home.social

#calea — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #calea, aggregated by home.social.

  1. Trump Disbands Cybersecurity Board Investigating Massive Chinese Phone System Hack (“the worst hack in US history”).

    > While some have speculated that this move is an attempt to cover up the extent of the breach or even deliberately assist the Chinese, a more likely explanation is simple incompetence

    techdirt.com/2025/01/23/trump-

    #calea #csrb

  2. Trump Disbands Cybersecurity Board Investigating Massive Chinese Phone System Hack (“the worst hack in US history”).

    > While some have speculated that this move is an attempt to cover up the extent of the breach or even deliberately assist the Chinese, a more likely explanation is simple incompetence

    techdirt.com/2025/01/23/trump-

    #calea #csrb

  3. Trump Disbands Cybersecurity Board Investigating Massive Chinese Phone System Hack (“the worst hack in US history”).

    > While some have speculated that this move is an attempt to cover up the extent of the breach or even deliberately assist the Chinese, a more likely explanation is simple incompetence

    techdirt.com/2025/01/23/trump-

    #calea #csrb

  4. Trump Disbands Cybersecurity Board Investigating Massive Chinese Phone System Hack (“the worst hack in US history”).

    > While some have speculated that this move is an attempt to cover up the extent of the breach or even deliberately assist the Chinese, a more likely explanation is simple incompetence

    techdirt.com/2025/01/23/trump-

    #calea #csrb

  5. In the future the 1975 Church Committee hearings will replay in the 2020's and the findings will prove to be even worse in public hearings especially when the domestic #AMER from #Meta's #GangStalker forum #databreach hits the front pages of the domestic / international #news with the same response as per Meta usual.

    #CALEA ☣️🔍👀 #Malware #audits ☣️🔍👀

    #RTDNA #TorturePrograms #Meta ☣️ #StateSponsoredMalware ☣️ #CALEAMalware ☣️ #GreyMarket ☣️ #investigations ☣️ 🔍👀👀

    Don't forget the ♻️📨📥📲 #HistoryLoops #APnews 🔍👀👀

    #SIC 🤝 #HIC 🤝 ⚖️ 🤝 👨‍⚖️🤝👩‍⚖️🤝📰

  6. In the future the 1975 Church Committee hearings will replay in the 2020's and the findings will prove to be even worse in public hearings especially when the domestic #AMER from #Meta's #GangStalker forum #databreach hits the front pages of the domestic / international #news with the same response as per Meta usual.

    #CALEA ☣️🔍👀 #Malware #audits ☣️🔍👀

    #RTDNA #TorturePrograms #Meta ☣️ #StateSponsoredMalware ☣️ #CALEAMalware ☣️ #GreyMarket ☣️ #investigations ☣️ 🔍👀👀

    Don't forget the ♻️📨📥📲 #HistoryLoops #APnews 🔍👀👀

    #SIC 🤝 #HIC 🤝 ⚖️ 🤝 👨‍⚖️🤝👩‍⚖️🤝📰

  7. In the future the 1975 Church Committee hearings will replay in the 2020's and the findings will prove to be even worse in public hearings especially when the domestic #AMER from #Meta's #GangStalker forum #databreach hits the front pages of the domestic / international #news with the same response as per Meta usual.

    #CALEA ☣️🔍👀 #Malware #audits ☣️🔍👀

    #RTDNA #TorturePrograms #Meta ☣️ #StateSponsoredMalware ☣️ #CALEAMalware ☣️ #GreyMarket ☣️ #investigations ☣️ 🔍👀👀

    Don't forget the ♻️📨📥📲 #HistoryLoops #APnews 🔍👀👀

    #SIC 🤝 #HIC 🤝 ⚖️ 🤝 👨‍⚖️🤝👩‍⚖️🤝📰

  8. In the future the 1975 Church Committee hearings will replay in the 2020's and the findings will prove to be even worse in public hearings especially when the domestic #AMER from #Meta's #GangStalker forum #databreach hits the front pages of the domestic / international #news with the same response as per Meta usual.

    #CALEA ☣️🔍👀 #Malware #audits ☣️🔍👀

    #RTDNA #TorturePrograms #Meta ☣️ #StateSponsoredMalware ☣️ #CALEAMalware ☣️ #GreyMarket ☣️ #investigations ☣️ 🔍👀👀

    Don't forget the ♻️📨📥📲 #HistoryLoops #APnews 🔍👀👀

    #SIC 🤝 #HIC 🤝 ⚖️ 🤝 👨‍⚖️🤝👩‍⚖️🤝📰

  9. In the future the 1975 Church Committee hearings will replay in the 2020's and the findings will prove to be even worse in public hearings especially when the domestic #AMER from #Meta's #GangStalker forum #databreach hits the front pages of the domestic / international #news with the same response as per Meta usual.

    #CALEA ☣️🔍👀 #Malware #audits ☣️🔍👀

    #RTDNA #TorturePrograms #Meta ☣️ #StateSponsoredMalware ☣️ #CALEAMalware ☣️ #GreyMarket ☣️ #investigations ☣️ 🔍👀👀

    Don't forget the ♻️📨📥📲 #HistoryLoops #APnews 🔍👀👀

    #SIC 🤝 #HIC 🤝 ⚖️ 🤝 👨‍⚖️🤝👩‍⚖️🤝📰

  10. Wouldn't it be #weird when they find out that #GammaGroup's #FinFisher #FinSpy Finsky was found to be responsible for the ' #spying ' & #financial crimes & #miniWatergate break in's coordinated on #Meta since it's installed on 100's of Millions of clients... or nah?

    #infosec #StateSponsoredMalware #CALEAmalware #CALEA #GreyMarket #investigatons 🔍🧐

  11. CW: #Twitter update : #malware🤝#infosec - Twitter❄️🤝 #uspol news 🤝 #racists

    So went to check on #Twitter today...

    Ohhhh what a meltdown over there in the alt-Reich ❄️ flake land after the #uspol announcement today.

    ¹ The racists were out in force outing themselves, again, 💯

    ² The Zero Posting bots were out doing the usual, following anything to pump up the number of accounts

    ³ Increasing calls for violence against the opposite side of the aisle

    ⁴ Documented another Twitter IP big ole #malware node with #GammaGroup's #FinFisher #FinSpy I had Documented before as a phishing and malware spreader node

    Fun times? Nah. Lame. ¯\_(ツ)_/¯

    ⁵ Added a old meme about Twitter
    ❄️🤝🙅‍♂️🤝📰 Cites as a meme. 😂
    Still funny. 💯🤗

    #malware #Twitter #GammaGroup #FinFisher #FinSpy #Finsky #CALEAmalware #CALEA #GreyMarket #investigations #RTNDA #infosec #NotNews #news

    #VirusTotal
    virustotal.com/graph/embed/gf0

  12. #GammaGroup #FinFisher #FinSpy #SystemApp callback caught #CALEA #malware #GreyMarket #investigations

    💻🤝☣️🤝🤳 🎣🔍🧐

    on #BunnyNet's CDN from #DataPacket

    Interesting vectors... Quite the pointers this scan. Was scanned last 1yr ago. Showed up as malicious. Scans clean now except for the #malware found as a #GammaGroup shim caught nao. 🎣

    Caught a bit o' Meta also in the callback graph. Huh.

    #VirusTotal
    virustotal.com/graph/embed/g7e

  13. CW: #GammaGroup #FinFisher #FinSpy #SystemApp callback list of hosts / shims on IPs LARGE LIST

    Historical list of #SystemApp callback to #FinFisher clients logged while on #InfoseceXchange that's good for #tcpdump correlation #investigations in #AMER on these IPs LARGE LIST hosting since November 2022ish for #Prosecutors to correlate.

    #FinFisherCom🤝#EnemyOfTheInternet

    #CALEA #greymarket #CALEAmalware 🔍🧐#infosec

    ¹
    40.115.118.6

    ²
    40.115.117.30

    ³ (fast .ly)
    151.101.41.184


    172.56.140.14


    173.194.166.106


    173.194.166.106


    199.232.92.157

    ⁸ Twitter
    104.244.42.66


    151.101.190.110

    ¹⁰
    138.91.55.166

    ¹¹
    192.229.173.16

    ¹² Twitter
    104.244.42.139

    ¹³
    173.194.166.171

    ¹⁴
    152.199.24.185

    ¹⁵
    165.254.198.210

    ¹⁶ Fast .ly
    151.101.42.2

    ¹⁷ Twitter
    104.244.42.70

    ¹⁸ Fast .ly
    151.101.40.193

    ¹⁹ Twitter
    104.244.42.134

    ²⁰ Fast .ly
    151.101.40.84

    ²¹
    216.239.34.117

    ²²
    104.26.2.192

    ²³
    104.26.3.192

    ²⁴
    172.67.72.251

    ²⁵
    redirect.redhat.com

    ²⁶
    192.229.210.163

    ²⁷
    172.67.28.154

    ²⁸
    104.18.10.19

    ²⁹
    104.244.42.69

    ³⁰
    944ellb0102-vip01.blackmesh.com

    ³¹
    151.101.41.67

    ³² Fast .ly
    151.101.40.81

    ³³
    104.26.10.153

    ³⁴
    151.101.41.188

    ³⁵
    104.26.13.149

    ³⁶
    104.26.12.149

    ³⁷
    63.241.199.113

    ³⁸ Local ISP exploit try ip (private)
    192.0.66.2

    ³⁹
    162.159.153.4

    ⁴⁰
    104.18.16.202

    ⁴¹
    104.26.3.29

    ⁴²
    104.26.2.29

    ⁴³ NYC Twitter
    72.21.91.70

    ⁴⁴ Fast .ly
    151.101.2.187

    ⁴⁵ Fast .ly
    151.101.66.187

    ⁴⁶
    13.86.218.255

    ⁴⁷
    209.234.235.188

    ⁴⁸
    104.26.15.185

    ⁴⁹
    172.67.69.125

    ⁵⁰
    52.239.139.228

    ⁵¹
    104.17.83.11

    ⁵²
    104.17.32.62

    ⁵³
    104.244.42.130

    ⁵⁴
    20.189.172.0

    ⁵⁵
    172.67.222.28

    ⁵⁶
    151.101.41.73

    ⁵⁷
    13.86.218.248

    ⁵⁸
    104.27.203.89

    ⁵⁹
    104.16.13.194

    ⁶⁰
    104.244.42.133

    ⁶¹
    151.101.130.132

    ⁶²
    172.67.73.80

    ⁶³
    104.26.6.15

    ⁶⁴
    104.22.33.123

    ⁶⁵
    dns11.quad9.net

    ⁶⁶
    104.244.42.198

    ⁶⁷
    104.244.42.2

    ⁶⁸
    104.244.43.131

    ⁶⁹
    208.54.152.122

    ⁷⁰
    208.54.150.98

    ⁷¹
    52.236.40.36

    ⁷²
    104.18.23.15

    ⁷³
    104.26.1.5

    ⁷⁴
    172.67.71.43

    ⁷⁵
    199.232.93.184

    ⁷⁶
    151.101.2.217

    ⁷⁷
    199.232.92.81

    ⁷⁸
    104.26.0.5

    ⁷⁹
    151.101.130.217

    ⁸⁰
    151.101.66.217

    ⁸¹
    104.26.6.18

    ⁸²
    104.18.22.15

    ⁸³
    104.26.7.18

    ⁸⁴
    104.21.78.132

    ⁸⁵
    104.244.42.6

    ⁸⁶
    199.232.92.200

    ⁸⁷
    20.60.40.36

    ⁸⁸
    52.245.40.74

    ⁸⁹
    104.244.42.194

    ⁹⁰
    199.232.94.110

    ⁹¹
    172.67.72.57

    ⁹²
    192.229.173.16

    ⁹³
    104.244.42.193

    ⁹⁴
    208.54.106.98

    ⁹⁵
    104.244.42.65

    ⁹⁶
    104.244.42.193

    ⁹⁷
    151.101.67.52

    ⁹⁸
    104.244.42.3

    ⁹⁹
    151.101.67.52

    ¹⁰⁰
    104.244.42.1

    ¹⁰¹
    192.229.173.16

    ¹⁰²
    151.101.40.159

    ¹⁰³
    104.244.42.11

    ¹⁰⁴
    152.199.24.185

    ¹⁰⁵
    152.199.24.185

    This is just # attaccc nodes for the past two years I have logged as #FinFisher shims/proxies/nodes. Every single one of these tried a MITM attaccc & multiple other OTS exploits. They were blocked and logged.

    Cities:
    ¹
    reddit.com/r/netzpolitik/comme

    ²
    en.wikipedia.org/wiki/FinFishe

    ³
    spiegel.de/netzwelt/netzpoliti


    netzpolitik.org/2022/nach-pfae


    securityweek.com/german-author


    bloomberg.com/news/articles/20

    #RTDNA #StateSponsoredMalware#SSM#malware

  14. CW: #GammaGroup #FinFisher #FinSpy #SystemApp callback list of hosts / shims on #CloudFront
  15. CW: #GammaGroup #FinFisher #FinSpy #SystemApp callback list of hosts / shims on #akamai

    Historical list of #SystemApp callback to #FinFisher clients logged while on #InfoseceXchange that's good for #tcpdump correlation #investigations in #AMER on #akamai hosting since November 2022ish for #Prosecutors to correlate.

    #FinFisherCom🤝#EnemyOfTheInternet

    #CALEA #greymarket #CALEAmalware 🔍🧐#infosec

    ¹
    a23-2-76-180.deploy.static.akamaitechnologies.com

    ²
    a96-7-153-84.deploy.static.akamaitechnologies.com

    ³
    a104-86-4-102.deploy.static.akamaitechnologies.com


    a184-31-10-236.deploy.static.akamaitechnologies.com


    a96-6-226-157.deploy.static.akamaitechnologies.com


    a23-50-34-13.deploy.static.akamaitechnologies.com


    a23-15-137-146.deploy.static.akamaitechnologies.com


    a23-213-123-78.deploy.static.akamaitechnologies.com


    a23-213-123-78.deploy.static.akamaitechnologies.com

    ¹⁰
    a23-11-22-101.deploy.static.akamaitechnologies.com

    ¹¹
    a23-59-206-230.deploy.static.akamaitechnologies.com

    ¹²
    a104-125-55-184.deploy.static.akamaitechnologies.com

    ¹³
    a23-78-154-233.deploy.static.akamaitechnologies.com

    ¹⁴
    a23-7-132-30.deploy.static.akamaitechnologies.com

    ¹⁵
    a104-86-104-224.deploy.static.akamaitechnologies.com

    ¹⁶
    a104-122-42-39.deploy.static.akamaitechnologies.com

    ¹⁷
    a23-202-60-225.deploy.static.akamaitechnologies.com

    ¹⁸
    a104-86-184-250.deploy.static.akamaitechnologies.com

    ¹⁹
    a184-51-48-250.deploy.static.akamaitechnologies.com

    ²⁰
    a104-121-159-217.deploy.static.akamaitechnologies.com

    ²¹
    a104-121-159-225.deploy.static.akamaitechnologies.com

    ²²
    a104-84-227-133.deploy.static.akamaitechnologies.com

    ²³
    a23-42-151-231.deploy.static.akamaitechnologies.com

    ²⁴
    a23-40-167-73.deploy.static.akamaitechnologies.com

    ²⁵
    a23-223-16-122.deploy.static.akamaitechnologies.com

    ²⁶
    a184-31-10-237.deploy.static.akamaitechnologies.com

    ²⁷
    a23-48-32-80.deploy.static.akamaitechnologies.com

    ²⁸
    a23-48-32-75.deploy.static.akamaitechnologies.com

    ²⁹
    a173-222-162-31.deploy.static.akamaitechnologies.com

    ³⁰
    a23-45-32-210.deploy.static.akamaitechnologies.com

    ³¹
    a184-30-164-84.deploy.static.akamaitechnologies.com

    ³²
    a23-59-200-173.deploy.static.akamaitechnologies.com

    ³³
    a23-43-191-224.deploy.static.akamaitechnologies.com

    This is just #akamai attaccc nodes for the past two years I have logged as #FinFisher shims/proxies/nodes. Every single one of these tried a MITM attaccc & multiple other OTS exploits. They were blocked and logged.

    Cities:
    ¹
    reddit.com/r/netzpolitik/comme

    ²
    en.wikipedia.org/wiki/FinFishe

    ³
    spiegel.de/netzwelt/netzpoliti


    netzpolitik.org/2022/nach-pfae


    securityweek.com/german-author


    bloomberg.com/news/articles/20

    #RTDNA #StateSponsoredMalware#SSM#malware

  16. CW: #GammaGroup #FinFisher #FinSpy #SystemApp callback list of hosts / shims on #Google

    Historical list of #SystemApp callback to #FinFisher clients logged while on #InfoseceXchange that's good for #tcpdump correlation #investigations in #AMER on #Google hosting since November 2022ish for #Prosecutors to correlate.

    #FinFisherCom🤝#EnemyOfTheInternet

    #CALEA #greymarket #CALEAmalware 🔍🧐#infosec

    ¹
    sfo07s13-in-f174.1e100.net

    ²
    159.240.178.107.bc.googleusercontent.com

    ³
    25.25.190.35.bc.googleusercontent.com


    51.241.186.35.bc.googleusercontent.com


    183.34.211.130.bc.googleusercontent.com


    173.194.166.198


    74.125.166.169


    173.194.166.106


    173.194.167.9

    ¹⁰
    142.250.138.97

    ¹¹
    142.250.138.95

    ¹²
    142.250.138.94

    ¹³
    142.250.114.97

    ¹⁴
    142.250.138.100

    ¹⁵
    142.250.138.101

    ¹⁶
    142.250.138.138

    ¹⁷
    142.250.138.139

    ¹⁸
    142.250.138.113

    ¹⁹
    142.250.114.95

    ²⁰
    142.250.138.102

    ²¹
    sfo07s16-in-f78.1e100.net

    ²²
    dns.google

    ²³
    74.125.20.94

    ²⁴
    142.250.101.188

    ²⁵
    172.253.112.188

    ²⁶
    238.105.188.35.bc.googleusercontent.com

    ²⁷
    sfo03s26-in-f10.1e100.net

    ²⁷
    sfo03s25-in-f10.1e100.net

    ²⁸
    sfo03s24-in-f10.1e100.net

    ²⁹
    nuq04s45-in-f10.1e100.net

    ³⁰
    sfo03s27-in-f10.1e100.net

    ³¹
    sfo03s21-in-f10.1e100.net

    ³²
    nuq04s42-in-f10.1e100.net

    ³³
    nuq04s39-in-f10.1e100.net

    ³⁴
    sfo03s18-in-f10.1e100.net

    ³⁵
    142.250.176.10

    ³⁶
    lax17s50-in-f3.1e100.net

    ³⁷
    sfo03s33-in-f10.1e100.net

    ³⁸
    142.251.46.163

    This is just #Google attaccc nodes for the past two years I have logged as #FinFisher shims/proxies/nodes. Every single one of these tried a MITM attaccc & multiple other OTS exploits. They were blocked and logged.

    Cities:
    ¹
    reddit.com/r/netzpolitik/comme

    ²
    en.wikipedia.org/wiki/FinFishe

    ³
    spiegel.de/netzwelt/netzpoliti


    netzpolitik.org/2022/nach-pfae


    securityweek.com/german-author


    bloomberg.com/news/articles/20

    #RTDNA #StateSponsoredMalware#SSM#malware

  17. CW: #GammaGroup #FinFisher #FinSpy #SystemApp callback list of hosts / shims on #AWS

    Historical list of #SystemApp callback to #FinFisher clients logged while on #InfoseceXchange that's good for #tcpdump correlation #investigations in #AMER & #EU on #AWS hosting since November 2022ish for #Prosecutors to correlate.

