In the recent past, reached out to Mary Fanning (of The American Report) to discuss some topics related to Hammer and Scorecard. Today, I followed up with another communication. And then it occured to me, that it may be of interest to you folks here:
--
Mary,
I recently sent you a brief outline “connecting the dots” interspersed between Hammer and Scorecard and Italy-Did-It. I write to you here on a different aspect of the Hammer and Scorecard topic.
First off – thank you for bringing the Whistleblower Tapes to the American public. I have listened to each of them multiple times. And I noticed some unconnected dots that I thought I’d connect for you.
You may recall from The Tapes that at one point Arpaio and Blixseth refer to Obama’s birth certificate. And they say – without justification – that the birth certificate issue and The Hammer issue are “sort of the same thing.” But they don’t say how they are connected and what makes them the same. Given how they characterized The Hammer, I don’t think they actually understood how they are connected.
The Hammer locates a “target” server’s private asymmetric encryption key – in part, through brute computational force. It uses computational power to exhaust the solution space until it finds the sought-after key. I could explain – slowly and understandably – what that means, should it interest you, but the bottom line is this: possession of a “target server’s” private asymmetric key permits the possessor to eavesdrop on all thought-to-be-secure communications with that target server.
If you have Bank of America’s private asymmetric key, you can decrypt all communication to and from Bank of America. If you have the private asymmetric key used by the email server at NYU, you can decrypt all communication to and from that server. And so on.
Consider this: the NSA stores all of the IP packets ever communicated via our domestic Internet infrastructure. So, if it is interested in a particular communication session, it can retrieve the packets constituting that communication session, send them – in proper sequence and on a one-by-one basis – to The Hammer, which will decrypt the contents of each packet, and then the whole communication session can be eavesdropped upon.
So, Mary, want to know what this has to do with Obama’s birth certificate? Here’s what. You use the Hammer to find the private asymmetric encryption key for the servers operating the Department of Health for Hawaii. Then you use the NSA’s capabilities to “replay” the communication session by which one of its system administrators logged into the server. The outcome? You literally see the system administrator’s login credentials – i.e., his or her username and password. So you just use that to login, and then issue Obama a birth certificate.
You’re not really “hacking” anything in the traditional sense. You’re just watching the administrators login, and then using their credentials. That’s how they exfiltrated all of that Bank of America data that is referred to in The Tapes. That’s how they compromised the Florida voting database that they mentioned in The Tapes. They can repeat that exploit on any target system, as long as it is in the USA.
The word needs to get out. And to do that, it requires someone who can explain in – simple terms – what the Hammer really is, and what the consequences of it falling into the wrong hands really is. I’m here to help, should that be of interest.
My sincere admiration, gratitude and regards,
-“Simon”
Well, I for one am impressed...I hope that your communication with Mary Fanning and your explanations will be beneficial in helping to expose the malfeasance of our government. Keep up the good work Patriot...God bless you for wanting to make a difference.
Thank you.
We'll see how it goes. I'm happy to help her out in any way I can. I hope she reaches back out to me to follow up. I promise I'll let you know, should that come to pass.
Pretty sure I love you ❤️🇺🇸😎
lol. I'm flattered. :-)
u/#mikerekt great work, anon!
Thanks for the kind words, sir.
BTW - Here's a link to access the Whistleblower Tapes.
Link: https://soundcloud.com/david-broyles-327307388
Scroll down on the page; there's a total of five audio files - you'll see them.
Thank you so much! The Hammer issue certainly needs to be broken down for most people.
In highschool lots of us did the same thing with keylogger to prank admin & teachers. We only got caught when one of the guys doing it started changing grades. We tried to get them to understand small adjustments on test & homework scores can be overlooked. Taking scores from D or C quality to A would give a clear path back to who did it.
It was pretty funny to hear office assistants make wild claims that were edited in the night before. Weird things on the lunch schedule & announcing that if the vending machine outside the gym was hit hard enough it would drop drinks. Guys were slamming into it for years after that.
First thing that we did was change up a few presentations that teachers had & inserted a pic telling the class to "Ask your teacher Why did Billy had Lucious Lewinsky in his office?"
Took a few weeks to get it timed correctly & then just random stuff until one guy messed up & changed his grades too much too fast. He never ratted any of us out, though his parents were so angry & amazed that he was smart enough to do it.
The vast majority of people at our reunions still couldn't understand how that could have happened still tosay, though still talk about it.
Breaking these details down into easy to digest concepts is key to get the majority to wake up IMO
Wow, I'm having flashbacks of college!
My dorm neighbor was a Software Engineering major who was in the Army Reserves. I gave him rides back to campus in Boston whenever he had drill so we got plenty of time to chat in the car.
I was an old school amateur programmer using a Commodore 64 and Q-Basic* & GW Basic 👈 😲 (Just realized what a weird coincidence THAT is). So I could understand what software programs he was working on.
He filled me in on his devious plan to run a login script on all the Unix machines in the computer lab. It started out that he only wanted to prank a few nerdy classmates, but things got out of hand and soon he had the login's for several professors and faculty.
Rumor was, he started changing grades and then we never saw him return next semester. 🤷♂️
Hope he landed someplace safe working for the good guys.
