PDA

View Full Version : Hacker group threatens to leak 9/11 ‘truth’ unless paid in Bitcoin



Innocent Warrior
2nd January 2019, 05:05
RT - Hacker group threatens to leak 9/11 ‘truth’ unless paid in Bitcoin (Jan 2, 2019)

https://cdni.rt.com/files/2019.01/article/5c2c2c33dda4c88b188b465d.jpeg

Hacker group The Dark Overlord has threatened to leak thousands of “secret” documents stolen from insurers and government agencies that they claim reveal the truth about 9/11 – unless they’re paid not to.
The Dark Overlord, a “professional adversarial threat group” known for their hacks of Netflix, plastic surgery clinics, and other sensitive targets, posted a link to a 10GB encrypted archive of documents relating to 9/11 litigation, promising to release the encryption keys if their demands were not met in a post on Pastebin (https://pastebin.com/4F5R8QyQ) on Monday.

The group claims the documents tell the story of what really happened on one of the most notorious dates in recent history, tweeting “We’ll be providing many answers about 9.11 conspiracies through our 18,000 secret documents leak.” They published a “teaser” consisting of letters, emails, and various documents that mention law firms, the Transport Security Administration, and the Federal Aviation Administration, with a promise of more to come.


It's not just insurance litigation that we have, it's CONFIDENTIAL, CLASSIFIED, and SECRET documents from FAA, FBI, TSA, USDOJ, and others.
https://pbs.twimg.com/media/Dv2ytxKV4AAT23G.jpg:large

Tweet (https://twitter.com/tdo_h4ck3rs/status/1080216025541554181?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E1080216025541554181&ref_url=https%3A%2F%2Fwww.rt.com%2Fusa%2F447909-hackers-threaten-911-truth%2F).

They claim to have hacked documents from not only major global insurers like Lloyds of London and Hiscox, but also Silverstein Properties, which owned the World Trade Center complex, and various government agencies. The material, which supposedly includes confidential government documents that were meant to be destroyed but were instead retained by legal firms, allegedly reveals “the truth about one of the most recognizable incidents in recent history and one which is shrouded in mystery with little transparency and not many answers.”

Anyone worried they might be named in the documents can have their names redacted – for a fee, according to the announcement. “Terrorist organizations” and “competing nation states of the USA” are also offered first dibs on the info – if they pay up. Otherwise, the hackers write, the insurers can pay an unspecified Bitcoin ransom – or “we’re going to bury you with this.”

Some of the documents were nabbed in an April hack of a law firm associated with Hiscox that the firm acknowledges (https://www.hiscoxgroup.com/news/press-releases/2018/12-04-18) could have exposed 1,500 of its US commercial policyholders. The Dark Overlord claims that while their ransom was paid in relation to that earlier hack, their victim violated the “agreement” by cooperating with law enforcement, necessitating further extortion.

The group emerged in 2016 with hacks on medical centers, advertising sensitive data for sale on the dark web in order to force victims to pay for its removal. They infamously leaked an entire season of Netflix’s Orange is the New Black last year to prove to that company they meant business and have stolen data from more than 50 companies (https://motherboard.vice.com/en_us/article/mbkex8/dark-overlord-arrest-serbia-netflix-hackers), according to Vice.

Source. (https://www.rt.com/usa/447909-hackers-threaten-911-truth/)

thedarkoverlord Twitter account: @tdo_h4ck3rs (https://twitter.com/tdo_h4ck3rs)

Tweeted six hours ago -


We're releasing the first key for the "Preview_Documents" container. Use Veracrypt to decrypt the container. We're escalating. #tdohacked911 #hacking #cybercrime #leak #hack #thedarkoverlord #911hacked #topsecret #encryption #masterkey

Tweet. (https://twitter.com/tdo_h4ck3rs/status/1080232896710037504)


*CZ4=I{YZ456zGecgg9/cCz|zNP5bZ,nCvJqDZKrq@v?O5V$FezCNs26CD;e:%N^

Tweet. (https://twitter.com/tdo_h4ck3rs/status/1080241219391840257)

I'm not touching it but it will be interesting to see where this goes.

Did You See Them
2nd January 2019, 09:52
Sound like a bunch of terrorists themselves.

Words of Joy
2nd January 2019, 11:58
"thedarkoverlord - @tdo_h4ck3rs
31 minutes ago
We'll be issuing a special press release soon on PasteBin. Stay tuned."

"As we promised, we released the first decryption key. As our BTC checkpoints are met, we'll release more damning truth documents. #tdohacked911 #hacking #cybercrime #leak #hack #thedarkoverlord #911hacked #topsecret #bitcoin #paymentplan #GoFundMe #911truth #truth"


"We're announcing our #Bitcoin payment plan to release 9.11 documents via a compounding release plan. Read here: https://pastebin.com/8ksc0aYU #tdohacked911 #hacking #cybercrime #leak #hack #thedarkoverlord #911hacked #topsecret #bitcoin #paymentplan #GoFundMe #911truth #truth"

Ivanhoe
2nd January 2019, 14:09
To me, a thief is a thief. They seem to be into this for monetary gain alone, in it for themselves. To me that's just wrong.
Hope they get caught.

ramus
2nd January 2019, 15:42
The thief has been in American politics a long time, maybe there facing themselves, in it for the money, don't care about people. Sound like they're gettin' what they have been givin'. A twisted sense of Karma. Can't feel sorry for them.

P.S. They can seek Forgiveness when they Atone for there deeds. ( politicians)

DNA
2nd January 2019, 22:17
FBI Probing Theft Of 18,000 Documents Linked To Sept 11 Attacks


https://www.zerohedge.com/news/2019-01-02/fbi-probing-theft-18000-documents-linked-sept-11-attacks
The FBI is investigating the theft of 18,000 documents related to the September 11 attacks on the World Trade Center by a hacking collective known as The Dark Overlord, according to FT (https://www.ft.com/content/b39a8526-0eb2-11e9-a3aa-118c761d2745), citing two people familiar with the matter.

https://www.zerohedge.com/sites/default/files/inline-images/hacker%20info2a.png?itok=mvdGi8G6


Posting under the name “The Dark Overlord”, the hacker or hackers claimed on New Year’s Eve that they had taken emails and non-disclosure agreements relating to the 9/11 attacks that were sent and received by groups including insurers Hiscox and Lloyd’s of London and the law firm Blackwell Sanders Peper Martin, now called Husch Blackwell.
"Pay the **** up, or we're going to bury you with this. If you continue to fail us, we'll escalate these releases by releasing the keys, each time a Layer is opened, a new wave of liability will fall upon you," reads the hacking group's demand letter.
"If you're one of the dozens of solicitor firms who was involved in the litigation, a politician who was involved in the case, a law enforcement agency who was involved in the investigations, a property management firm, an investment bank, a client of a client, a reference of a reference, a global insurer, or whoever else, you're welcome to contact our e-mail below and make a request to formally have your documents and materials withdrawn from any eventual public release of the materials. However, you'll be paying us," the note continues.
Images of some of the documents began circulating on Wednesday after the group released decryption keys, which appear to show communications related to the World Trade Center.
The FBI is one of multiple law-enforcement agencies who are now investigating the breach, according to FT. The Dark Overlord, meanwhile, says that it has been under investigation for years, and that it had also gathered other information from Lloyd's and Silverstein Properties - founded by former WTC owner Larry Silverstein.
Hiscox insurance said it became aware of the hack last April.
"The law firm’s systems are not connected to Hiscox’s IT infrastructure and Hiscox’s own systems were unaffected by this incident," said a Hiscox spokesperson. "One of the cases the law firm handled for Hiscox and other insurers related to litigation arising from the events of 9/11, and we believe that information relating to this was stolen during that breach."
"We will continue to work with law enforcement in both the UK and US on this matter," added the spokesperson.
The September 11 attacks cost the insurance industry the equivalent of $45bn in 2017 terms, according to the Insurance Information Institute, and led to years of litigation over who should bear the cost.
Both Hiscox and Lloyd’s have expanded heavily into cyber insurance in recent years, selling protection against the costs of dealing with cyber attacks.
Husch Blackwell said it had not been hacked: “Several documents bearing the letterhead of a predecessor law firm to Husch Blackwell were made public earlier this week by a cyber terrorist group,” the company said in a statement.
“After a thorough review Husch Blackwell can confirm that no documents were obtained from Husch Blackwell and that there was no unauthorised access to Husch Blackwell systems, client files, documents or data.” -FT (https://www.ft.com/content/b39a8526-0eb2-11e9-a3aa-118c761d2745)
A spokesperson for Lloyd's said it had no evidence of a breach of their systems, and said in a statement "Lloyd’s will continue to monitor the situation closely, including working with managing agents targeted by the hacker group."
Silverstein Properties says that the company is investigating the claims, and that "e are aware of claims of alleged security breaches at firms involved in the five-year insurance litigation following the attacks of 9/11," adding "To date, we have found no evidence to support a security breach at our company. We have spent the last 17 years fulfilling our obligation to deliver a magnificent and fully rebuilt World Trade Center. We will not be distracted by 9/11 conspiracy theories."

Innocent Warrior
3rd January 2019, 02:42
UPDATE: The alien photo wasn’t posted by The Dark Overlord (TDO), it was posted by an impersonator. There may be other posts listed here which were also not posted by TDO. See post #21 (http://projectavalon.net/forum4/showthread.php?105535-Hacker-group-threatens-to-leak-9-11---truth---unless-paid-in-Bitcoin&p=1267419&viewfull=1#post1267419) for more details.

4chan thread: [AMA] We're thedarkoverlord, Hackers of 911 Docs (http://boards.4chan.org/pol//thread/198364116/ama-were-thedarkoverlord-hackers-of-911-docs)

All The Dark Overlord posts from the thread linked above -

Hello 4chan,

We're thedarkoverlord. Ask us any relevant questions. We'll answer all reasonable and thoughtful questions that we can.

Your new friends,
thedarkoverlord
*
Allow our signed message below to serve as proof. 4chan does not like signed messages.

pastebin.com/0uBSX3Zw
*
Q: This doesn't seem like something a group that uses the darkweb would do in public.

A: This is something we do. We can't speak for the others. This is our modus operandi. We like to do everything we can to squeeze every last coin out of our victims. We're financially motivated.

For everyone else asking why we're not dumping it all, we have. It's available to torrent.

Our official Press Release with more info is available here: pastebin.com/4F5R8QyQ
*
Q: 9.8 gigs seems a lot for just documents. Does it include videos or audio recordings?
A: We're withholding anything that isn't text-readable for now.

Q: who did 9/11 in your opinion based on the docs?
A: We don't really give a ****. We want internet money.

We've already released a select few documents to serve as proof of our claims. We're about to change the ****ing world. Edward Snowden's NSA leak will be pale in comparison.
*
Q: (ID: QYsiPYKc)
A: When we deal with clients who have PoF, we provide such presentations.

We're quite wealthy, earning hundreds of BTC per year in profit from our systematic cyber-extortion. GCHQ coined that term for us. You can read their advisory about this organisation.

Q: Hi, thedarkoverlord, Have you considered that information may well be used crash the monetary system you hope to be compensated in?
A: Fantastic question, mate. We're not concerned about that as we receive our payments only in internet money like Bitcoin. The monetary crash will be your problem. We always advise our clients to diversify and acquire different convertible currencies.
*
Q: Explain attack vector that lead to initial shell. Web based? Misconfigired service? Well known exploit?
A: Nice try, Mandiant.

Q: How? You stated that your intent was to sell it to the highest bidder. That just means that it will get buried.
A: We're financially motivated. We're not motivated by saving the planet.

Q: Waiting for overlords dead man switch
A: We have several layers of 'dead man's switches' deployed. This is why the entire archive we'd plan to release is freely downloadable now. We're sitting on our high entropy master encryption keys that can be released through even a failure of the organisation.

Q: The thing is, I (and few others) are willing to pay. Provided that OP understands at least basics how such trades are executed.
A: We're highly reputable, having sold hundreds of BTC worth of intellectual property, R&D, databases, and more. Our official contact details are in our office Press Release. Please contact us using PGP. We'll happily conform to your requirements to substantiate our loot.

Q: if you DO get paid then we can assume the world's not save because you'd not release them right?
A: That's correct. We're not here to save the world. We're here to get paid internet money. We're not motivated by ego or charity, only money.

Q: Hey thedarkoverlord, give us something for free you poofters.
A: We already have. Pay attention, fag.

For everyone speaking about the hack of a global insurer, you should understand how sophisticated litigation works. We're sitting on SSI and SCI from TSA, FBI, FAA, USDOJ, and others. Refer to our official PR for more information.
*
Q: Thoughts on Cicada 3301 and WikiLeaks? particularly who is behind Cicada?
A: We don't speculate on other organisations. We focus on ourselves.

Q: Do you have a timeline you can disclose for releasing each layer?
A: There is a timeline, but we can't share details about that.

Q: Your group could have chosen to privately auction this info to the same exact bidders you will likely get through these public antics. That makes me question your timing. Why disrupt our system of things and way of life now ( assuming your I do is as world changing as you state)? Why now?
A: Tis the season.

Q: I don't give a **** what he wants I'll kick in 20 bucks for anything that peaks my interest one single doc to prove it's not a nothing burger with no strings attached I've been sitting on btc since 50 btc blocks.
A: Ff you'd like to be the first person to purchase a single file or two from us, you're welcome to. We'd happily sell you something right now. Our Twitter has our e-mail on it. Get in contact, mate.

Q: what would anyone who is selling world shattering documents for millions of dollars try selling them on 4chan?
A: We're not selling anything on 4chan. We're working SEO right now. Google 'thedarkoverlord' and see for yourself. It's driving a tremendous amount of traffic to our content. This is all calculated and pre-arranged.
*
Q: **** yeah based hackerman. I read the release, make those ****ers pay for breaking the deal. They should pay extra just for being so stupid to let you find anything in their network in the first place. Too easy probably, IT people are lazy as ****. Get paid.
A: We've probably hacked your company too.

Q: I'd be willing to chip in with others to see it if I was sure it would be world shaking info. Not something the average person would change the TV when it came up on the news. On a scale of 1-10 how system breaking is the info?
A: You're the smart one here, asking the right questions. We'd say it's a 7.5, all things considered. Snowden may have been a 5.5, maybe a 6. More people care about 911 than USA spying. Now, our next release about UFOs, yeah, that's a 10 mate, but it's going to wait until we're done here. If you'd like to buy 911 documents from us, read the answers above.

Anyone can see ample proof on our official PR and our official Twitter @tdo_h4ck3rs. This is quiet real. We'd like to top Edward Snowden. Everyone saying they're coming for us: we know. GCHQ has published advisories about us and the Billings Gazette news publisher leaked the fact that the CIA and NSA event attempted to locate us last year in October after we closed down 50.000 students and 36 schools in an entire region of Montana for 7 days. This is readily available news.
*
Q: Actually appears legit. On a scale of 1 to 10, how likely do you think it is that your leak could cause a former-sitting president to get lynched?
Also, hope your DMS shoots to a Blockchian.
A: We'd rather not say, for fear of his safety.

We'll be sharing a few new screencaps momentarily, to stir the pot a bit.
*
Handsomely paid.

https://i.postimg.cc/Ghbzwhwz/1-B3-B49-C8-D724-4-CD5-8-BE4-1-F9-D9-A7516-EF.png (https://postimages.org/)
*
https://i.postimg.cc/zXdCsCkX/D080-EAEB-D618-40-B1-B2-DC-646-A04-FADE89.png (https://postimg.cc/CzqnDftW)
*
Our favourite article: https://billingsgazette.com/news/local/after-columbia-falls-hack-that-closed-schools-experts-call-for/article_e3a8584e-cd15-5f19-a4e0-37bc2dbb2a1c.html

[begin quote]
Flathead Valley authorities contacted the FBI about two days after threats began, once they realized the group was not local. Lawrence said experts from the CIA and NSA also became involved in investigating the hack.

"These were world-class people," Lawrence said.

At one point, unsuccessful raids were conducted in London attempting to locate hackers, Lawrence said. But hackers use programs that cycle rapidly through IP addresses, which can show where someone is connecting to the internet, masking their location.

"They actually kicked down a couple of doors," Lawrence said.
[end quote]
*
Our second favourite: https://www.ncsc.gov.uk/report/weekly-threat-report-3rd-november-2017

[begin quote]
The Dark Overlord Systematic cyber-enabled extortion

A cyber crime group called ‘The Dark Overlord’ has claimed responsibility for conducting cyber-enabled extortion campaigns in recent weeks. Victims include a London-based plastic surgery clinic and a Hollywood production studio, both of which are believed to have a number of high-profile clients. The group has a history of hacking organisations to obtain sensitive information before demanding money in exchange for not leaking it into the public domain. They leak snippets of data to the media to encourage them to report on their activity. This is aimed at “proving” that a breach has taken place, and increases the pressure on the victim to pay the ransom. ‘The Dark Overlord’ has been responsible for indiscriminately targeting health institutions, schools and media production companies over the last year.

Any organisation that deals with sensitive personal information (e.g. medical institutions, law firms) is at a higher risk of being targeted, and owes a particular duty of care to its clients because of the risk of severe emotional distress if client data is made public. Whilst evidence of the stolen data is often provided, the volume and sensitivity of the data may be exaggerated to maximise impact. This may inspire other cyber extortionists to adopt a similar methodology, especially as new opportunities present themselves due to an increasing amount of sensitive data being stored online. Any data breach and the associated media exposure may cause significant reputational damage and loss of business.
[end quote]

Listen to that one 'The Dark Overlord Systematic cyber-enabled extortion'. Beautiful.
*
Everyone is forgetting we shut down 50.000 students, 36 schools in an entire region of Montana for 7 days while we had the CIA, NSA, and FBI chasing ghosts around the region.

https://flatheadbeacon.com/2017/09/19/cyber-expert-sheds-light-hackers-motives-strategy/
https://flatheadbeacon.com/2017/09/18/authorities-overseas-hackers-seeking-extort-community-cyber-threats/
https://www.databreaches.net/montana-district-hacked-threatened-by-thedarkoverlord-offers-lessons-to-spokane-area-schools/
https://missoulian.com/news/local/ransom-letter-from-flathead-county-cyber-attackers-details-motive/article_ba037e6f-2267-5db3-95f2-ddbb20cba6a3.html
https://gizmodo.com/hackers-lock-down-entire-school-district-with-threats-1818542996
*
Q: why are you doing ransom instead of exploiting this information for insider trading
A: We're experts in systematic cyber-extortion, according to GCHQ. We do what we're best at.
*
Q: Do you have anything really damaging on Hillary or Obama?
A: We're unwilling to answer this question.

Q: Holy kek, FreeBSD is one of the most insecure OS, no joke.
A: We utilise Windows Embedded.
*
Q: That's a bit of a lame answer. Why pick a risky strategy like cyber extortion, when you can stay under the radar, and do insider trading from a beach in Asia?
A: We don't discuss out TTPs in public.
*
Our public key is on our Twitter. It's readily available on many keyservers and all over PasteBin and it's been signed into our official PR.
*
Q: Actually appears legit. On a scale of 1 to 10, how likely do you think it is that your leak could cause a former-sitting president to get lynched?
Also, hope your DMS shoots to a Blockchian.
A: We'd rather not say, for fear of his safety.

We'll be sharing a few new screencaps momentarily, to stir the pot a bit.

Q: Whats the deadline Big Corp has to pay up before the files are leaked.
A: It's not just one company. Our deadlines are fluid. We can't discuss specifics unless you're a client. We take our client relationships very seriously.

Q: This, I've been searching for a certified version of darkoverlord public key, and can't find one. This just points to more proof that this is a discord larp.
A: Read our posts as we specifically lay this out.

Q: Why not accept monero too?
A: Because we prefer BTC instead.
*
Q: So given your financial motivation, is it safe to assume you’re “group” is more anarchy than order?
That is to say, are you looking to shift power,take power, or destroy power?
A: We're not interested in power, only internet money.

Q: Their answer here will actually clue in their degree of technical competency. I'd add - justify why it will reach this price.
A: We haven't shared a price, at all. Depending on what a buyer would like, we adjust our offer.

Q: Iron Mountain is a military base. Why is a WTC Insurer shredding documents on it?
A: Great question. We'll direct you to ur official PR which details it. We'll quote the issue for you below:

"When major incidents like the WTC 911 incident happen, part of the litigation must involve SSI (Sensitive Security Information) and SCI (Special Compartment Information) from the likes of the FBI, CIA, TSA, FAA, DOD, and others being introduced into evidence, but of course this can't become public, for fear of compromising a nation's security, so they temporarily release these materials to the solicitor firms involved in the litigation with the strict demand they're destroyed after their use and that remain highly protected and confidential to only be used behind closed doors. However, humans aren't perfect and many of these documents don't become destroyed, and when thedarkoverlord comes along hacking all these solicitor firms, investment banks, and global insurers, we stumble upon the juiciest secrets a government has to offer."

Q: Hey do you take hack requests? I have a couple of bitcoins...
A: Visit our official Twitter @tdo_h4ck3rs where our contact details are readily available. We operate on a strict protocol and often times require bonding.
*
https://www.databreaches.net/thedarkoverlord-releases-files-related-to-9-11-investigations-and-litigation-threatens-to-release-more-if-companies-dont-pay-up/
*
Q: they aren't clearsigning correctly in this thread though
A: We tried to many times, but 4chan flags it as spam due to the random strings.
*
look guys im the gark overload. hers my PGP key:

agidfgaunguadnusandi23435834rn487bf87sebf78346b273r6b76sbrf7634b2r72df6ba7sdbf6243bfr7236grasnydf73n 487n238r7h2387fr2n3b8fr7na8s7fdn823erh72

My message is as follows: pay me some bitcoin so i can have lots of bits when the currency crashes. yea, that makes sense. all the shops will be dying to take my bitcoin when money is worth nothing.

Yeah we smart hackers.
*
we hackers but cant figure out how to type into 4chan lol.... jesus christ
*
Q: Any info on aliens?
A: Yes, here you go.
http://i.4cdn.org/pol/1546324212063.jpg

https://i.postimg.cc/hvvjTdQp/4-A25-B473-AAB0-4-FEE-A5-F7-2138-FEFAC681.jpg (https://postimg.cc/rR6MLzJr)
*
Q: Plz answer before 404, what is the significance of the painting you used in the OP and as your twitter pic? Why use that painting in particular?
A: We're unwilling to provide too many details, but the painting is quite nice, don't you think? The artist is a wonderful person.

Q: I would imagine you guys are pretty high up on the wanted list by now, has the deep state tried anything against you guys yet?
A: https://www.databreaches.net/exclusive-government-attempt-to-compromise-us-with-nit-failed-thedarkoverlord/
https://www.databreaches.net/govt-served-twitter-with-a-fisa-order-to-deploy-nit-against-us-thedarkoverlord/
*
Q: why leak on new years eve
A: Because it forces about a dozen Fortune 500 companies in the UK and USA to build damage control and COA plans on their New Years holiday, robbing them of any pleasure and bringing in their new year at a new low.
*
Q: if i purchase the doc's, whats stopping me uploading it everywhere? will you guys get annoyed?
A: Once we're paid, they're yours. You do as we you wish. We couldn't care any less.

Q: yeah has there been any strange **** happening that makes you think they're on to you or that you've being targetted already?
A: Other than them telling victims to pay us because it's the best move to save their arses, we sleep like babies.

Q: Likes,kind of a career ending big heist, don't you think?
A: We already live like the ending of a great heist movie, on warm beaches with loads of internet money. We're quite happy.
*
Q: Why do you care about their pleasure or them starting new year at all time low, thought this was all just business?
A: It's all business. Psychologically, they're most vulnerable when this process is used and it resutls in higher success rates for us.

Q: Apparently the guy they caught was in Serbia.
A: A complete random stranger.
*
Q: The question about crypto was good, do you have any predictions about BTC next year and do you think it's still the best currency to invest in?
A: We predict we'll earn even more BTC. As our clients are paying us while we have them bent over a barrel, we always advise them to buy up for their personal portfolios.
*
Q: Do you have a deadman set up
A: We do.
*
Right, lads. It's been a wonderful time. We outlasted the trolls. Follow our official Twitter @tdo_h4ck3rs for more updates soon. We'll be making history. Make sure to download our archive and seed it.

DeDukshyn
3rd January 2019, 02:47
Image is from x files prop.

https://makeupmag.com/the-x-files-returns-with-a-new-group-of-monsters/

From "Makeupmag.com"

https://makeupmag.com/wp-content/uploads/2016/02/1-alien-autopsy.jpg

Innocent Warrior
3rd January 2019, 02:56
4chan thread: That hacker called 4chan - 9/11 happening (http://boards.4chan.org/pol//thread/198405410/that-hacker-called-4chan-911-happening)

OP -

>On Monday, New Year’s Eve, a hacker group announced it had breached a law firm handling cases related to the September 11 attacks, and threatened to publicly release a large cache of related internal files unless their ransom demands were met.

>The news is the latest public extortion attempt from the group known as The Dark Overlord, which has previously targeted a production studio working for Netflix, as well as a host of medical centres and private businesses across the United States.

https://motherboard.vice.com/en_us/article/yw79k5/hacker-group-threatens-dump-911-insurance-files-dark-overlord

They visited us earlier today to answer questions and ****post for a while.

Their first post on 4/pol/: >>198358308 (http://boards.4chan.org/pol/thread/198337573#p198358308)

Their AMA thread: >>198364116 (http://boards.4chan.org/pol/thread/198364116#p198364116)

Last thread: >>198382406 (http://boards.4chan.org/pol/thread/198382406#p198382406)

Possible UFO leak coming: >>198367910 (http://boards.4chan.org/pol/thread/198364116#p198367910)

Tweet confirming it was them, not a LARPer: https://twitter.com/tdo_h4ck3rs/status/1079952190830039040

Also,

>Official release: three files to prove our claims of 911 CONFIDENTIAL docs

https://twitter.com/tdo_h4ck3rs/status/1079955132492668928

Innocent Warrior
3rd January 2019, 03:12
To me, a thief is a thief. They seem to be into this for monetary gain alone, in it for themselves. To me that's just wrong.
Hope they get caught.

Yes, criminal hackers and extortionists, in it for the money, they state this themselves.

The effect could be huge, it could be nothing, time will tell. This thread is a record, not championing criminals.

Innocent Warrior
3rd January 2019, 03:21
Their Twitter account has been suspended.


"We're announcing our #Bitcoin payment plan to release 9.11 documents via a compounding release plan. Read here: https://pastebin.com/8ksc0aYU #tdohacked911 #hacking #cybercrime #leak #hack #thedarkoverlord #911hacked #topsecret #bitcoin #paymentplan #GoFundMe #911truth #truth"

RAW paste data from this pastbin -

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

This is the thedarkoverlord here to deliver a message.

Our Official Bitcoin Wallet Address: 192ZobzfZxAkacLGmg9oY4M9y8MVTPxh7U

As the world is aware, we released our first decryption key for the 'Preview_Documents.container' Veracrypt container that contained a small sample of documents to continue to verify the authenticity of our claims. The decryption key for this container is: *CZ4=I{YZ456zGecgg9/cCz|zNP5bZ,nCvJqDZKrq@v?O5V$FezCNs26CD;e:%N^

There's five layers to go. Layer 1, 2, 3, 4, and fine finally Layer 5. Each layer contains more secrets, more damaging materials, more SSI, more SCI, more government investigation materials, and generally just more truth. Consider our motivations (money, specifically Bitcoin), we're not inclined to leak the juiciest items until we're paid in full. However, in the interest of public awareness and transparency, we're officially announcing our tiered compensation plan. Below, we'll announce the required cost to release each layer of damaging documents that are filled with new truths, never before seen. There's only one way we can be paid: Bitcoin. There's two ways for you to pay us: you can acquire BTC on your own and send it to our address and build the pool directly, or you can bundle into groups and communities and create GoFundMe pages that collect large amounts of fiat that can then be converted, by the community leader, and used to purchase BTC to throw into our wallet address. As more BTC is generated, more information will be released. We're also going to introduce checkpoints between each major funding goal that will result in some small samples to be released from the next layer before the entire layer is allowed to be decrypted. Our compensation structure follows:

Preview_Documents.container - Free, we released the key to prove authenticity of our claims.

Checkpoint 01 - 250 USD of BTC = 25 'random' documents from Layer 1.
Checkpoint 02 - 500 USD of BTC = 25 'random' documents from Layer 1.
Checkpoint 03 - 750 USD of BTC = 40 'random' documents from Layer 1.
Checkpoint 04 - 1.000 USD of BTC = 50 'random' documents from Layer 1.

Layer_1.container - 5.000 USD of BTC (All Layer 1 Documents)

Checkpoint 05 - 6.500 USD of BTC = 50 'random' documents from Layer 2.
Checkpoint 06 - 8.500 USD of BTC = 50 'random' documents from Layer 2.
Checkpoint 07 - 12.000 USD of BTC = 50 'random' documents from Layer 2.
Checkpoint 08 - 25.000 USD of BTC = 50 'random' documents from Layer 2.

Layer_2.container - 50.000 USD of BTC (All Layer 2 Documents)

Checkpoint 09 - 65.000 USD of BTC = 100 'random' documents from Layer 3.
Checkpoint 10 - 85.000 USD of BTC = 100 'random' documents from Layer 3.

Layer_3.container - 100.000 USD of BTC (All Layer 2 Documents)

Checkpoint 11 - 250.000 USD of BTC = 250 'random' documents from Layer 4.
Checkpoint 12 - 500.000 USD of BTC = 250 'random' documents from Layer 4.

Layer_4.container - 1.000.000 USD of BTC (All Layer 4 Documents)

Checkpoint 13 - 1.500.000 USD of BTC = 5 'random' documents from Layer 5.

Layer_5.container - 2.000.000 USD of BTC (All Layer 5 Documents)

To clarify this structure, if we reach 10.000 USD of BTC, we'll release the 'Layer_1.container' decryption key to the public via our official Twitter. If another 90.000 USD of BTC is donated (for a total of 100.000 USD of BTC at this point), we'll release the decryption key for 'Layer_2.container' via our official Twitter, and so on. The compensation is compounding structure, with the totals to be calculated from the deposits into the BTC address at the time of their deposits.

We have a long history of trustworthy negotiations and resolutions with many clients of ours. It's our goal to be financially compensated before we initiate any brazen actions. You're motivated by your passions for the truth, and we're motivated by our passion and love for Bitcoin. Let's come to together and meet in the middle.

Our Official Bitcoin Wallet Address: 192ZobzfZxAkacLGmg9oY4M9y8MVTPxh7U

We've publicly released the archive of the 911 World Trade Center Litigation documents publicly. There's thousands of files included in the archive. Everyone can freely have a copy of the archive and we would encourage it. However, the archive is completely encrypted using a very strong AES encryption and very strong master keys that will prevent anyone from decrypting the veracrypt containers until we publicly release the keys for each layer. The archive is split between five layers. Layer 1 being the most modest, and Layer 5 containing the most heavy hitting and impactful documents, with Layer 2, Layer 3, and Layer 4 containing ever-increasingly scandalous materials. We encourage everyone to obtain a copy of all five archives. As time goes on, we may publicly release keys for each of these containers if our requests from the involved companies are not met. The link to download the 10 GB archive is below. Stay tuned for the possible release of more decryption keys. We may release these keys on our new official Twitter page (@tdo_h4ck3rs) and/or on the dark web hacker forum 'KickAss'.

Below is the link to the torrent file to download the archive. The SHA1 Hash is calculated from '911_Archive.zip'.

LINK: https://anonfiles.com/6fx7q6pfb6/911_Archive.zip_torrent
SHA1 HASH: F4C18CF980648E9FBDAC55952F5F3485DBBA95F9

And finally, a message to the companies directly involved to include the airlines, government agencies, the dozens of solicitor firms, the insurers, and the many others, this is a message directly to you: pay the **** up, or we're going to bury you with this. If you continue to fail us, we'll escalate these releases by releasing the keys, each time a Layer is opened, a new wave of liability will fall upon you. You know our contact details.

You're welcome, heathens and what's the final lesson? When you're a client of ours and you've accepted an agreement of ours: follow it to the letter. We're not motivated by any political thoughts. We're not hacktivists. We're motivated only by our pursuit of internet money (Bitcoin).

Stay tuned on PasteBin for future announcements related to this leak. We'll always sign all of our releases for verification of authenticity. Subsequent announcements may include this original announcement.

Your friends,
thedarkoverlord (@tdo_h4ck3rs)
Professional Adversarial Threat Group
TheDarkOverlord Solutions LLC, World Wide Web, LLC

Give us a follow on our new Twitter (@tdo_h4ck3rs)!

P.S. We have more documents like these from other hacks of ours. If you're interested in industry specific materials, we can supply them for your purchase. We have dozens of TBs of data from almost all industries! We have everything from customer databases, medical records, credit cards, intellectual property, classified materials, source code, and much more and it's all for sale. Many of our for-sale threads are on the dark web hacker forum 'KickAss' and they detail our requested prices and the content available. We're of course always negotiable on pricing.

P.S.S. To all of our current and past associates, clients, colleagues, customers, and friends: we thank you for your entertaining exchanges and relationships and we wish you continued success.

OFFICIAL BITCOIN ADDRESS:
192ZobzfZxAkacLGmg9oY4M9y8MVTPxh7U

CONTACT AND LOCATION DETAILS:
thedarkoverlord E-Mail Address: tdohackers@protonmail.com
Backup1 E-Mail Address: thedarkoverlord@msgsafe.io
Backup2 E-Mail Address: thedarkoverlord@torbox3uiot6wchz.onion
Make your own at (torbox3uiot6wchz.onion)
KickAss Tor Address: kickassugvgoftuk.onion

OUR ONLY PGP KEY:

- - - - -----BEGIN PGP PUBLIC KEY BLOCK-----
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=CEJk
- - - - -----END PGP PUBLIC KEY BLOCK-----

END
-----BEGIN PGP SIGNATURE-----
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=G7N+
-----END PGP SIGNATURE-----

Innocent Warrior
3rd January 2019, 03:37
From the RT article in the OP -


...promising to release the encryption keys if their demands were not met in a post on Pastebin (https://pastebin.com/4F5R8QyQ) on Monday.

It's changed twice since. Could be that they decided to create another pastebin to outline the payment structure because it included that information last night, now there's another pastebin with the payment information and it's no longer in the original one linked in this post. Posting the RAW paste data here for the record (I omitted keys/signature) -

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

This is the thedarkoverlord here to deliver a message.

For those of you who live in the Nothern Hemisphere of planet Earth, Autumn has come to an end and Winter has arrived. The deciduous trees have been stripped nude with their discoloured leaves having fallen to the ground. Many creatures have had to prepare for their hibernation in Winter, eating and then gaining body fat (similar to humans during the holidays which are celebrated during this time of year). However, the creatures that make up thedarkoverlord do not hibernate, sleep, slow down, pause, or stop. For they work around the clock, pillaging and taking whatever they desire or seeping through the cracks of the foundation of the unlucky entity they targeted, weaving into them undetected and striking with surgical precision.

As 2018 has drawn to a close, we're welcoming 2019 with open arms and a big announcement, as we've done in the past. Many companies have received letters from us in the past few days and everyone who's a prospective client of ours should take note of this announcement.

Throughout our demonic fits of hacking, we often come across or create situations that turn quite peculiar very quickly. One such case was when we initiated an action against a seemingly ordinary company located in the United States, that unfortunately, didn't turn out the way we wanted. We breached their network and stole hundreds of gigabytes of litigation related documents (and others, that the world may soon come to see). We investigated our grand pile of loot and we found documents in regards to one of the most infamous events in the history of the United States. The key is that the documents were not public, nor would this company want them public. Not to mention thousands of documents surrounding companies such as Monsanto, Bank of America, and many other Fortune 500 companies. Hundreds of thousands of documents. What sorts of documents, specifically? E-mails, retainer agreements, non-disclosure agreements, settlements, litigation strategies, liability analysis, defence formations, collection of expert witness testimonies, testimonies, communications with government officials in countries all over the world, voice mails, dealings with the FBI, USDOJ, DOD, and more, confidential communications, and so much more.

We immediately approached this company with our most handsome business proposition, which they were reluctant to accept. However, they ultimately accepted and provided us a financial payment that satisfied our agreement. However, as with previous clients in the past (we're looking at you: Larson Studios), this client of ours also violated the agreement and began cooperating with law enforcement, which our agreements strictly forbid unless it's legally required of the client. This involvement with law enforcement became clear to us months later through a source of ours disclosing details of the client to us that we never informed the source about. We were absolutely appalled by this transgression against our agreement. We decided to offer this company a second chance to repent, accept responsibility, and satisfy our penalty request. They declined to accept our offer, so we're here today.

Let's get right into the juicy bits, shall we? Since our organisation has been around, we've performed many hacks that have resulted in some hilarious news articles and reports, grandiose stories of entire regions closing schools, NSA, CIA, GCHQ investigating us, hoping to hunt us down, raids all over the world, arrests of alleged members, and so much more. Most of you may know us from our hacks of Netflix and other studios such as ABC, HBO, CBS, and others. We do hope you haven't cancelled your subscription to them. However, the entire planet will now know our name as a result of a single client of ours failing our arrangement and refusing to accept the fair penalties. Edward Snowden leaks were quite impressive and caught the world's attention due to the highly sensitive nature of the materials and the global impact. What we're about to announce and leak will top Edward Snowden's finest work, both in volume and in impact. We'll guarantee to all our astute readers that the subsequent release of these materials will generate millions of news articles and result in the biggest and most significant data breach ever to have occurred.

Before we continue onto the story at hand, we'd like to remind the people of this planet who we are. We're now going to quote one of our own posts that we made on the very famous dark web hacker market and forum 'KickAss' (which you can find at the Tor address after this message) that was in response to a forum member stating that most hackers have nothing to worry about "if you're hacking a small dog food shop website, the people that will be after you won't be the same people that after you if you are carbanak."

OUR RESPONSE:

"That's strange. We hack 'small dog food shops' regularly and yet we're hunted by the NSA and CIA. Our threat model is quite different than the majority of KA users. In fact, GCHQ has publicly released an advisory about thedarkoverlord hacking organisation. The NSA and even the CIA have been confirmed as hunting down thedarkoverlord. We're more hunted than Carbanak.

Our favourite article: https://billingsgazette.com/news/local/after-columbia-falls-hack-that-closed-schools-experts-call-for/article_e3a8584e-cd15-5f19-a4e0-37bc2dbb2a1c.html

[begin quote]
Flathead Valley authorities contacted the FBI about two days after threats began, once they realized the group was not local. Lawrence said experts from the CIA and NSA also became involved in investigating the hack.

"These were world-class people," Lawrence said.

At one point, unsuccessful raids were conducted in London attempting to locate hackers, Lawrence said. But hackers use programs that cycle rapidly through IP addresses, which can show where someone is connecting to the internet, masking their location.

"They actually kicked down a couple of doors," Lawrence said.
[end quote]

Our second favourite: https://www.ncsc.gov.uk/report/weekly-threat-report-3rd-november-2017

[begin quote]
The Dark Overlord Systematic cyber-enabled extortion

A cyber crime group called ‘The Dark Overlord’ has claimed responsibility for conducting cyber-enabled extortion campaigns in recent weeks. Victims include a London-based plastic surgery clinic and a Hollywood production studio, both of which are believed to have a number of high-profile clients. The group has a history of hacking organisations to obtain sensitive information before demanding money in exchange for not leaking it into the public domain. They leak snippets of data to the media to encourage them to report on their activity. This is aimed at “proving” that a breach has taken place, and increases the pressure on the victim to pay the ransom. ‘The Dark Overlord’ has been responsible for indiscriminately targeting health institutions, schools and media production companies over the last year.

Any organisation that deals with sensitive personal information (e.g. medical institutions, law firms) is at a higher risk of being targeted, and owes a particular duty of care to its clients because of the risk of severe emotional distress if client data is made public. Whilst evidence of the stolen data is often provided, the volume and sensitivity of the data may be exaggerated to maximise impact. This may inspire other cyber extortionists to adopt a similar methodology, especially as new opportunities present themselves due to an increasing amount of sensitive data being stored online. Any data breach and the associated media exposure may cause significant reputational damage and loss of business.
[end quote]

Listen to that one 'The Dark Overlord Systematic cyber-enabled extortion'. Beautiful.

As you can see, publicly reported proof that we have nation-states hunting us, and we're still here, stronger than ever. We have government agencies from all over the world writing advisories about our threat activities:

https://info.publicintelligence.net/FBI-CyberCriminalsSchools.pdf
https://www.washingtonpost.com/news/answer-sheet/wp/2017/10/26/education-department-warns-of-new-hacker-threat-as-dark-overlord-claims-credit-for-attacks-on-school-districts/??noredirect=on

[begin quote]
TDO engages in a pattern of verbal abuse and threats of violence during communication with victims, regardless of the victims’ willingness to pay extortion demands. In a recent incident, TDO threatened to publicize the sensitive behavioral reports and private health information of students. Throughout September and October 2017, TDO was reportedly connected to multiple threats of violence on school campuses, often prior to extortion attempts.
[end quote]

In fact, you can find dozens of videos of law enforcement agents standing behind podiums speaking about how they're working to stop us, from making appearances in conferences all over the world, to speaking behind podiums in their districts after we've pwned a local business. The United States Congress has even had a hearing about us, true story, and Christopher Wray himself (director of the U.S. FBI) has testified about his efforts against us.

Enjoy the director of the FBI speaking to U.S. Congress about thedarkoverlord: https://flatheadbeacon.com/2017/09/27/daines-raises-concerns-cyber-terrorism-fbi-director/

[begin quote]
Daines: “So I understand it’s an active investigation and you’re limited in finding details however looking back at the big picture, what is the F.B.I. doing to attribute these cyber crimes and help bring these criminals to justice?”

Wray: “There’s a of variety of technological things we can do. We are also working with partners to try to exchange information to help identify telltale signs that may help us link back to particular organizations. I think one of things we’re seeing more and more in this area as much as any other is how this stuff transcends boundaries, and so some of the same organizations are targeting victims in other countries as well. We’re really working more and more with our partners to try to see if we can have their two plus our two to get more than four, to get five and six and so that we can really deal with these otherwise very elusive foes.”
[end quote]

Listen to this: 'so that we can really deal with these otherwise very elusive foes.'. We're 'very elusive foes'. Brilliant. Not to mention we're published in virtually every major news publication. Let's chat about threat models, shall we?"

END OF RESPONSE

We had the United State's Congress speaking about us then, now we'll see how they speak about now, after this announcement. Now that you're present on who we are and what we've done, let's dive deeper into this announcement.

Earlier in 2018, there was a fantastic and very brief article that was published about a global insurer being hacked. The hackers weren't named and the story fell to the darkness shortly after it came about. No further mentions were made. You might guess who these hackers were. Hello world! What was that story? It was this one: http://www.globallegalpost.com/big-stories/us-law-firm-hack-hits-global-insurer-15490236/

What's the takeaway? We hacked Hiscox Syndicates Ltd.

And why didn't Hiscox Syndicates Ltd make this more public? Well, keep reading on to find out! It wasn't just Hiscox Syndicates Ltd that was put at risk, it was Lloyds of London as well as others. Another entity unnamed in this article is Lloyds of London and who we'll attribute as also being involved. Hiscox Syndicates Ltd and Lloyds of London are some of the biggest insurers on the planet insuring everything from the smallest policies to some of the largest policies on the planet, and who even insured structures such as the World Trade Centers. At this point, the keen amongst you may finally be drawing conclusions at this point, but you'll still be astonished at what's to come. Keep reading. This also means that Silverstein Properties is involved, doesn't it? Now things are getting more interesting. Most of you readers will not be privy to the processes and methods utilised by Fortune 500s to litigate high-impact cases, but we are, and thankfully for us, we're going to let you in on this process. When major incidents like the WTC 911 incident happen, part of the litigation must involve SSI (Sensitive Security Information) and SCI (Special Compartment Information) from the likes of the FBI, CIA, TSA, FAA, DOD, and others being introduced into evidence, but of course this can't become public, for fear of compromising a nation's security, so they temporarily release these materials to the solicitor firms involved in the litigation with the strict demand they're destroyed after their use and that remain highly protected and confidential to only be used behind closed doors. However, humans aren't perfect and many of these documents don't become destroyed, and when thedarkoverlord comes along hacking all these solicitor firms, investment banks, and global insurers, we stumble upon the juiciest secrets a government has to offer.

What's the takeaway? We hacked Lloyds of London and Silverstein Properties.

This release of 911 Litigation Documents is highly exclusive and only available from thedarkoverlord! For a limited time only, we're leaking the first few documents as proof of our trove on the famous dark web hacker forum 'KickAss'. For those of you who are most interested in acquiring the entire set of documents, which counts at over 18.000 documents, to include .doc, .pdf, .ppt, .xls, .tif, .msg, and many other interesting formats (or just to acquire the most highly secret and confidential documents), the good news for you is that we'll be selling these documents for a limited time. If you're a terrorist organisation such as ISIS/ISIL, Al-Qaeda, or a competing nation state of the USA such as China or Russia, you're welcome to purchase our trove of documents. You can easily contact us on the dark web hacker forum 'KickAss' or by e-mailing us at the e-mail found below. We'll also sign our PGP key into this message so that you may use our PGP key to contact us if you prefer to be more discreet.

What we'll be releasing is the truth. The truth about one of the most recognisable incidents in recent history and one which is shrouded in mystery with little transparency and not many answers. What we're offering to the world is the truth, exclusively from us, one of the planets premier hacking organisations dedicated to breaching leading targets and acquiring the most scandalous materials that we may use in our systematic extortion campaigns.

If a full public release happens in the near future, we'll guarantee that we're going to withhold only the most highly confidential and sensitive documents for private sale. For the rest of you: don't worry, there's thousands of documents still to go around.

If you're one of the dozens of solicitor firms who was involved in the litigation, a politician who was involved in the case, a law enforcement agency who was involved in the investigations, a property management firm, an investment bank, a client of a client, a reference of a reference, a global insurer, or whoever else, you're welcome to contact our e-mail below and make a request to formally have your documents and materials withdrawn from any eventual public release of the materials. However, you'll be paying us.

If you're a member of the press and would like to make an enquiry, you may do so at our press e-mail which is well known by members of the press. You may acquire this from any reporters who've published our quotes, as they all have it and will accept this signed announcement as permission to share our press e-mail address with you.

We've linked below sixteen images from a very few of the documents from the legal firm Blackwell Sanders Peper Martin, who is now Husch Blackwell. More details and files are available on the KickAss dark web hacker forum.

https://cdn1.imggmi.com/uploads/2018/12/28/1d319c019efc0a2d71e518329481b032-full.jpg
https://cdn1.imggmi.com/uploads/2018/12/28/ac29bc3f47ce71191b2789f777a23297-full.jpg
https://cdn1.imggmi.com/uploads/2018/12/28/df753ce9111fcde67dea986403c127eb-full.jpg
https://cdn1.imggmi.com/uploads/2018/12/28/99b91cd19e7490d7772b01a7ac272ee9-full.jpg
https://cdn1.imggmi.com/uploads/2018/12/28/ed92d235c94b2b06a10a0a65013c0cb6-full.jpg
https://cdn1.imggmi.com/uploads/2018/12/28/1edf63b4f4cc9f2c7fbad89625f5757b-full.jpg
https://cdn1.imggmi.com/uploads/2018/12/28/dedacabd7dea45a8910569677e8135b6-full.jpg
https://cdn1.imggmi.com/uploads/2018/12/28/48b2689ad6adc168951731207547ef8c-full.jpg
https://cdn1.imggmi.com/uploads/2018/12/28/8d99746f5b2c7ec6f1b7ed4dbf0074d3-full.jpg
https://cdn1.imggmi.com/uploads/2018/12/28/43b37e3a09cf880e5895379b060b9d09-full.jpg
https://cdn1.imggmi.com/uploads/2018/12/28/b5425d0f13fdf1a60a0a8efc992be9fe-full.jpg
https://cdn1.imggmi.com/uploads/2018/12/28/555fec6a26b6981b460079bd168a33a6-full.jpg
https://cdn1.imggmi.com/uploads/2018/12/28/6dbe877122e82837bbeee831fc509537-full.jpg
https://cdn1.imggmi.com/uploads/2018/12/28/92a63f76bb1b31d5c6e032e130b81870-full.jpg
https://cdn1.imggmi.com/uploads/2018/12/28/89e1cc9055818f153fe928543fe315cd-full.jpg
https://cdn1.imggmi.com/uploads/2018/12/28/697109e0c3816ae39d0a0ffdd7c23610-full.jpg