    #FinFisherCom🤝#EnemyOfTheInternet

    #CALEA #greymarket #CALEAmalware 🔍🧐#infosec

    ¹
    ec2-52-25-170-148.us-west-2.compute.amazonaws.com

    ²
    ec2-52-42-61-176.us-west-2.compute.amazonaws.com

    ³
    ec2-52-25-170-148.us-west-2.compute.amazonaws.com


    ec2-44-236-58-13.us-west-2.compute.amazonaws.com


    ec2-44-240-164-68.us-west-2.compute.amazonaws.com


    ec2-52-41-118-210.us-west-2.compute.amazonaws.com


    ec2-52-35-177-24.us-west-2.compute.amazonaws.com


    35.82.205.248


    ec2-54-191-45-53.us-west-2.compute.amazonaws.com

    ¹⁰
    ec2-44-241-110-131.us-west-2.compute.amazonaws.com

    ¹¹
    ec2-35-82-235-74.us-west-2.compute.amazonaws.com

    ¹²
    ec2-54-68-18-200.us-west-2.compute.amazonaws.com

    ¹³
    ec2-54-184-79-208.us-west-2.compute.amazonaws.com

    ¹⁴
    ec2-52-10-247-144.us-west-2.compute.amazonaws.com

    ¹⁵
    ec2-54-186-72-30.us-west-2.compute.amazonaws.com

    ¹⁶
    ec2-13-234-145-166.ap-south-1.compute.amazonaws.com

    ¹⁷
    ec2-52-21-175-83.compute-1.amazonaws.com

    ¹⁸
    ec2-44-229-72-171.us-west-2.compute.amazonaws.com

    ¹⁹
    ec2-44-230-23-250.us-west-2.compute.amazonaws.com

    ²⁰
    ec2-52-20-36-26.compute-1.amazonaws.com

    ²¹
    ec2-52-204-216-203.compute-1.amazonaws.com

    ²²
    ec2-13-235-220-86.ap-south-1.compute.amazonaws.com

    ²³
    ec2-18-235-29-229.compute-1.amazonaws.com

    ²⁴
    ec2-15-207-179-172.ap-south-1.compute.amazonaws.com

    ²⁵
    ec2-176-34-188-147.eu-west-1.compute.amazonaws.com

    ²⁶
    ec2-176-34-188-143.eu-west-1.compute.amazonaws.com

    ²⁷
    ec2-18-218-105-211.us-east-2.compute.amazonaws.com

    ²⁸
    ec2-3-21-177-140.us-east-2.compute.amazonaws.com

    ²⁹
    ec2-34-205-198-58.compute-1.amazonaws.com

    ³⁰
    ec2-3-20-61-88.us-east-2.compute.amazonaws.com

    ³¹
    ec2-13-59-255-164.us-east-2.compute.amazonaws.com

    ³²
    ec2-3-221-252-182.compute-1.amazonaws.com

    ³³
    ec2-54-236-219-191.compute-1.amazonaws.com

    ³⁴
    ec2-18-156-155-177.eu-central-1.compute.amazonaws.com

    ³⁵
    ec2-34-212-53-52.us-west-2.compute.amazonaws.com

    ³⁶
    ec2-54-246-112-81.eu-west-1.compute.amazonaws.com

    ³⁷
    ec2-54-217-236-154.eu-west-1.compute.amazonaws.com

    ³⁸
    ec2-46-137-158-3.eu-west-1.compute.amazonaws.com

    ³⁹
    ec2-176-34-105-145.eu-west-1.compute.amazonaws.com

    ⁴⁰
    ec2-52-0-252-134.compute-1.amazonaws.com

    ⁴¹
    ec2-176-34-123-171.eu-west-1.compute.amazonaws.com

    ⁴²
    ec2-54-228-232-250.eu-west-1.compute.amazonaws.com

    ⁴³
    ec2-54-217-245-217.eu-west-1.compute.amazonaws.com

    ⁴⁴
    ec2-52-0-252-1.compute-1.amazonaws.com

    ⁴⁵
    ec2-52-0-252-3.compute-1.amazonaws.com

    ⁴⁶
    ec2-52-0-252-2.compute-1.amazonaws.com

    ⁴⁷
    ec2-54-246-123-138.eu-west-1.compute.amazonaws.com

    ⁴⁸
    ec2-54-191-65-148.us-west-2.compute.amazonaws.com

    This is just #AWS attaccc nodes for the past two years I have logged as #FinFisher shims/proxies/nodes. Every single one of these tried a MITM attaccc & multiple other OTS exploits. They were blocked and logged.

    Cities:
    ¹
    reddit.com/r/netzpolitik/comme

    ²
    en.wikipedia.org/wiki/FinFishe

    ³
    spiegel.de/netzwelt/netzpoliti


    netzpolitik.org/2022/nach-pfae


    securityweek.com/german-author


    bloomberg.com/news/articles/20

    #RTDNA #StateSponsoredMalware#SSM#malware

  18. CW: #GammaGroup #FinFisher #FinSpy #SystemApp callback list of hosts / shims on #BunnyNet via #DataPacket

    Historical list of #SystemApp callback to #FinFisher clients logged while on #InfoseceXchange that's good for #tcpdump correlation #investigations in #Germany on the CDN #DataPacket hosting the #BunnyNet since November 2022ish for #GermanProsecutors to correlate.

    #FinFisherCom🤝#EnemyOfTheInternet

    #CALEA #greymarket #CALEAmalware 🔍🧐#infosec

    ¹
    143-244-49-183.bunnyinfra.net

    ²
    143-244-50-83.bunnyinfra.net

    ³
    169.150.221.147


    143-244-50-88.bunnyinfra.net


    143-244-50-211.bunnyinfra.net


    169-150-249-163.bunnyinfra.net


    169-150-221-147.bunnyinfra.net


    143-244-50-82.bunnyinfra.net


    143-244-50-213.bunnyinfra.net

    ¹⁰
    143-244-50-209.bunnyinfra.net

    ¹¹
    143-244-49-180.bunnyinfra.net

    ¹²
    143.244.50.214

    ¹³
    185-93-1-251.bunnyinfra.net

    ¹⁴
    unn-169-150-249-163.datapacket.com

    ¹⁵
    unn-169-150-249-165.datapacket.com

    ¹⁶
    unn-169-150-249-164.datapacket.com

    ¹⁷
    unn-169-150-249-166.datapacket.com

    Cities:
    ¹
    reddit.com/r/netzpolitik/comme

    ²
    en.wikipedia.org/wiki/FinFishe

    ³
    spiegel.de/netzwelt/netzpoliti


    netzpolitik.org/2022/nach-pfae


    securityweek.com/german-author


    bloomberg.com/news/articles/20

    #RTDNA #StateSponsoredMalware#SSM#malware

  19. One common thing #StateSponsoredMalware™ from #GammaGroup . Com's #FinFisher #FinSpy #Finsky does is a downgrade attack on your encryption by using older protocols that are already compromised and also using port 80 over port 443 on web browsers at logins as well as replacing and utilizing different certificates with lower bits and easily broken ciphers so that you still have a green lock on your browser.

    Libraries of overlay icons have also been found to overlay and replace icons on each os also mimicking icons that make you think you are using ' secure ' settings also for common programs for communications.

    This software is commonly used for investigation purposes but it's been see also primarily used as a financial crime tool in the South Eastern United States in Red States attacking Blue States since 2015 when it's source code was hacked.

    #infosec #SSM#GammaGroup #FinFisher #FinSpy #Finsky #CALEA #CALEAmalware#greymarket #financialcrimes #investigations #ForcedMDM #MITM

  20. You know it's a sad day in #infosec when the newer version of #StateSponsoredMalware has to be used to uncover the #HumanRightsViolations of an older version of the same software #investigations wise. 🦉💯📰🗞️👀

    #CALEA #CALEAmalware #investigations 🔍🧐

  21. CW: 🔎 #Meta #GangStalker #surveillance #feedbackloops 🔍👀🚩⚖️🔥

    Tracking the #surveillance #feedbackloop from the #fascists at #Meta on #Facebook's #Meta is quite lame, time consuming & fascist boring as the dumbFSCKS on that CSAM web hosted #JAFW with their bullshit generational harassment gaslighting logged for decades and decades even BEFORE #Meta made it industrial at scale.

    Decades of this type manipulations logged by coordinated #harassment FROM #Meta #GangStalker types listed like :

    #ZachariahCrocker
    #AmolKarole
    #AprilPage
    #CraigMettenbrink
    #ZhiZhang
    #RenWaiYanZhang

    Who coordinated their harassment ON #Meta is just so fsckN lame but needed to be done since their data has been pulled off #Meta....

    It's up to the #OpenWeb since they think people haven't studied COINTELPRO or the Cops program
    or even pay attention to history and the #news.

    Keep that fascist #CrimesONLY place in check on the #OpenWeb with facts published not on #Meta, fr, since they use #GammaGroup's #FinFisher #FinSpy #Finsky to do their manipulations.

    Logged that #ForcedMDM fascist S/W bullshit btw. Fr.🔍👀

    Funny how that old stolen #CALEA software from the #UK got you spotlighted running easily #TCPDUMP'D by my eX-Employeer & other ISPs', type also #OpenSourced, since 1996.

    Funny how those same feedback loops with the names listed above under surveillance works while you react real time, under surveillance, on camera, init? 🤭

    ☣️🚩🔥📰⚖️👮👮‍♀️👮‍♂️🚓. 🔍👀
    #infosec #RTDNA #news Digital Fascist Slavery Software Revealed Stories about #MetaUserAccounts

    @[email protected]
    @[email protected]

  22. CW: 🔎 #Meta #GangStalker #surveillance #feedbackloops 🔍👀🚩⚖️🔥

    Tracking the #surveillance #feedbackloop from the #fascists at #Meta on #Facebook's #Meta is quite lame, time consuming & fascist boring as the dumbFSCKS on that CSAM web hosted #JAFW with their bullshit generational harassment gaslighting logged for decades and decades even BEFORE #Meta made it industrial at scale.

    Decades of this type manipulations logged by coordinated #harassment FROM #Meta #GangStalker types listed like :

    #ZachariahCrocker
    #AmolKarole
    #AprilPage
    #CraigMettenbrink
    #ZhiZhang
    #RenWaiYanZhang

    Who coordinated their harassment ON #Meta is just so fsckN lame but needed to be done since their data has been pulled off #Meta....

    It's up to the #OpenWeb since they think people haven't studied COINTELPRO or the Cops program
    or even pay attention to history and the #news.

    Keep that fascist #CrimesONLY place in check on the #OpenWeb with facts published not on #Meta, fr, since they use #GammaGroup's #FinFisher #FinSpy #Finsky to do their manipulations.

    Logged that #ForcedMDM fascist S/W bullshit btw. Fr.🔍👀

    Funny how that old stolen #CALEA software from the #UK got you spotlighted running easily #TCPDUMP'D by my eX-Employeer & other ISPs', type also #OpenSourced, since 1996.

    Funny how those same feedback loops with the names listed above under surveillance works while you react real time, under surveillance, on camera, init? 🤭

    ☣️🚩🔥📰⚖️👮👮‍♀️👮‍♂️🚓. 🔍👀
    #infosec #RTDNA #news Digital Fascist Slavery Software Revealed Stories about #MetaUserAccounts

    @[email protected]
    @[email protected]

  23. CW: 🔎 #Meta #GangStalker #surveillance #feedbackloops 🔍👀🚩⚖️🔥

    Tracking the #surveillance #feedbackloop from the #fascists at #Meta on #Facebook's #Meta is quite lame, time consuming & fascist boring as the dumbFSCKS on that CSAM web hosted #JAFW with their bullshit generational harassment gaslighting logged for decades and decades even BEFORE #Meta made it industrial at scale.

    Decades of this type manipulations logged by coordinated #harassment FROM #Meta #GangStalker types listed like :

    #ZachariahCrocker
    #AmolKarole
    #AprilPage
    #CraigMettenbrink
    #ZhiZhang
    #RenWaiYanZhang

    Who coordinated their harassment ON #Meta is just so fsckN lame but needed to be done since their data has been pulled off #Meta....

    It's up to the #OpenWeb since they think people haven't studied COINTELPRO or the Cops program
    or even pay attention to history and the #news.

    Keep that fascist #CrimesONLY place in check on the #OpenWeb with facts published not on #Meta, fr, since they use #GammaGroup's #FinFisher #FinSpy #Finsky to do their manipulations.

    Logged that #ForcedMDM fascist S/W bullshit btw. Fr.🔍👀

    Funny how that old stolen #CALEA software from the #UK got you spotlighted running easily #TCPDUMP'D by my eX-Employeer & other ISPs', type also #OpenSourced, since 1996.

    Funny how those same feedback loops with the names listed above under surveillance works while you react real time, under surveillance, on camera, init? 🤭

    ☣️🚩🔥📰⚖️👮👮‍♀️👮‍♂️🚓. 🔍👀
    #infosec #RTDNA #news Digital Fascist Slavery Software Revealed Stories about #MetaUserAccounts

    @[email protected]
    @[email protected]

  24. CW: 🔎 #Meta #GangStalker #surveillance #feedbackloops 🔍👀🚩⚖️🔥

    Tracking the #surveillance #feedbackloop from the #fascists at #Meta on #Facebook's #Meta is quite lame, time consuming & fascist boring as the dumbFSCKS on that CSAM web hosted #JAFW with their bullshit generational harassment gaslighting logged for decades and decades even BEFORE #Meta made it industrial at scale.

    Decades of this type manipulations logged by coordinated #harassment FROM #Meta #GangStalker types listed like :

    #ZachariahCrocker
    #AmolKarole
    #AprilPage
    #CraigMettenbrink
    #ZhiZhang
    #RenWaiYanZhang

    Who coordinated their harassment ON #Meta is just so fsckN lame but needed to be done since their data has been pulled off #Meta....

    It's up to the #OpenWeb since they think people haven't studied COINTELPRO or the Cops program
    or even pay attention to history and the #news.

    Keep that fascist #CrimesONLY place in check on the #OpenWeb with facts published not on #Meta, fr, since they use #GammaGroup's #FinFisher #FinSpy #Finsky to do their manipulations.

    Logged that #ForcedMDM fascist S/W bullshit btw. Fr.🔍👀

    Funny how that old stolen #CALEA software from the #UK got you spotlighted running easily #TCPDUMP'D by my eX-Employeer & other ISPs', type also #OpenSourced, since 1996.

