New Site for News, ThePopulist.US


I’ve been looking forward to this new site since Lee Stranahan announced his departure from Breitbart.  He seems level headed, and his Stranahan Report in my email box daily has been a big help.  It’s a great way to start the day.

It’s important to note that Lee does not only use information from right wing sites.  Many main stream media sites also do have good information.  One cannot know truth from inside a bubble, so he mines both right and left news sources daily, and gives a feel for the different ways they are reporting on news stories.  It’s a good idea to keep an open mind, and research on your own, rather than staying in a bubble.

Give it a shot!  It doesn’t seem monetized yet.  I sure like the way it’s laid out, so far.

He also has a Citizen Journalism School should you become interested enough to pursue doing your own journalism or investigating news stories.

Another Softwar revelation!

Occasionally, I’ll post something exactly from, because it’s critical information, and everyone should wake up about encryption.





The Wikileaks disclosure of CIA espionage software is supposed to be about Big Brother. They are defensive in nature designed to monitor and tap into our computers and communications. However, these programs have more than just a passive surveillance function. They also can kill.

Quietly embedded in the latest Wikileaks disclosure of CIA exploits is a cute little program called NightSkies. NightSkies is one in a series of Apple malware programs under a project called Triton. These programs are designed to monitor and “beacon” back information stolen from infected Apple computers. NightSkies has one nice little feature in its arsenal of functions… it can also execute any other program downloaded secretly from a remote CIA “Listening Post”.

<click image to see Wikileaks document>

At first, this feature seems logical and more or less harmless. It is not. It is this feature that murder by software is enabled.

If the infected computer is used in an industrial, internet of things, military or medical application it can be turned into an assassination machine. While Apple computers are not often used in the military, industrial or Internet of Things fields, they are frequently found inside hospitals and they communicate with other critical systems as well – all of which can be the difference between life and death for a patient.

Clearly, the NightSkies design is not the only such program in the CIA arsenal. Similar features will be found embedded within other CIA exploit programs designed for the other major operating systems such as Android, Windows and Linux.

For example, a computer monitoring the condition of a patient can be told to ignore signs of a heart attack and not alert the staff. Other medical computers control more than just monitoring a patient, for example computers often control blood filtering for kidney dialysis. In fact the medical industry is filled with computers that perform a wide variety of life critical functions, diagnosis of brain tissues, X-ray controls, chemotherapy control, and delivery of intravenous medicines.

It is this remote code execution feature and payload delivery of the CIA NightSkies design that is of greatest concern. It could range from a subtle change in the dosage of medicine that becomes lethal, deliver a series of lethal X-Ray or radiation therapy treatments, or perform miss-diagnosis of a condition so that medical staff delivers lethal treatment. The computers involved could show the operators that they are performing flawlessly while at the same time dosing a patient with a massive amount of radiation.

NightSkies design also combines itself with embedded clock timers, to install itself and execute at a specific data/time and then de-install and delete itself at another pre-designated time. Thus, making it possible for the program to execute its prime function, kill and then delete itself, leaving no evidence behind. In addition, the NightSkies design exploits are built to be ignored and accepted by Anti-Virus programs; therefore they are almost invisible to current defenses. Finally, the NightSkies design programs communicate with their host Listening Post (LP) using encrypted communications so when they do “beacon” the data transmission is undecipherable. All these features combine to make NightSkies designs the perfect assassination tool.

The myriad of devices that we rely on for critical life functions that use any of the major operating systems are vulnerable to this kind of attack. These operating systems function aboard airliners, automobiles, in water plants, sewage facilities, oil pipelines, traffic control, police, fire, and rescue and are even present inside the controls for nuclear weapon systems. For example, the British force of nuclear tipped Trident submarines run a variant of Windows XP.

It is now clear exactly how dangerous the CIA exploits are. They are not simple defensive surveillance tools if they can download other programs unseen and then execute them. They become offensive weapons designed to kill.




Contact Us:

What’s new is old, and vice versa, again

The hearings on the hill yesterday, to investigate the issue of Russian interference and possible collusion in the election of President Donald Trump are as usual, pumped up with hype, hyperbole, and angst, with each questioner grandstanding long enough for him/her to feel satisfied he”s putting on a good show for his constituency.  In other words, bloviating long past the need.

While it”s true there was some sharp questioning, it seems strange that so many questions were not asked.  So many people were not called to testify.  So much was left out.  The upshot of the entire affair is Dir. Comey gets to state on the record, under oath, that President Trump has no evidence of “wiretapping” of him or his administration before the election, but that the Trump Administration is under investigation.

Media just takes that as fact.

Not I.  I”m old enough to have lived through and sat through the entire hearing for impeachment of President Clinton,  I saw all the old tactics, still being used today, to obfuscate, to deceive.  All the questions that weren’t asked.  All the documentation not presented, no called into question.  I remember all the Foster death cover up scandal, and how that was dealt with during these crucial most important hearings, and I know media aided the Clinton administration in a massive cover up.  Media now claims their conclusions are facts.

I saw how the Senate handled the impeachment trial.  I saw how not a single senator went into the room where there were boxes and boxes of thousands of pages of evidence, and never once looked at any of it.

I saw how they refused to look at the evidence, their minds made up in advance.  A travesty of justice, right there.

The games they play in the capital are serious.  No matter how excited we get over the facts, the evidence, the testimony, the cover up, media will side with the leftists in power, and claim the results of their posturing, their deceit are the facts.\r\n\r\nI have no faith in government.  It”s usually working on solving problems it created in the first place, and chest beating about how great a job they are doing getting to the bottom of this or that scandal.  There”s so much under the rug, you can”t walk on it anymore.

Cynical, I know.  But there you have it.  I’ll believe Judge Nap over Comey any day.

Having to start again.

Upgrades sometimes are downgrades…. I wish sometimes I were still using XP, and never upgraded.  Seems each time a tech upgrade comes out, and I read about it, it either kills my system, or kills my websites.  This time, I think I can restore some the articles I had posted.  But there is so much stuff coming right now, and so much to discuss, I may not bother with much of the old.  New Days, folks!

%d bloggers like this: