Last month, Julian Assange, who has been held in Belmarsh prison since being forcibly removed from the Ecuadorian embassy in London in 2019, lost his appeal in the UK’s High Court to reverse the UK government’s decision to extradite him to the USA to face charges of espionage and conspiracy to commit computer intrusion (ref. 1). Assange’s wife, Stella Assange, who is a human rights lawyer, vows to appeal the decision, which would be his final chance in the UK court system to have the extradition ruling overturned. She has also sought the help of the European Court of Human Rights, but it is a long shot since the UK is no longer within the European Union. Separately, Assange himself has written a letter to King Charles III, hoping the king would exercise Royal Prerogative to set him free (ref. 2). Sarcasm was perhaps not the way to go, because in the future, once Babylon is no more, this king, or another after him, will make the entire realm of the UK Christian once more. Still, it is most interesting that Assange quoted from the King James Bible in his address to King Charles III (ref. 2). This suggests that Assange might be reading the Bible, or at least thinking about becoming a Christian. I noticed also his wife, Stella, recently visited the Vatican to meet with the Pope (ref. 3). Truth be told, Pope Francis is a Jesuit, and as such he is quite the opposite of a Christian. Pope Francis has even been photographed with his right hand inside his jacket, the occult gesture of a Freemason. If Assange is extradited to the USA on charges of espionage and hacking, he could face a penalty of up to 175 years in jail. Therefore, to be born again and to have life on the coming day of the LORD, the day of Babylon’s utter annihilation, Assange must become a Christian.
Jesus saith unto him, I am the way, the truth, and the life…John 14:6
Only true Christians will be saved. All who are in the USA on the day of the seventh trumpet and vial that are not saved will suffer death and then eternal damnation.
Enter ye in at the strait gate: for wide is the gate, and broad is the way, that leadeth to destruction, and many there be which go in thereat: Because strait is the gate, and narrow is the way which leadeth unto life, and few there be that find it.Matthew 7:13-14
Now, to the charge against Assange for computer hacking. It is said, the legal case against Assange for hacking or computer intrusion is weak. The argument that there was a conspiracy to hack hinges on a brief discussion between a publisher, Julian Assange, and source, Bradley Manning, about cracking a password, but apparently “the cracking never actually happened” (ref. 4). For that matter, Manning was pardoned by Barack Obama in 2017, and released, which goes to show that the US government is going after Assange not for leaking war crimes or for conspiring with Manning to steal US secrets. Obama, an erstwhile pothead and therefore obedient to demons, released Manning because Manning trans-gendered.
And Babylon, the glory of kingdoms, the beauty of the Chaldees’ excellency, shall be as when God overthrew Sodom and Gomorrah. It shall never be inhabited, neither shall it be dwelt in from generation to generation…Isaiah 13:19-20
There is also the matter of journalism. Manning was the one who technically broke US law. If truthful information in the public interest can no longer be published, then there is neither a free press nor freedom of speech.
I should also add here that Julian Assange is an Australian citizen, and therefore he should not be subject to US law. Imagine if somebody here in Australia were to be arrested and renditioned to the USA for simply driving on the left hand side of the road because in the USA the law requires one to drive on the right hand side of the road. It is absurd. Yet American law does reach across much of the world and supersedes the laws of many nations. This is so, because in these last days essentially America reigns over the world as a one-world government, a modern day tower of Babel.
And the woman [Babylon] which thou sawest is that great city, which reigneth over the kings of the earth.Revelation 17:18
This also explains why, despite the Prime Minister of Australia Anthony Albanese saying “enough is enough” in regard to Assange, America will continue to persecute Assange.
For a while, I had thought the US government wanted to shut up Wikileaks to deter other whistle-blowers, because details about the American bioweapon SARS-Cov-2, the flu-based virus that causes COVID-19, might eventually come out. Assange was forcibly arrested in April 2019; COVID would happen in December 2019.
Before that I had supposed Wikileaks’ revelation to the world about “spirit cooking”, involving John Podesta and Marina Abramovic, through the leaked emails of Hillary Clinton, was the proverbial final straw – spirit cooking being some kind of Satanic ritual disguised as art (ref. 5).
But more recently, I have learnt that the US government – in particular, the CIA – went into a fit of rage when Wikileaks published top secret details about the CIA’s computer hacking tools, codenamed “Vault 7” (ref. 6).
So furious was the CIA, at the time led by Mike Pompeo, that the agency drew up plans to either kidnap or assassinate Julian Assange (ref. 7).
To my mind, the leaking of spyware and malware developed by the US government for the purpose of cyberwar is the primary reason why America wants Assange.
In the Wall Street Journal a few days ago, Richard Muller wrote an article that WWIII will be fought with viruses – both biological and cyber (ref. 8). American strategic analysts are thinking this way and trying to go in this direction because America’s arsenal of biological and cyber weapons is unrivaled.
Cyberwar is one of the key domains of warfare today. To understand what malware can do to an adversary, it important to recall Stuxnet, the world’s first cyberwar digital weapon (ref. 9), a joint effort by Israel’s Unit 8200, an Intelligence Corps unit of the IDF, and America’s NSA. Stuxnet was discovered forensically by computer security experts in 2010.
Though the Stuxnet worm did find its way onto the Internet, it did not cause damage to computers except for Iran’s PLCs because this cyber weapon was developed and deployed responsibly.
After Stuxnet came two other similar cyber weapons, Duqu and Flame. It is conjectured that Flame was also the work of Israeli intelligence with some assistance from America’s NSA, because Flame’s targets were Iran, Syria and the Palestinians. Flame’s purpose is to spy. Furthermore, as a software program, Flame is unusually large (ref. 10). This leads me to think that as far as cyber weapons go, Flame is sophisticated but not top tier.
Duqu, by contrast, was more likely the work of the USA (ref. 11). Duqu is also a kind of spyware, what is called a remote access trojan. But Duqu targets industrial control computers and networks, I suppose, for the sake of bringing down those critical systems when an all out cyberwar begins.
At this point, it is necessary to bring up “the Equation Group” (ref. 12). According to cyber-security experts, the Equation Group is the world’s most formidable group of computer hackers. Their exploits, resources and capabilities are unmatched.
All nation state backed hackers have access to considerable funding, since cyberwar has become a legitimate domain of warfare. But what sets the Equation Group apart is their access to numerous “zero days”. A zero day is an exploit of a vulnerability of a commercial software that no one else knows about.
Notice, Stuxnet had four zero days, and all four involved Microsoft Windows.
One might have been bad luck on the part of Microsoft. Two, incompetence. But four, betrays a conspiracy.
What is more, these vulnerabilities are so severe that they allow the attacker to subvert and takeover the entire system, in some instances even giving the attacker access to the OS kernel.
It is impossible that a company with the resources and experience of Microsoft can continue, version after version, year after year, to produce software that is filled with catastrophic vulnerabilities. After some point, one must question whether they are doing this on purpose, in collaboration with the US government.
Beside Microsoft, there is Apple. Russia’s FSB recently accused Apple of collaborating with US Intelligence to hack iPhones in Russia (ref. 13).
There is also the fact that Apple controls the processor chip of their computers as well as the OS re-installation process. So, if Apple wanted to, they could at will turn an expensive Mac into a useless brick – what amounts to property damage and theft.
Returning to the Equation Group, another mind boggling thing that they can do is re-program the firmware of a hard drive so that their code and data can be put into a hidden part of the disk that neither the drive nor the operating system can see (ref. 14). As a consequence, their malware can survive a disk format and operating system re-installation. This means, once a computer is usurped, it is under their control forever.
Likewise, they can create a hidden area on a USB stick to persist some secret code and data there, in order to keep a malicious worm alive.
It is said, these hackers can also hijack the boot process and load their programs into RAM so that there is no trace of their presence forensically.
As for injecting executable code via USBs, I think it is high time for computer hardware engineers to come up with a different solution to the USB. That USBs must do plug-and-play as well as data storage means USB was always a lousy idea.
The exploiting of Bluetooth and Wifi is also a thing. Here, the hackers will make a computer that the user assumes is offline to go online, communicating through a secret channel that they have set up. I think vendors must begin to offer computers without the hardware for bluetooth and the hardware for wifi.
They also have a keylogger, codename Grok, which in theory would render Linux sudo-based security pointless.
It is not news that Internet cables can be tapped, and covert implants can be installed in routers and mobile towers. The reason why the Five Eyes did not want China’s Huawei in telecoms infrastructure is because in all likelihood they themselves do this sort of thing.
Speaking of man in the middle attacks, the Equation Group is reported to have even interdicted hardware deliveries so that a computer purchased online can be implanted with a secret chip or with malware before it reaches its destination. Probably, they have even implanted agents in retail stores so that a computer purchased offline can equally be rigged.
Now, “the Equation Group” is a name that Kaspersky Security gave them. It could be that these hackers are a special branch of the NSA itself, America’s National Security Agency. The NSA has a unit called “Tailored Access Operations”, an offensive hacking unit that serves the US Department of Defence.