    Funny how those same feedback loops with the names listed above under surveillance works while you react real time, under surveillance, on camera, init? 🤭

    ☣️🚩🔥📰⚖️👮👮‍♀️👮‍♂️🚓. 🔍👀
    #infosec #RTDNA #news Digital Fascist Slavery Software Revealed Stories about #MetaUserAccounts

    @[email protected]
    @[email protected]

  25. CW: 🔎 #Meta #GangStalker #surveillance #feedbackloops 🔍👀🚩⚖️🔥

    Tracking the #surveillance #feedbackloop from the #fascists at #Meta on #Facebook's #Meta is quite lame, time consuming & fascist boring as the dumbFSCKS on that CSAM web hosted #JAFW with their bullshit generational harassment gaslighting logged for decades and decades even BEFORE #Meta made it industrial at scale.

    Decades of this type manipulations logged by coordinated #harassment FROM #Meta #GangStalker types listed like :

    #ZachariahCrocker
    #AmolKarole
    #AprilPage
    #CraigMettenbrink
    #ZhiZhang
    #RenWaiYanZhang

    Who coordinated their harassment ON #Meta is just so fsckN lame but needed to be done since their data has been pulled off #Meta....

    It's up to the #OpenWeb since they think people haven't studied COINTELPRO or the Cops program
    or even pay attention to history and the #news.

    Keep that fascist #CrimesONLY place in check on the #OpenWeb with facts published not on #Meta, fr, since they use #GammaGroup's #FinFisher #FinSpy #Finsky to do their manipulations.

    Logged that #ForcedMDM fascist S/W bullshit btw. Fr.🔍👀

    Funny how that old stolen #CALEA software from the #UK got you spotlighted running easily #TCPDUMP'D by my eX-Employeer & other ISPs', type also #OpenSourced, since 1996.

    Funny how those same feedback loops with the names listed above under surveillance works while you react real time, under surveillance, on camera, init? 🤭

    ☣️🚩🔥📰⚖️👮👮‍♀️👮‍♂️🚓. 🔍👀
    #infosec #RTDNA #news Digital Fascist Slavery Software Revealed Stories about #MetaUserAccounts

    @[email protected]
    @[email protected]

  26. In #infosec you should learn about #ForcedMDM and install a #Firewall on your phone to see the firewall log files to visualize / see what Proxy Servers you are being forced through for #MITM and sent to & generate pcap files. Learn #Wireshark.

    Non-Infosec People are / are starting to / do realize the financial crimes from State Sponsored Malware they can experience are just people stealing from you are just #GangStalkingForum's from Meta and they are just using that #StateSponsoredMalware for targeting from Google and Apple's app stores to the tune of 100's of MILLIONS of installs of this software since 2003. The Grey Market abuse of this #CALEA software is one of the parallel construction 🤝 #MetaGangStalkers 🤝 #FakeFacebookProfiles / #Personas' tool for their #CrimesONLY #RICOplatform .

    Mark is super up front about how he thinks of his userbase ( ZeroTrust in his platform ) and even comes out and says what Sheryl taught him, even at his stuck firmware state, which is to give empty words as 'An Apology Tour Version Something.Something.Something'.docX and change the date/time & $_latest_reason_to_appologize_for_list.xlsx #OLE spreadsheet 🤝document🤝slide presentation for the teleprompter, obvs.

    When your failing #FreeWebHostingCulture lands you, repeatedly, in front of the he #House and #Senate #IntellegenceCommittee in public and private perhaps the whole rethinking of your broken by design banner ad company that hosts #CSAM needs a retooling / leadership change top down? Perhaps the whole $1 a year pay for the past decade wasn't enough of a clue by four? Maybe there is a reason people hate they guy who can't lead is now stuck in a layoff cycle due to poor business decisions where 'stealing from everyone by ~1% of the userbase ' as a business model ' ISN'T such a good idea?

    This looks ks like another 1975 #ChurchCommission findings in 2024 on repeat for the Harvard guy who bet it all on a hate algorithm for 'engagement purposes' and now is arbitrarily instituting a black box reviewable specific policy on ' no political or news content ' before the election cycle as ' moderation ' as that's the cheapest way to moderate and ignore init vs. getting caught manipulating both sides multiple times as the current situation shows 20+ yrs into this #FreeWebHosting #Culture as a #COINTELPRO platform for ~1% of the scammers as a platform as a services model.

    #MetaBusinessModels cost North America 1 Trillion Dollars in losses annualy btw.... WOT's #Meta's market capture right now? Waaaay less than the losses they cause yearly.

    Stupid fsck'N cult.

  27. Watching revelations today in #MSMNews about more #StateSponsoredMalware™ by #NSOGroup in #India targeting #journalism & #journalists globally for #HumanRights #abuse but not seeing #GammaGroup's #FinFisher #FinSpy #Finsky mentioned in the article because the stories about how in #AMER the #COINTELPRO backed non-audited #greymarket usage of this SAME #HumanRightsAbuse domestically by psychopaths at #Meta because #CALEA abuse, audited & ingnored, again, because... communism + Republicans involved.... ideological derangement syndromes.... 📰✍️🤦‍♂️ noting how India vs. America treats #spyware.... #RTDNA #malware vs. #USG #news .🤦‍♂️ #infosec

    securitylab.amnesty.org/latest