If the images above are taken down, use the link below:

LINK: https://anonfiles.com/59G5hep8ba/images_zip

We're also releasing a small part of the larger archive of the 911 World Trade Center Litigation documents publicly. There's thousands of files included in the archive. Everyone can freely have a copy of the archive and we would encourage it. However, the archive is completely encrypted using a very strong AES encryption and very strong master keys that will prevent anyone from decrypting the veracrypt containers until we publicly release the keys for each layer. The archive is split between five layers. Layer 1 being the most modest, and Layer 5 containing the most heavy hitting and impactful documents, with Layer 2, Layer 3, and Layer 4 containing ever-increasingly scandalous materials. We encourage everyone to obtain a copy of all five archives. As time goes on, we may publicly release keys for each of these containers if our requests from the involved companies are not met. The link to download the 10 GB archive is below. Stay tuned for the possible release of decryption keys. We may release these keys on our new official Twitter page (@tdo_h4ck3rs) and/or on the dark web hacker forum 'KickAss'.

Below is the link to the torrent file to download the archive. The magnet URL follows the PGP at the end of this release.

LINK: https://anonfiles.com/6fx7q6pfb6/911_Archive.zip_torrent
SHA1 HASH: F4C18CF980648E9FBDAC55952F5F3485DBBA95F9

And finally, a message to the companies directly involved to include the airlines, government agencies, the dozens of solicitor firms, the insurers, and the many others, this is a message directly to you: pay the **** up, or we're going to bury you with this. If you continue to fail us, we'll escalate these releases by releasing the keys, each time a Layer is opened, a new wave of liability will fall upon you. You know our contact details.

You're welcome, heathens and what's the final lesson? When you're a client of ours and you've accepted an agreement of ours: follow it to the letter. We're not motivated by any political thoughts. We're not hacktivists. We're motivated only by our pursuit of internet money (Bitcoin).

Stay tuned on PasteBin for future announcements related to this leak. We'll always sign all of our releases for verification of authenticity. Subsequent announcements may include this original announcement.

Your friends,
thedarkoverlord (@tdo_h4ck3rs)
Professional Adversarial Threat Group
TheDarkOverlord Solutions LLC, World Wide Web, LLC

Give us a follow on our new Twitter (@tdo_h4ck3rs)!

P.S. We have more documents like these from other hacks of ours. If you're interested in industry specific materials, we can supply them for your purchase. We have dozens of TBs of data from almost all industries! We have everything from customer databases, medical records, credit cards, intellectual property, classified materials, source code, and much more and it's all for sale. Many of our for-sale threads are on the dark web hacker forum 'KickAss' and they detail our requested prices and the content available. We're of course always negotiable on pricing.

P.S.S. To all of our current and past associates, clients, colleagues, customers, and friends: we thank you for your entertaining exchanges and relationships and we wish you continued success.

CONTACT AND LOCATION DETAILS:
thedarkoverlord E-Mail Address: tdohackers@protonmail.com
Backup1 E-Mail Address: thedarkoverlord@msgsafe.io
Backup2 E-Mail Address: thedarkoverlord@torbox3uiot6wchz.onion
Make your own at (www.torbox3uiot6wchz.onion)
KickAss Tor Address: kickassugvgoftuk.onion

[...]
-----END PGP SIGNATURE-----

onawah
3rd January 2019, 03:53
I hope this isn't just a black op to make Wikileaks look bad.
On the other hand, it would be fantastic if Wilileaks hacked darkoverlord and published the material they claim to have for free!

DNA
3rd January 2019, 04:02
Our boy Alex Jones is finding some traction in all of this. You have to go to the link below to see the video I can not figure out how to imbed his new video format.



https://www.infowars.com/trump-strikes-back-hackers-set-to-release-secret-9-11-emails/
TRUMP STRIKES BACK: Hackers Set To Release Secret 9/11 Emails

‘Dark Overlord’ group blackmails Twin Tower insurance companies, threatens to expose inside job

Infowars.com - January 2, 2019

A hacker group calling themselves “The Dark Overlord” is threatening to release over 1,800 documents regarding the terror attacks on 9/11. Alex breaks down how the patriots are preparing to drop the hammer on the Deep State.

Hazelfern
3rd January 2019, 04:56
Stepping away.

Innocent Warrior
3rd January 2019, 07:28
Preview documents decrypted, on Google Drive: https://drive.google.com/drive/mobile/folders/1oiPWfQy3TO0ZW-LGLKipdpl-DltAyXMu

I don’t have time to look at them but I watched part of a video of Joseph Cox from Motherboard going through them before I found the docs and they look legit. From what I watched there’s nothing new revealed, although they appear to support things we do know about 9/11.

Takeaway info: they appear to be real.

***

They’ve received enough BC in their wallet (https://www.blockchain.com/btc/address/192ZobzfZxAkacLGmg9oY4M9y8MVTPxh7U) for the first checkpoint to be passed, their Pastebin message about that: https://pastebin.com/iUW6bavE

The text (I’ve omitted lengthy contact details, key etc.) -

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

This is the thedarkoverlord here to deliver a message.

We're now calling this megaleak, the '9/11 Papers'.

Congratulations, public. A transfer to our official Bitcoin wallet was completed in the amount of 0.08 BTC which passes 'Checkpoint 01' of the 9/11 Papers leak. As promised, we're now releasing 25 random documents from, the yet to be decrypted, Layer 1. We're not releasing the key for Layer 1 yet, as our other checkpoints haven't been met. However, Checkpoint 01 of this Mega-leak has been passed.

Enjoy the well earned data.

LINK: https://anonfiles.com/s5Zd2dp4b4/Checkpoint_01_zip
SHA-1 HASH: 2978A2CB1D2E8B139B17DE5503C4D415AD59267B

We hope that there'll be more releases. Keep up the Bitcoin payments. Our reward: internet money, your reward: 9/11 secret documents, never before seen by the public. Your money is unlocking the truth and providing answers. Keep it flowing.

United States law enforcement agencies have attempted to silence us from our releases by requesting Twitter to suspend our account. An appeal to Twitter has gone unanswered. We'd like everyone to know that we're still here. We've taken to Reddit with our own sub. We'll provide updates as we have them.

Our sub-reddit: https://www.reddit.com/r/thedarkoverlords

Second Press Release: https://pastebin.com/8ksc0aYU
Original Press Release: https://pastebin.com/4F5R8QyQ

Stay tuned on PasteBin for future announcements related to this leak. We'll always sign all of our releases for verification of authenticity.

Your friends,
thedarkoverlord
Professional Adversarial Threat Group
TheDarkOverlord Solutions LLC, World Wide Web, LLC

END OF TEXT

That sub-reddit has been deleted.

Corfitz
3rd January 2019, 09:16
Aaaaand it's gone ( sub reddit )

Innocent Warrior
3rd January 2019, 15:13
From thedarkoverlord blog on Steemit. (https://steemit.com/@thedarkoverlord/)

thedarkoverlord Is Now On Steemit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

This is the thedarkoverlord here to deliver a message.

United States law enforcement agencies have attempted to silence us from our releases by requesting Twitter to suspend our account. We took to Reddit, and again they suspended us. Now, we're taking to the blockchain, so that we can't be silenced again. We're on Steemit now. Checkmate.

