Posted by: Puddy Dunne | May 12, 2017

NSA CIA Deep State Cyber False Flag


When the Russia Election Hack loses steam, the FBI head gets shown the door, the third stage begins. Mr Drumpf, the big brother of all surveillance drops a “Watergate” bomb. The TAPES. Meanwhile the NSA, CIA and Deep State operatives immediately get on the next chess move.   A False Flag Cyber attack.

SPECIAL: Wikileaks Vault 7 CIA Cyber Dabbling — and False Flag Cyber Attacks Blamed on Russia UPDATE 2

Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA). The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force — its own substantial fleet of hackers.

The Snowden, Assange, CIA, NSA game continues with the perfect TRIAD for advancing the 1984 scenario. There are more tentacles on this Octopus than SPECTRE had. From FISA to CISPA, from Patriot Act to INGSOC, the game changer is coming. This appears to be a beta test for what could come as the October Surprise and another Black Monday.


WHAT WE KNOW: Nothing!


Wiki Leaks unveils Operation UMBRAGE

Well the CIA got caught with their pants down once again by Wiki Leaks. This time it comes in the form of 8,761 documents and files that were leaked in the first part of a series of leaks.For this article, we are going to look at the biggest piece of the leak. That is operation UMBRAGE. Below is directly from Wiki Leaks what operation UMBRAGE is.


CIA Training Handbook: How to Fake Intelligence Plus Case Study on Faking Russians Hacking US ELECTIONS

What an elaborate SPY vs SPY game we are witnessing.  What has taken years of setup and scripting is moving into hyper mode now. The SPECTRE game is on. Every agency and player a possible deep state member of the Organization.

So we can follow this latest episode of the reality show called TRUMP. This particular TRIAD ought to be called TRUMP DUMP MEDIA HUMP AND SHEEPLE STUMP.


I think I may call this full spectrum dominance and surveillance dialectic, Confucker. It’s the best tool for NWO transformation next to the financial crash.  While the Russia Hack and Election Fraud scam begins to lose it’s impact on the masses, the cyber terror by the SPECTRE group will carry a huge amount of force to shift the TOTAL AWARENESS SURVEILLANCE and BIG BROTHER  administration towards the ultimate mark of the beast scenario.  Buying, selling and trade, your banking cashless bitcoin con moves ahead and before you know it, you are a terrorist if you own an iPhone, Laptop or android device that isn’t embedded and programmed by the authorities.

Jeff Sessions want’s stiffer penalties, Donald wants to eliminate press conferences and questions by public news agencies, CIA want’s more power and the NSA just lies over and over regarding citizen warrantless spying.  Is the path not clear yet? Pull and re-read your copy of 1984 and watch some of the Holyrood productions like Enemy of the State, Eagle Eye, A Scanner Darkly, Minority Report and dozens of other predictive programming films.

As Trump pushes this nation state, terror group, inside job operation, we will be bombarded by MSM, Alt Right and Alternate news all under the Global Governance cabal and all designed to create the endless conspiracy by a plethora of hacking backers, but they will never tell you it’s all of them. All of them inside the most private eye and with tentacles in every nation state, every terror organization and every US agency.   There are 7 billion people on this planet and we will be conquered by a group that may have less than 300 members. The rest of the enablers will do what they are told.  As we move closer to the big event, the climax of this production, the information will be less and less visible, the lines blurrier and the sound increasingly distorted. You are just going to have to draw your own conclusion. All I guarantee is your worst nightmare.

The NSA never gets robbed. They just loan stuff.




    Confusion Epitaph – fate of mankind in hands of fools

  2. A real “cluster” they’re creating. They’re so creative…they build stuff, steal stuff to destroy. Psychos.

  3. Watching the vortex numbers from outlets begins with 74 countries: There’s the 11 in 9-11. This starts me off on the staged event. For years I have considered Nigeria as hacker base one.South Africa operation.

    Like WikiLeaks, the Vault 7 is a managed “limited hangout” like Snowden. When Holyrood agent Ollie Stone made his movie, that about confirmed the snowjob being perpetrated by the committee.

    When the MIT boys try new exploits it only deflects the PROMIS rule. Build the application with the vulnerabilities built in. China may not be willing to comply.
    But I presume they have worked out the agreement. China always wanted the technology for themselves only. I’d call it merely a survival decision. DC sees it as a tool for comliance, blackmail, extortion, assassination and survival.

    Confucker is a Kido, the jokes on us. (backdoor)

    Many think Apple was safe haven. Maybe up to Steve Jobs death but that’s over. Many think Linux distros are safe. Ha! Foolish. EAGLE EYE a world micro mesh network system with speed of light and D-Wave processing. When you have the the freezer of Space based microprocessing and GPS global grid, there are no limitations to the power.

    I think that was Kubricks monolith, the place where 2001 meets 2017. Now with 5 eyes transition to nine eyes, the eyes have it. TOTAL AWARENESS. What SKYFALL and SPECTRE told us is that CIA, FBI and the rest are all at risk. The Criminals are spying on the spies.

    Keep in mind that the AI will process the information in an enterprise layered system. Only agencies will access certain info and deep state access will only have eyes on the total information. Eventually the system goes fully online and the surveillance will track, record, arrest, trial and execute everything. Being ties into the MARK of the BEAST is simple to force compliance. If you don’t pay the fine you don’t get to sell. If you don’t opt in, you die. How? Well your driverless car plows into a bridge barrier at 80 MPH, of course.

