Receive News from Operation Disclosure via Email

Guest Posting

If you wish to write a post/article on Operation Disclosure all you need to do is send your entry to UniversalOm432Hz@gmail.com applying these following rules.

The subject of your email entry should be: "Entry Post | (Title of your post) | Operation Disclosure"

- Must be in text format
- Proper Grammar
- No foul language
- Your signature/name/username at the top

Send your entry and speak out today!

News Alerts

RV/INTELLIGENCE ALERT - February 22, 2017

[ SITREP - 20:00 EST]

GENERAL DUNFORD HAS REVIEWED, AUTHORIZED AND GAVE FINANCIAL ACKNOWLEDGEMENT BACK TO THE CHINESE ELDERS FOR THE US PORTION OF THE RV.

THE USN IS NOW READY TO BE ANNOUNCED/RELEASED.

THE REPUBLIC'S MILITARY IS READY.

THE REPUBLIC'S BANKS ARE READY.

OUR RESTORED REPUBLIC IS READY TO GO.

THE CHINESE ELDERS ARE NOW JUST WAITING FOR THE REST OF THE WORLD TO REPORT IN THAT THEY'RE READY TO COMMIT TO THE RV.

THIS INCLUDES ISRAEL AND UKRAINE, THE LAST TWO REMAINING CABAL HOLDOUT COUNTRIES.

NORTH KOREA IS NO LONGER A FACTOR, THEY'VE BEEN CUT OFF.

BE AWARE, MOST OF THE MAINSTREAM MEDIA IS STILL BIASED TOWARDS THE CABAL'S AGENDA. THIS WILL SOON CHANGE.

HALLELUJAH!

READ FULL SITREP


FOR INFORMATION ABOUT THE RV VISIT:
http://www.dinarchronicles.com/intel

---

Featured Post

Restored Republic via a GCR as of February 23, 2017

Restored Republic via a GCR as of Feb. 23 2017 Compiled in the early morning hours EST of 23 Feb. 2017 by Judy Byington, MSW, LCSW, ret, C...

Monday, February 29, 2016

Hacker Shows How To Take Over Security Cameras

A hacker shows how you can take over security cameras and bank accounts with just an email

About 91% of targeted cyber attacks begin with phishing and most people fall for it. They then installing a security certificate that gives the hacker total control over your computer.

If you dare a hacker to break into your accounts, chances are pretty high that you won't like the results.

Fusion's Kevin Roose dared two hacking experts to spend a couple weeks trying to gain access to his life — as long as they agreed not to steal money or reveal his secrets publicly. The hackers used a combination of social engineering (using lies and smooth talk to gain key information) and malicioussoftware to get deep inside Roose's life, and it was shockingly easy.

"If he had been a malicious attacker, Dan said, he could have done unspeakable damage: draining my bank account, ruining my credit score, deleting years’ worth of photos, videos, and important data from my hard drive, using secrets from my email inbox and my work Slack to ruin my reputation," Roose wrote in an article about the experience at Fusion. "Anything, really."

Fusion put up a video of the ordeal on YouTube, which showed how the hackers pulled it off.

After compiling a 13-page dossier on Roose based on social media accounts and publicly-available data found online, the hackers social engineered their way into his accounts. While demonstrating this type of attack on video, a hacker named Jessica Clark poses as Roose's wife in a call to his phone company — as a YouTube video of a baby crying plays in the background — and is able to get full control over his account.

"All it took was a crying baby and a phone call," Roose says.

It's one aspect of hacking that often gets overlooked, but is hard to defend against. A person could have super-strong passwords on their accounts, but a good social engineer can find a weak link in customer service, as the video shows.

http://www.techinsider.io/kevin-roose-hackers-2016-2

Shoutbox Disclaimer

Please be advised that the Shoutbox is NOT moderated. Use it at your own will.