One of the mistakes that the Equation Group made was to pick a fight with Kaspersky, after Kaspersky discovered their activities forensically. Though now a multinational based in London, Kaspersky began as an anti-virus company in Russia. The Equation Group’s ongoing cyberwar with the Kaspersky organisation means Russia is well aware of what America can do.
Needless to say, prophetically, Russia’s military computer systems cannot be disrupted or ruined through a cyberwar attack, through the likes of the Equation Group, because the word of God is that on the day of the LORD, Babylon is to be carpet bombed into oblivion.
From thence she seeketh the prey, and her eyes behold afar off.Job 39:29
About Russia, I should also draw your attention to the marvelous escape of Edward Snowden. The details of his escape are presented in the one hour long 2015 documentary “Terminal F” (ref. 15).
First, at the crucial moment the USA got Snowden’s full name wrong on the Hong Kong paperwork. Second, the USA decided to cancel Snowden’s passport precisely when he was physically in Moscow airport. Third, the USA decided to force the landing of the plane of President Evo Morales of Bolivia. All of that make it clear that Snowden owes his escape to God (ref. 15): either God himself was involved or one of his angels.
Remember, Snowden wanted to go to Bolivia, South America. This was the advice of Julian Assange and Wikileaks. But of course South America is America’s backyard, rife with CIA. Indeed, Assange has come to learn the hard way that Ecuador was never safe from the reach of the CIA.
So, Snowden’s escape to Russia was a literal miracle. Snowden’s task, I suppose, was to blow the whistle on America’s NSA.
Remember, God sees everything and knows everything. About Babylon, the Bible reads the following:
For thou hast trusted in they wickedness: thou hast said, None seeth me. Thy wisdom and thy knowledge, it hath perverted thee; and thou has said in thine heart, I am, and none else beside me.Isaiah 47:10
America thinks that it is on top of the world and invincible – that it can do things that others cannot.
In time, America will be punished by God.
And it shall come to pass in that day, that the LORD shall punish the host of the high ones that are on high, and the kings of the earth upon the earth. And they shall be gathered together, as prisoners are gathered in the pit [hell], and shall be shut up in the prison, and after many days shall they be visited.Isaiah 24:21-22
All who stand with the Devil will fall with the Devil. This applies to angels as well as humans.
Furthermore, in time, the meaning of John 8:32 shall be recovered from the CIA.
And ye shall know the truth, and the truth shall make you free.John 8:32
I also like Snowden’s quote about the NSA’s fear of light: “I have been to the darkest corners of government, and what they fear is light.”
1. Chris Pollard and Rebecca Camber (9 June 2023), “Julian Assange loses his appeal against extradition to the US on espionage charges”, dailymail.co.uk
2. Caitlin Cassidy(6 May 2023), “Julian Assange writes letter to King Charles and urges him to visit Belmarsh prison”, theguardian.com
3. AP (1 Jul 2023), “Pope Francis holds meeting with Julian Assange’s wife”, theguardian.com
4. Micah Lee (30 September 2020), “Crumbling case against Assange shows weakness of hacking charges related to whistleblowing”, theintercept.com
5. Benjamin Lee (5 November 2016), “Marina Abramovic mention in Podesta emails sparks accusations of satanism”, theguardian.com
6. “Wikileaks Vault 7: What’s in the CIA Hacking Toolbox?”, youtube.com/watch?v=X45Bb8O-gMI
7. Michael Isikoff and Jennifer Robinson (28 September 2021), “The Plot to Kill Julian Assange: Report Reveals CIA’s Plan to Kidnap, Assassinate WikiLeaks Founder”, democracynow.org
8. Richard Muller (6 July 2023), “World War III Will Be Fought With Viruses”, wsj.com
9. “Stuxnet zero days”, youtube.com/watch?v=Np3kXExcHp8
10. “Flame malware virus”, youtube.com/watch?v=GllYYwosJX8
11. “Duqu malware”, youtube.com/watch?v=bSp926XdHK4
12. Dan Goodin (17 February 2015), “How omnipotent hackers tied to NSA hid for 14 years—and were found at last”, arstechnica.com
13. Guy Faulconbridge (2 June 2023), “Russia says US hacked thousands of Apple phones in spy plot”, reuters.com
14. “NSA Has Figured Out How to Hide Spy Software Deep Within Hard Drives”, youtube.com/watch?v=0eFNOoZu2QE
15. Terminal F (2015), youtube.com/watch?v=Nd6qN167wKo