    We’ve seen all the beta tests before Michael Hastings to Miriam Carey and even this example: Aubrey McClendon, Cheasapeake Energy who was quite likely Donald Trumps first assassination.

    Now here’s an example of acciedental

  4. Ransomware plagues 75k computers across 99 countries – NSA exploit blamed
    RT Psyop

    The impact the cyberattack had on hospitals raised greatest concerns

    First we get the incompetence of NSA, next the hacking done by nation state (Russia) and then we get the alt-wrong focus on terrorists. The synthesis of sentient psyops will bring the surveillance state to a nightmare that the sheeple will demand. Financial, Medical, Political, Social, Psychological information all at risk.

    Dump it now or contaminate your info and patterns. Make your own persona (fake) profile and a new strawman.

  5. #57 The meaning of the number and the Sentient Psyop.

    90 percent of the UK’s NHS is still relying on Windows XP

    Guess what device they suggest for security?

    How the TRIAD dialectc cretes Wealth Distribution while giving you the PROMIS revelation. How Vault 7 gives you the fake news and drives you into the boxes of identity and management. It’s very very personal.

  6. Set your watch!

    TRUMP- Slight of “Hand”

    Trump signs executive order on cybersecurity, White House now runs the show
    Promises to hold agency heads responsible for slipups

    for every tick their tocks.

    [President Donald Trump has signed his long-promised executive order on cybersecurity – and it says the executive branch will take overall command of securing America’s critical IT systems.

    During his campaign, Trump promised a missive on cybersecurity within 90 days of taking office, but delayed the signing in late January. Now, 111 days after swearing to protect and uphold the constitution of the United States, the order has been signed, and it signals that Trump intends his staff to take command.]

    The JESUIT takeover is almost completed. The committee left right DC criminals know the drill.

  7. Infowars and Drudge fake news centers are on the game and it will be a Jesuit based psyop from the go.

    Hollywood Presbyterian Medical Center – a perfect Joo-joo target

  8. Shadow Brokers aka “SPECTRE”

    Here comes the “GLOBAL POLICE” or “TASK FARCE”

    [In a statement, Europol’s European Cybercrime Centre, known as EC3, said the attack ‘is at an unprecedented level and will require a complex international investigation to identify the culprits.’

    EC3 says its Joint Cybercrime Action Taskforce, made up of experts in high-tech crime, ‘is specially designed to assist in such investigations and will play an important role in supporting the investigation.’

    The attack, which has locked up computers and held users’ files for ransom, is believed the biggest of its kind ever recorded.

    It used code developed by the US National Security Agency which was leaked online last month by a mysterious group called the Shadow Brokers.

    The culprits are still unknown but it is understood criminal gangs will be investigated and it is likely Russia – which suffered the most from the attack – will form a large part of the inquiry.]

    Read more:
    Follow us: @MailOnline on Twitter | DailyMail on Facebook

    This ought to take the steam out of FBI Clinton Trump investigations and Russia’s hacking. You think? Russia the biggest victim? Please spare me this staged bullshit.


    How you move to a global secure BITCOIN cashless society and make money doing it.

    Ransomware payouts ‘heading for $1bn a year’- Naked Security

    [If you’re thinking that some folks are beginning to think of payoffs as a nearly inevitable “cost of doing business,” you’re not alone. That aligns perfectly with another phenomenon we’ve noticed: organizations who haven’t been hit yet, but are setting up bitcoin accounts “just in case”.]

    Look at this group of IBM ex-pimps Medallion and Renaissance Technologies in the video above (Society being Programmed by a black box) The octopus of SPECTRE rears it’s tentacles and fake news and legal propaganda via the repeal of Smith – Mundt and NDAA. Now TRUMP and the Jesuits move it closer to global props and the whole enchilada is nothing but fake news, extortion, bribery, blackmail and a protection racket run by the deep state infiltrators into every crevasse of agency.

    You can’t scrip better treatments in Hollywood. Don’t blink, you might miss the truth which passes through the vortex in nano-seconds and is erased or sequested under the D-Wave Enterprises.

  10. This may be a premature but I would watch carefully the counterfeiting angle for this cashless mover and keep tabs on the bitcoin scam. I would reject anybody promoting bitcoin or other crypto-coin.

    But this is the perfect segue into the TRIAD that will generate the DC criminals and Joo-joo scumbags in their attempt to destroy cash. If the north Korean Superdollar 100 dollar notes strikes again or another top quality CIA issue then I will know what’s what.

    Police warn Fort Wayne retailers of fake currency

  11. #57 – HAARP ASSAULT – Shallow Strong Earthquake

    Deadly earthquake strikes the Iran / Turkmenistan border region – May 13, 2017
    Most important Earthquake Data:

    Magnitude : 5.7

    Local Time (conversion only below land) : 2017-05-13 22:31:00

    GMT/UTC Time : 2017-05-13 18:01:00

    Depth (Hypocenter) : 10 km (Scalar attack depth)

    Depth and Magnitude updates in the list below.

  12. Trigonometry – MK Ultra via Vortex Triangulation chords – electromagnetic visual audio networking


Leave a Reply

Please log in using one of these methods to post your comment: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s


%d bloggers like this: