Monday, August 15, 2016

Guccigate

http://media4.popsugar-assets.com/files/2012/11/48/2/498/4981322/29bd8663a6de78dc_793913-1_l/i/Carla-Zampatti-blazer-Dion-Lee-dress-Gucci-scarf.jpg


As another Lame Cherry exclusive in matter anti matter.


The Lame Cherry published on Saturday August 13th, an exclusive in matter anti matter concerning the reality that the Cybernationalist Guccifer had an interesting window into Nancy Pelosi's personal computer which had not set off any anti virus alarms.



Lame Cherry: Pelosi 2.0

As another Lame Cherry exclusive in matter anti matter. I was wondering what kind of "sick" messages Nancy Pelosi received in the DNC hack? Was it:


The Lame Cherry made the connection that this trojan was something Guccifer picked off the NSA or FBI, using the portal which Hillary Clinton's email server opened into the Obama regime, in  exchange for bribes to the Clinton Foundation.

Focus on the reality that this is an NSA trojan as predicted here exclusively on the Lame Cherry, because the punch line follows.


Guccifer installed the magic trojan and trolled for Pelosi in having emailed the virus by pinging her system or more to the point, Pelosi's computer pinged Guccifer, which is puzzling because this is a high grade trojan and the entire NSA and FBI sweep structures would have picked up this signal automatically, and sooner than later, someone would have had an "Oh shit" moment when they realized someone had installed one of the  regime trojans on Mrs. Pelosi's hard drive.

That kind of thing really pisses off the powerful when they find out their computers have an  NSA or FBI trojan installed on them.

Any way, the Nancy Pelosi drama of making theater about this event, thinking it is political gain, has just confirmed something those in the shadows of the regime hope like hell no one tells Dame Pelosi. That something is there is a trojan operational which has not been picked up, and that concludes it was NSA or FBI created, and we conclude this, due to the reality that no one is being allowed to publish the question as to how a personal computer was opened up with all those Microsoft safety features.

Literally Nancy Pelosi had on her personal computer an NSA trojan, which the Americans had created for them to spy on the "bad terrorists", but has been utilized to spy on the powerful across the globe and not so powerful.......in meaning you.

Now comes the punch line in proving what the Lame Cherry exposed on Saturday is now confirmed on Monday.


‘Shadow Brokers’ Claim to be Selling NSA Malware, in What Could Be Historic Hack

Programs posted online allow espionage on network devices.



Now the reality is proven what has been known all along, in Microsoft has been producing windows in it's software as have every system, and now EVERY enemy and hacker has the entire system wide open.

I will state again the fact broken here first, Nancy Pelosi had a US regime virus installed on her computer, and no one in the police state bothered to warn her, when the trojan started pinging signals. Which leads one to conclude that the NSA has been installing trojans on every political leaders computer globally, and that is why they never noticed Pelosi's was "singing".

The set of files available for free contains a series of tools for penetrating network gear made by Cisco, Juniper, and other major firms. Targeting such gear, which includes things like routers and firewalls, is a known tactic of Western intelligence agencies like the NSA, and was documented in the Edward Snowden files. Some code words referenced in the material Monday — BANANAGLEE and JETPLOW — match those that have appeared in documents leaked by Snowden. Security researchers analyzing the code posted Monday say it is functional and includes computer codes for carrying out espionage.


Once again another Lame Cherry exclusive in matter anti matter, and proven right again. If you do not have this projected out, thee entire civil structure in America has been breached, including your systems. Most of the regime systems have been breached. It is projected that with all of these breaches, other piggy back systems have been utilized to breach the "closed systems" of the military, because this group from Hillary Clinton was inside the NSA, and that is the keys to the kingdom.


You probably need to be told that this is the kind of story which would make a Woodward icon out of anyone else, and yet in all the exclusives here, all the Lame Cherry is, is impoverished, plagiarized and censored.


agtG