In the recent past, reached out to Mary Fanning (of The American Report) to discuss some topics related to Hammer and Scorecard. Today, I followed up with another communication. And then it occured to me, that it may be of interest to you folks here:
--
Mary,
I recently sent you a brief outline “connecting the dots” interspersed between Hammer and Scorecard and Italy-Did-It. I write to you here on a different aspect of the Hammer and Scorecard topic.
First off – thank you for bringing the Whistleblower Tapes to the American public. I have listened to each of them multiple times. And I noticed some unconnected dots that I thought I’d connect for you.
You may recall from The Tapes that at one point Arpaio and Blixseth refer to Obama’s birth certificate. And they say – without justification – that the birth certificate issue and The Hammer issue are “sort of the same thing.” But they don’t say how they are connected and what makes them the same. Given how they characterized The Hammer, I don’t think they actually understood how they are connected.
The Hammer locates a “target” server’s private asymmetric encryption key – in part, through brute computational force. It uses computational power to exhaust the solution space until it finds the sought-after key. I could explain – slowly and understandably – what that means, should it interest you, but the bottom line is this: possession of a “target server’s” private asymmetric key permits the possessor to eavesdrop on all thought-to-be-secure communications with that target server.
If you have Bank of America’s private asymmetric key, you can decrypt all communication to and from Bank of America. If you have the private asymmetric key used by the email server at NYU, you can decrypt all communication to and from that server. And so on.
Consider this: the NSA stores all of the IP packets ever communicated via our domestic Internet infrastructure. So, if it is interested in a particular communication session, it can retrieve the packets constituting that communication session, send them – in proper sequence and on a one-by-one basis – to The Hammer, which will decrypt the contents of each packet, and then the whole communication session can be eavesdropped upon.
So, Mary, want to know what this has to do with Obama’s birth certificate? Here’s what. You use the Hammer to find the private asymmetric encryption key for the servers operating the Department of Health for Hawaii. Then you use the NSA’s capabilities to “replay” the communication session by which one of its system administrators logged into the server. The outcome? You literally see the system administrator’s login credentials – i.e., his or her username and password. So you just use that to login, and then issue Obama a birth certificate.
You’re not really “hacking” anything in the traditional sense. You’re just watching the administrators login, and then using their credentials. That’s how they exfiltrated all of that Bank of America data that is referred to in The Tapes. That’s how they compromised the Florida voting database that they mentioned in The Tapes. They can repeat that exploit on any target system, as long as it is in the USA.
The word needs to get out. And to do that, it requires someone who can explain in – simple terms – what the Hammer really is, and what the consequences of it falling into the wrong hands really is. I’m here to help, should that be of interest.
My sincere admiration, gratitude and regards,
-“Simon”
BTW - Here's a link to access the Whistleblower Tapes.
Link: https://soundcloud.com/david-broyles-327307388
Scroll down on the page; there's a total of five audio files - you'll see them.
Thank you so much! The Hammer issue certainly needs to be broken down for most people.
In highschool lots of us did the same thing with keylogger to prank admin & teachers. We only got caught when one of the guys doing it started changing grades. We tried to get them to understand small adjustments on test & homework scores can be overlooked. Taking scores from D or C quality to A would give a clear path back to who did it.
It was pretty funny to hear office assistants make wild claims that were edited in the night before. Weird things on the lunch schedule & announcing that if the vending machine outside the gym was hit hard enough it would drop drinks. Guys were slamming into it for years after that.
First thing that we did was change up a few presentations that teachers had & inserted a pic telling the class to "Ask your teacher Why did Billy had Lucious Lewinsky in his office?"
Took a few weeks to get it timed correctly & then just random stuff until one guy messed up & changed his grades too much too fast. He never ratted any of us out, though his parents were so angry & amazed that he was smart enough to do it.
The vast majority of people at our reunions still couldn't understand how that could have happened still tosay, though still talk about it.
Breaking these details down into easy to digest concepts is key to get the majority to wake up IMO
Wow, I'm having flashbacks of college!
My dorm neighbor was a Software Engineering major who was in the Army Reserves. I gave him rides back to campus in Boston whenever he had drill so we got plenty of time to chat in the car.
I was an old school amateur programmer using a Commodore 64 and Q-Basic* & GW Basic 👈 😲 (Just realized what a weird coincidence THAT is). So I could understand what software programs he was working on.
He filled me in on his devious plan to run a login script on all the Unix machines in the computer lab. It started out that he only wanted to prank a few nerdy classmates, but things got out of hand and soon he had the login's for several professors and faculty.
Rumor was, he started changing grades and then we never saw him return next semester. 🤷♂️
Hope he landed someplace safe working for the good guys.
Q & GW, those were my playground for many years. 486 is where I started using them, though the school I really learned to program in used those Commodores.
My father used GW & I thought it was weird that the school had Q when I was there. To naive to know much at that age 🤣
Great stories. I had a team of fun hackers in high school too. Changed the bell schedule and the sprinkler schedule for April fools day. I feel sorry for kids today who have cameras on them 24/7.
🤣🤓