Q & GW, those were my playground for many years. 486 is where I started using them, though the school I really learned to program in used those Commodores.
My father used GW & I thought it was weird that the school had Q when I was there. To naive to know much at that age 🤣
Great stories. I had a team of fun hackers in high school too. Changed the bell schedule and the sprinkler schedule for April fools day. I feel sorry for kids today who have cameras on them 24/7.
🤣🤓
Never heard these recordings…never knew Sheriff Joe was a DEA agent in Mexico and Turkey. Did Carl Cameron ever do any story on Fox re this?
Is Dennis Montgomery still alive?
There is so much that has been hidden for so many decades. Furious and sick about it.
I am not cut out for that life..the secrets, the double crossing, the informants, the lies, the cover stories…exhausting.
Briefly:
(1) Fox News ran a story on this exactly once and never again. I think the powers-that-be came down on them hard and told them: Never again.
(2) Dennis is alive. He has been under a gag order ("protective order") that prevents him from speaking/testifying. The basis of the order is the state secret privilege. Mike Lindell is in federal court in Nevada right now, trying to have the gag order lifted, so he can bring the Hammer and Scorecard data (and Montgomery's testimony) to the American public, and also to use that information to defend himself in the suit Dominion brought against him for defamation.
Thank you for your response. I thought Mike Lindell was involved, and it was my understanding that he purchased the remnants of Dennis’ company/proprietary information and he was the actual owner, and as such, he was able to use it… I thought he had a win in Nevada…but did not know there is still wrangling—if this is CIA directed…finding a judge in Nevada to waive secret privilege is like finding a judge in AZ to look at the evidence in Kari Lake’s election. And I thought Abe Hamideh was still in court there after a win in a lower court? Or closer in the recount..
Ultimately, it seems like things are so close to disclosure and all we need are a few brave judges, but do any of the brave remain?
Between the CIA, FBI, DOJ and the cartels in AZ, it seems the odds are insurmountable. So we push out information however we can, and pray?
It’s unbelievable to me that we are in the kinetic phase of war with large scale industrial sabotage, and only a tiny percentage of the Gen pop knows it. Every time I say “we are at war” to people, they think it’s metaphor.
I really need to update everyone on this. I agree that it's hard to find an honest judge - and such a judge will likely not be located. That said, the government produced arguments that makes it very difficult to rule in their favor.
Fucking top notch fren! Absolutely putting in work anon!
The implications of Hammer's capabilities are beyond interesting. The very example you gave using Bank of America.... This could be used on figuratively anything! The geopolitical leverage offers immense hegemony over any and all opposition.
Not just threatening to individuals, but also corporate, military, and utility.... Pretty much any system can be hammered and they probably all have been for many years now.
No one has seen Mary Fanning.
Red Flag anyone?
This has surfaced in the last few weeks:
https://greatawakening.win/p/16aT3D7Vwv/
Her real name recently came to light in the Dominion-Lindell pleadings: Mary Fanning Kirchhoefer.
There have long been rumors that she is a former CIA asset. I think that is entirely likely. Although I don't necessarily think that means her motives are impure in this matter.
There's more I could say here, but I'll save it for another time. For now, I'll just say that it's wise to keep our eyes open to all possibilities.
This goes to the heart of the election fraud problem, it is what we are up against and it will almost be impossible to fix when you have congress and the judges running cover for it. They know what is going on, their not stupid.
I followed up with Mary today:
--
Mary,
It’s me again, “Simon.” I’ll try not to exhaust you.
I want you to consider the narrative “gap” in The Hammer story as it has been told. Consider The Whistleblower Tapes: thereon, you’ve got Blixseth saying that The Hammer “goes through billions of password combinations per minute.” So that’s what the public understands about The Hammer. It cycles through password combinations.
But that’s not correct. The Hammer doesn’t cycle through password combinations. It “hammers” through the solution space of private asymmetric encryption keys. (Hence, the name. The Hammer.)
This is not merely a point of abstruse technological precision. If it were only that, I wouldn’t be writing to you. It’s much more.
The Whistleblower Tapes reveal that all of the foreign embassies situated within the United Stated had their encryption keys compromised. How does cycling through passwords relate to that? As the story is being told, there is no apparent connection.
Now, if you understand that the first fruits of The Hammer are private asymmetric encryption keys, then it all makes sense. Our government aimed The Hammer at the communication sessions of each embassy here – which it can do, given the capabilities of the NSA. And The Hammer located their respective keys, which is exactly what it is designed to do. It’s not surprising that their keys were compromised. It's the direct result of the operation of The Hammer.
You need to augment your telling of The Hammer story to include: (1) an accurate description of what it is The Hammer does; (2) the NSA’s tapping of our core Internet infrastructure at undisclosed “access points” (this is a long-admitted fact); and (3) the implications of all of this. Otherwise no one will really understand our state of compromise.
I’m happy to assist by writing, or discussing, or via any other avenue you may find helpful.
My best regards,
-“Simon”
Didn't the Biden laptop have encryption keys on it?
Was Admiral Rogers not in charge of the NSA under Obama?