionage and conspiracy to commit computer intrusion (ref. 1). Assange’s wife, Stella Assange, who is a human rights lawyer, vows to appeal the decision, which would be his final chance in the UK court system to have the extradition ruling overturned. She has also sought the help of the European Court of Human Rights, but it is a long shot since the UK is no longer within the European Union. Separately, Assange himself has written a letter to King Charles III, hoping the king would exercise Royal Prerogative to set him free (ref. 2). I noticed Assange quoted from the King James Bible in his address to King Charles III (ref. 2). This suggests that Assange might be reading the Bible, or at least thinking about becoming a Christian. His wife, Stella, also recently visited the Vatican to meet with the Pope (ref. 3). Unfortunately, Pope Francis is a Jesuit, so he is quite the opposite of a Christian. Pope Francis has been photographed with his right hand inside his jacket, the occult gesture of a Freemason. If Assange is extradited to the USA on charges of espionage and hacking, he could face a penalty of up to 175 years in jail. Therefore, the only hope for Assange is to become a proper Christian.

Jesus saith unto him, I am the way, the truth, and the life…

John 14:6

Only true Christians will be saved. All who are in the USA on the day of the seventh trumpet and vial that are not saved will suffer death and eternal damnation.

Enter ye in at the strait gate: for wide is the gate, and broad is the way, that leadeth to destruction, and many there be which go in thereat: Because strait is the gate, and narrow is the way which leadeth unto life, and few there be that find it.

Matthew 7:13-14

Concerning the charge against Assange, the argument that there was a conspiracy to hack hinges on a brief discussion between a publisher, Julian Assange, and the source, Bradley Manning, about cracking a password, but apparently “the cracking never actually happened” (ref. 4).

For that matter, Manning was pardoned by Barack Obama in 2017, and released, which goes to show that the US government is going after Assange not for leaking war crimes or for conspiring to steal US secrets. Obama, an erstwhile pothead obedient to demons, released Manning because Manning trans-gendered.

And Babylon, the glory of kingdoms, the beauty of the Chaldees’ excellency, shall be as when God overthrew Sodom and Gomorrah. It shall never be inhabited, neither shall it be dwelt in from generation to generation…

Isaiah 13:19-20

There is also the fact that Manning was the one that technically broke US law. If truthful information in the public interest can no longer be published, then there is neither a free press nor freedom of speech.

I should also remind that Julian Assange is an Australian citizen, and he was never on US soil. So, Assange should not be subject to US law. Imagine if somebody here in Australia were to be arrested and renditioned to the USA for simply driving on the left hand side of the road because in the USA the law requires one to drive on the right hand side. It would be absurd. Yet, American law does reach across much of the world and supersedes the laws of many nations. This is so, because in these last days, to all intents and purposes, America reigns over the world like a modern day tower of Babel.

And the woman [Babylon] which thou sawest is that great city, which reigneth over the kings of the earth.

Revelation 17:18

This explains why, despite the Prime Minister of Australia Anthony Albanese saying “enough is enough”, America will continue to persecute Assange.

For a while, I had thought the US government wanted to shut up Wikileaks to deter other whistle-blowers, because details about the American bioweapon SARS-Cov-2, the flu-based virus that causes COVID-19, might come out. Assange was forcibly arrested in April 2019; COVID would happen in December 2019.

Before all that, I had supposed Wikileaks’ revelation to the world about “spirit cooking”, involving John Podesta and Marina Abramovic, through the leaked emails of Hillary Clinton, was the proverbial final straw – spirit cooking being some kind of Satanic ritual disguised as art (ref. 5).

But more recently, I have learnt that the US government – in particular, the CIA – went into a fit of rage when Wikileaks published top secret details about the CIA’s computer hacking tools, codenamed “Vault 7” (ref. 6).

WSJ on Wikileaks and Vault 7

So furious was the CIA, at the time led by Mike Pompeo, that the agency drew up plans to either kidnap or assassinate Julian Assange (ref. 7).

In the Wall Street Journal a few days ago, Richard Muller wrote an article that WWIII will be fought with viruses – both biological and cyber (ref. 8). America is going in this direction because America’s arsenal of biological and cyber weapons is unrivaled.

Cyberwar is a key aspect of warfare today. To understand what malware can do to an adversary, it important to recall Stuxnet, the world’s first digital weapon (ref. 9), a joint effort by Israel’s Unit 8200, and America’s NSA.

Yaniv Hoffman on Stuxnet

Stuxnet was discovered forensically by computer security experts in 2010. Though the Stuxnet worm did find its way onto the Internet, it did not cause damage to computers except for Iran’s PLCs.

After Stuxnet came two other similar cyber weapons, Duqu and Flame. It is conjectured that Flame was also the work of Israeli intelligence, with some assistance from America’s NSA. Flame’s targets were Iran, Syria and the Palestinians. Flame’s purpose was to spy. As a software program, Flame was unusually large (ref. 10). This leads me to think that as far as cyber weapons go, Flame was sophisticated but not top tier.

Yaniv Hoffman on Flame

Duqu, by contrast, is likely the work of the USA (ref. 11). Duqu is also a kind of spyware, what is called a Remote Access Trojan. But Duqu targets industrial control computers and networks, for the sake of bringing down those critical systems when an all out cyberwar begins.

Yaniv Hoffman on Duqu

At this point, it is necessary to bring up “the Equation Group” (ref. 12), the world’s most formidable computer hackers. Their exploits, resources and capabilities are unmatched.

All nation state backed hackers have access to considerable funding, since cyberwar has become a legitimate domain of warfare. But what sets the Equation Group apart is their access to numerous “zero days”. A zero day is an exploit of a vulnerability of a commercial software that no one else knows about.

Notice, Stuxnet had four zero days, and all four involved Microsoft Windows. One might have been bad luck on the part of Microsoft. Two, incompetence. But four, betrays a conspiracy. What is more, these vulnerabilities are so severe that they allow the attacker to subvert and takeover the entire system, in some instances even giving the attacker access to the OS kernel.

It is impossible that a company with the resources and experience of Microsoft can continue, version after version, year after year, to produce software that is filled with these kinds of vulnerabilities. After some point, one must question whether they are doing this on purpose, in collaboration with the US government.

Zero Days trailer

Apart from Microsoft, there is Apple. Russia’s FSB recently accused Apple of collaborating with US Intelligence to hack iPhones in Russia (ref. 13).

There is also the fact that Apple controls the processor chip of their computers as well as the OS re-installation process. So, if Apple wanted to, they could, at will, turn an expensive Mac into a useless brick – what amounts to property damage and theft!

Returning to the Equation Group, another mind boggling thing that they can do is re-program the firmware of a hard drive so that their code and data can be put into a hidden part of the disk that neither the drive nor the operating system can see (ref. 14). As a consequence, their malware can survive a disk format and operating system re-installation. This means, once a computer is usurped, it is under their control forever.

David Pakman on NSA’s hacking of disk drives

Likewise, they can create a hidden area on a USB stick to persist some secret code and data there, in order to keep a malicious worm alive.

They can also hijack the boot process and load their programs into RAM so that there is no trace of their presence forensically.

As for injecting executable code via USBs, I think it is high time for computer hardware engineers to come up with a different solution to the USB. That USBs must do plug-and-play as well as data storage means USB was always a lousy idea.

The exploiting of Bluetooth and Wifi is also a thing. Here, the hackers will make a computer that the user assumes is offline to go online, communicating through a secret channel that they have set up.

They also have a keylogger, codename Grok, which in theory would render Linux sudo-based security pointless.

It is well known that Internet cables can be tapped, and covert implants can be installed in routers and mobile towers. The reason why the Five Eyes did not want China’s Huawei in telecoms infrastructure is because quite likely they themselves do this sort of thing.

Speaking of man in the middle attacks, the Equation Group is reported to have even interdicted hardware deliveries so that a computer purchased online can be implanted with a secret chip or with malware before it reaches its destination. Probably, they have even implanted agents in retail stores so that a computer purchased offline can also be rigged.

The Equation Group and the NSA’s “Tailored Access Operations” are probably one and the same. TAO is America’s offensive hacking unit that serves the US Department of Defence.

One misstep of the Equation Group was to pick a fight with Kaspersky, after Kaspersky had discovered their activities forensically. Though now a multinational based in London, Kaspersky began as an anti-virus company in Russia. The Equation Group’s ongoing cyberwar with the Kaspersky organisation means Russia is well aware of what America can do.

