It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
originally posted by: SplinterSequence
a reply to: PokeyJoe
Keep in mind that the plan was hatched long before Trump became POTUS. Preventing the 16 year plan and reducing it to only 8 years is/was very dangerous and many patriots made the ultimate sacrifice to get us here. The true crimes of the past administration have not been made public yet. ⏲
originally posted by: Aallanon
a reply to: carewemust
It's for his own safety
originally posted by: SplinterSequence
originally posted by: carewemust
originally posted by: SplinterSequence
In case you did not noticed it. The new russian indictment allows all the "hacked" emails to be introduced as evidence in court. Podesta emails anyone? Enjoy the show. 🌊🌅
Can there be court proceedings with none of the defendants present? I don't see Putin sending them to our court, any more than we'd send our caught spies/hackers to court in any other country.
Remember what happened the last time Mueller indicted faceless russians? One of the accused actually showed up and proved Mueller wrong.
originally posted by: savagediver
a reply to: IAMTAT
I really am interested in what must be on jar jar binks computer that the capital police held onto that jar jar wanted back so bad. Was a really funny video of her threatening the capital police in a meeting trying to get it back. I am hoping awan sings loudly and clearly.
It is now believed that many of the Schumann resonances transients (Q bursts) are related to the transient luminous events (TLEs). In 1995 Boccippio et al. showed that sprites, the most common TLE, are produced by positive cloud-to-ground lightning occurring in the stratiform region of a thunderstorm system, and are accompanied by Q-burst in the Schumann resonances band. Recent observations reveal that occurrences of sprites and Q bursts are highly correlated and Schumann resonances data can possibly be used to estimate the global occurrence rate of sprites.
There are several types of TLEs, the most common being sprites. Sprites are flashes of bright red light that occur above storm systems. C-sprites (short for “columniform sprites”) is the name given to vertical columns of red light. C-sprites exhibiting tendrils are sometimes called “carrot sprites”. Other types of TLEs include sprite halos, blue jets, gigantic jets, blue starters, and ELVESs. The acronym ELVES (“Emission of Light and Very Low Frequency perturbations due to Electromagnetic Pulse Sources”) refers to a singular event which is commonly thought of as being plural. TLEs are secondary phenomena that occur in the upper atmosphere in association with underlying thunderstorm lightning.
Lightning crashes a new mother cries
Her placenta falls to the floor
The angel opens her eyes
The confusion sets in
Before the doctor can even close the door
Lightning crashes an old mother dies
Her intentions fall to the floor
The angel closes her eyes
The confusion that was hers
Belongs now to the baby down the hall
Oh now feel it, comin' back again
Like a rollin', thunder chasing the wind
Forces pullin' from
The center of the earth again
I can feel it.
“The singing Tesla coil, sometimes called a zeusaphone, thoramin or musical lightning, is a form of plasma speaker. It is a variation of a solid state Tesla coil that has been modified to produce musical tones by modulating its spark output. The resulting pitch is a low fidelity square wave like sound reminiscent of an analog synthesizer. The high-frequency signal acts in effect as a carrier wave; its frequency is significantly above human-audible sound frequencies, so that digital modulation can reproduce a recognizable pitch. The musical tone results directly from the passage of the spark through the air. The flexibility of the sound is limited by the fact that the solid-state coil produces square rather than sinusoidal waves; but simple chords are possible.”
Source: www.thegatewaypundit.com...
Deputy Attorney General Rod Rosenstein confirmed that the DNC server was never actually hacked.
Rather, the emails were obtained through a “spear phishing” email scam which THOUSANDS of others, including Republicans fell for.
BREAKING: Rosenstein just confirmed emails obtained through “spearfishing” email scam, which thousands of people including Republicans fell for. No wonder the DNC server was never examined by FBI. It was never actually hacked. This was a monumental lie by the Clinton campaign
...the number 9 symbolizes divine completeness or conveys the meaning of finality. Christ died at the 9th hour of the day, or 3 p.m., to make the way of salvation open to everyone.
originally posted by: carewemust
originally posted by: Pyle
originally posted by: carewemust
a reply to: Skyfloating
I'm still on the fence about Bob Mueller. Several lives have been ruined financially due to his investigation. And hopefully Paul manafort is not really in solitary confinement for cheating on his taxes 10 years ago.
He was on monitored release for tax crimes. He was put in jail for witness tampering. I know you know this because I have told you this before.
I understand JAIL...but Solitary Confinement is a BRUTAL OVERKILL! By that measure, Hillary, Comey, et al, should be burned at the stake.
Besides, as I've said before, there's no proof that Manafort "tampered" with any witnesses. Not one ATS member or so-called news organization has posted a legal document showing that Manafort tampered with a witness.
The day after the Superseding Indictment was made public, Manafort also sent Person D1 a text message on an encrypted application, stating “This is paul.” Domin Decl. ¶ 14. 3 Two days later, on February 26, 2018, Manafort used the same encrypted application to send Person D1 a news article describing the Superseding Indictment’s allegations concerning the Hapsburg group, which included the statement that “two European politicians were secretly paid around €2 million by Manafort in order to ‘take positions favorable to Ukraine, including by lobbying in the United States.’”4One minute after sending the news article, Manafort wrote: “We should talk. I have made clear that they worked in Europe.” Domin Decl. ¶ 15. Toll records for one of Manafort’s phones indicate that Manafort had a short call with Person D1 on February 24, 2018, and that Manafort attempted to call Person D1 again on February 25 and 27, 2018. Id. ¶ 14. As noted in Special Agent Domin’s declaration, Person D1 has told the government that he understood Manafort’s outreach to be an effort to “suborn perjury,” because Person D1 knew that the Hapsburg group worked in the United States—not just Europe. Domin Decl. ¶ 19. In an effort to connect Manafort with Person D1, Person A reached out to Person D2, a longtime partner of Person D1. On February 28, five days after the Superseding Indictment, Person A attempted to contact Person D2 via an encrypted messaging application. Person A wrote: “My friend P is trying to reach [Person D1] to brief him on what’s going on.” Domin Decl. ¶ 17. Two minutes later, Person A added: “Basically P wants to give him a quick summary that he says to everybody (which is true) that our friends never lobbied in the US, and the purpose of the program was EU.” Id. Approximately five hours later, Person A switched to another encrypted application and sent a similar series of messages to Person D2, including a message relaying Manafort’s “summary” that the Hapsburg group never lobbied in the United States. Id.
Metadata is "data [information] that provides information about other data".
[3] Descriptive metadata describes a resource for purposes such as discovery and identification. It can include elements such as title, abstract, author, and keywords.
[4]Structural metadata is metadata about containers of data and indicates how compound objects are put together, for example, how pages are ordered to form chapters. It describes the types, versions, relationships and other characteristics of digital materials.
[5] Administrative metadata provides information to help manage a resource, such as when and how it was created, file type and other technical information, and who can access it.
[6] Reference metadata describes the contents and quality of statistical data Statistical metadata may also describe processes that collect, process, or produce statistical data; such metadata are also called process data.
43. Between in or around June 2016 and October 2016, the Conspirators used Guccifer 2.0 to release documents through WordPress that they had stolen from the DCCC and DNC. The Conspirators, posing as Guccifer 2.0, also shared stolen documents with certain individuals.
originally posted by: tiredoflooking
a reply to: CoramDeo
I think that's right.
Why would Russia set up this elaborate network to get information...
Then leak it via an anon account?
Wouldn't they want to keep gathering information?
32. Despite the Conspirators’ efforts to hide their activity, beginning in or around May 2016, both the DCCC and DNC became aware that they had been hacked and hired a security company (“Company 1”) to identify the extent of the intrusions. By in or around June 2016, Company 1 took steps to exclude intruders from the networks. Despite these efforts, a Linux-based version of X-Agent, programmed to communicate with the GRU-registered domain linuxkrnl.net, remained on the DNC network until in or around October 2016.
>>>
a. On or about June 20, 2016, after Company 1 had disabled X-Agent on the DCCC network, the Conspirators spent over seven hours unsuccessfully trying to connect to X-Agent. The Conspirators also tried to access the DCCC network using previously stolen credentials.