Of course, prophetically, Russia’s military computer systems cannot be disrupted or ruined through a cyberwar attack, through the likes of the Equation Group, because the word of God is that on the day of the LORD, Babylon is to be carpet bombed into oblivion.

From thence she seeketh the prey, and her eyes behold afar off.

Job 39:29

About Russia, I would like to also draw your attention to the marvelous escape of Edward Snowden. The details of his escape are presented in the one hour long 2015 documentary “Terminal F” (ref. 15).

Terminal F (2015) – 1 hr long documentary

First, at the crucial moment the USA got Snowden’s full name wrong on the Hong Kong paperwork. Second, the USA decided to cancel Snowden’s passport precisely when he was physically at Moscow airport. Third, the USA decided to force the landing of the plane of President Evo Morales of Bolivia. All of that make it clear that Snowden owes his escape to God (ref. 15): either God himself was involved or one of his angels.

Remember, Snowden wanted to go to Bolivia, South America. This was the advice of Julian Assange and Wikileaks. But South America is rife with CIA. Indeed, Assange has come to learn the hard way that Ecuador was never safe from the reach of the CIA.

So, Snowden’s escape to Russia was a literal miracle. Snowden’s task, I suppose, was to blow the whistle on America’s NSA.

Remember, God sees everything and knows everything, including Babylon’s secrets.

For thou hast trusted in they wickedness: thou hast said, None seeth me. Thy wisdom and thy knowledge, it hath perverted thee; and thou has said in thine heart, I am, and none else beside me.

Isaiah 47:10

America thinks that it is on top of the world and invincible – that it can do things that others cannot.

In time, America will be punished by God.

And it shall come to pass in that day, that the LORD shall punish the host of the high ones that are on high, and the kings of the earth upon the earth. And they shall be gathered together, as prisoners are gathered in the pit [hell], and shall be shut up in the prison, and after many days shall they be visited.

Isaiah 24:21-22

All who stand with the Devil will fall with the Devil. This applies to angels as well as humans.

One day, the meaning of John 8:32 will be recovered from the CIA.

And ye shall know the truth, and the truth shall make you free.

John 8:32

I also like Snowden’s quote about the NSA’s fear of light: “I have been to the darkest corners of government, and what they fear is light.”


References:

1. Chris Pollard and Rebecca Camber (9 June 2023), “Julian Assange loses his appeal against extradition to the US on espionage charges”, dailymail.co.uk

2. Caitlin Cassidy(6 May 2023), “Julian Assange writes letter to King Charles and urges him to visit Belmarsh prison”, theguardian.com

3. AP (1 Jul 2023), “Pope Francis holds meeting with Julian Assange’s wife”, theguardian.com

4. Micah Lee (30 September 2020), “Crumbling case against Assange shows weakness of hacking charges related to whistleblowing”, theintercept.com

5. Benjamin Lee (5 November 2016), “Marina Abramovic mention in Podesta emails sparks accusations of satanism”, theguardian.com

6. “Wikileaks Vault 7: What’s in the CIA Hacking Toolbox?”, youtube.com/watch?v=X45Bb8O-gMI

7. Michael Isikoff and Jennifer Robinson (28 September 2021), “The Plot to Kill Julian Assange: Report Reveals CIA’s Plan to Kidnap, Assassinate WikiLeaks Founder”, democracynow.org

8. Richard Muller (6 July 2023), “World War III Will Be Fought With Viruses”, wsj.com

9. “Stuxnet zero days”, youtube.com/watch?v=Np3kXExcHp8

10. “Flame malware virus”, youtube.com/watch?v=GllYYwosJX8

11. “Duqu malware”, youtube.com/watch?v=bSp926XdHK4

12. Dan Goodin (17 February 2015), “How omnipotent hackers tied to NSA hid for 14 years—and were found at last”, arstechnica.com

13. Guy Faulconbridge (2 June 2023), “Russia says US hacked thousands of Apple phones in spy plot”, reuters.com

14. “NSA Has Figured Out How to Hide Spy Software Deep Within Hard Drives”, youtube.com/watch?v=0eFNOoZu2QE

15. Terminal F (2015), youtube.com/watch?v=Nd6qN167wKo