Our new hub: https://steemit.com/@thedarkoverlord/

We're going to be posting content soon.

Fourth Press Release: https://pastebin.com/mze4DTvB
Third Press Release: https://pastebin.com/iUW6bavE
Second Press Release: https://pastebin.com/8ksc0aYU
Original Press Release: https://pastebin.com/4F5R8QyQ

Stay tuned on PasteBin for future announcements related to this leak. We'll always sign all of our releases for verification of authenticity.

Your friends,
thedarkoverlord
Professional Adversarial Threat Group
TheDarkOverlord Solutions LLC, World Wide Web, LLC

OFFICIAL BITCOIN ADDRESS:
192ZobzfZxAkacLGmg9oY4M9y8MVTPxh7U

CONTACT AND LOCATION DETAILS:
thedarkoverlord E-Mail Address: tdohackers@protonmail.com
Backup1 E-Mail Address: thedarkoverlord@msgsafe.io
Backup2 E-Mail Address: thedarkoverlord@torbox3uiot6wchz.onion
Make your own at (torbox3uiot6wchz.onion)
KickAss Tor Address: kickassugvgoftuk.onion
-----BEGIN PGP SIGNATURE-----
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=c1yo
-----END PGP SIGNATURE-----

Source (https://steemit.com/thedarkoverlord/@thedarkoverlord/thedarkoverlord-is-now-on-steemit).

Innocent Warrior
3rd January 2019, 15:18
Impersonations of thedarkoverlord

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

https://pastebin.com/BfTVeGhG

This is the thedarkoverlord here to deliver a message.

We've been alerted that there's several Twitter accounts and other accounts on social media attempting to impersonate and take credit for our hard work. One such profile is @TheRealDarkOL on Twitter. This is not us.

We sign all of our messages with our official PGP key. Our only official presence on the internet at this moment is KickAss and Steemit at https://steemit.com/@thedarkoverlord

Your friends,
thedarkoverlord
Professional Adversarial Threat Group
TheDarkOverlord Solutions LLC, World Wide Web, LLC

Subscribe to our official Steamit: https://steemit.com/@thedarkoverlord

OFFICIAL BITCOIN ADDRESS:
192ZobzfZxAkacLGmg9oY4M9y8MVTPxh7U

CONTACT AND LOCATION DETAILS:
thedarkoverlord E-Mail Address: tdohackers@protonmail.com
Backup1 E-Mail Address: thedarkoverlord@msgsafe.io
Backup2 E-Mail Address: thedarkoverlord@torbox3uiot6wchz.onion
Make your own at (torbox3uiot6wchz.onion)
KickAss Tor Address: kickassugvgoftuk.onion
-----BEGIN PGP SIGNATURE-----
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=yKH6
-----END PGP SIGNATURE-----

Source (https://steemit.com/thedarkoverlord/@thedarkoverlord/impersonations-of-thedarkoverlord).

Innocent Warrior
3rd January 2019, 15:45
SUMMARY

The Dark Overlord (TDO) has released four press releases on PasteBin.

The original press release has been removed from PasteBin, content of that release can be found HERE (https://steemit.com/thedarkoverlord/@thedarkoverlord/press-release-01-new-year-s-eve-disclosure) on TDO’s Steemit blog and in post #12 (http://projectavalon.net/forum4/showthread.php?105535-Hacker-group-threatens-to-leak-9-11---truth---unless-paid-in-Bitcoin&p=1267354&viewfull=1#post1267354) of this thread.

The second press release has also been removed from PasteBin, content of that release can be found HERE (https://steemit.com/thedarkoverlord/@thedarkoverlord/press-release-02-crypto-cash-for-crypto-cache) on TDO’s Steemit blog and HERE (http://projectavalon.net/forum4/showthread.php?105535-Hacker-group-threatens-to-leak-9-11---truth---unless-paid-in-Bitcoin&p=1267348&viewfull=1#post1267348) in post #11 of this thread.

The third press release is currently HERE (https://pastebin.com/iUW6bavE) on PasteBin. Contents of this press release can be found HERE (https://steemit.com/thedarkoverlord/@thedarkoverlord/press-release-03-9-11-papers-megaleak-checkpoint-01) on TDO’s Steemit and HERE (http://projectavalon.net/forum4/showthread.php?105535-Hacker-group-threatens-to-leak-9-11---truth---unless-paid-in-Bitcoin&p=1267377&viewfull=1#post1267377) in post #16 of this thread.

The fourth press release is currently HERE (https://pastebin.com/mze4DTvB) on PasteBin. The contents can be found HERE (https://steemit.com/thedarkoverlord/@thedarkoverlord/press-release-04-9-11-papers-megaleak-checkpoint-02) in the TDO’s blog and below...

thedarkoverlord 9/11 Papers Megaleak Checkpoint 02

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

This is the thedarkoverlord here to deliver a message.

We're now calling this megaleak, the '9/11 Papers'. Keep giving us cyber-cash for cyber-cache.

We delivered Checkpoint 01 as promised, and now we're taking it upon ourselves to dive a bit deeper into this 9/11 Papers Megaleak by releasing our official Checkpoint 02 release as we've now reached Checkpoint 02 due to another generous doner! Instead of choosing 25 random files from Layer 1, we chose 25 random files from the other higher layers. What's in these files? We'll tell you briefly:

Highly confidential settlement documents
Highly confidential FBI interviews with involved persons
Highly confidential e-mails
Highly confidential judicial orders
Highly confidential sensitive security information
Highly confidential TSA, FBI, FAA files

Let this serve as more definitive proof that what we're saying is true, and that the parties involved should comply, before this gets worse.

Enjoy the highly confidential data. Ensure to view the e-mail message attachments. They're delicious and juicy. Continue to send us money and continue to receive these documents.

LINK: https://anonfiles.com/p1G439p3b4/Checkpoint_02_zip
SHA-1 HASH: 8B679F6C2A8962DBEEF8B6537CE938F646865793

We hope that there'll be more releases. Keep up the Bitcoin payments. Our reward: internet money, your reward: 9/11 secret documents, never before seen by the public. Your money is unlocking the truth and providing answers. Keep it flowing.

United States law enforcement agencies have attempted to silence us from our releases by requesting Twitter to suspend our account. An appeal to Twitter has gone unanswered. We'd like everyone to know that we're still here. We've taken to Reddit with our own sub. We'll provide updates as we have them.

Our sub-reddit: https://www.reddit.com/r/thedarkoverlords

Third Press Release: https://pastebin.com/iUW6bavE
Second Press Release: https://pastebin.com/8ksc0aYU
Original Press Release: https://pastebin.com/4F5R8QyQ

Stay tuned on PasteBin for future announcements related to this leak. We'll always sign all of our releases for verification of authenticity.

Your friends,
thedarkoverlord
Professional Adversarial Threat Group
TheDarkOverlord Solutions LLC, World Wide Web, LLC

OFFICIAL BITCOIN ADDRESS:
192ZobzfZxAkacLGmg9oY4M9y8MVTPxh7U

CONTACT AND LOCATION DETAILS:
thedarkoverlord E-Mail Address: tdohackers@protonmail.com
Backup1 E-Mail Address: thedarkoverlord@msgsafe.io
Backup2 E-Mail Address: thedarkoverlord@torbox3uiot6wchz.onion
Make your own at (torbox3uiot6wchz.onion)
KickAss Tor Address: kickassugvgoftuk.onion
-----BEGIN PGP SIGNATURE-----
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=kHDZ
-----END PGP SIGNATURE-----

***

Decrypted “preview documents” can also be found in post #16 of this thread.

Innocent Warrior
3rd January 2019, 15:55
From the comment section of TDO’s impersonations blog article HERE (https://steemit.com/thedarkoverlord/@thedarkoverlord/impersonations-of-thedarkoverlord) -


This is the only thread we were in on 4chan. However, someone posted a cheeky photo of an 'alien' claiming to buy us, and it's been circling that we posted it. However, simple analysis of the IDs will show that it wasn't us.

That’s correct; TDO’s ID is YQ2Tku13 and the impersonator’s ID is 2VODi0RJ (this can be checked HERE (http://boards.4chan.org/pol//thread/198364116/ama-were-thedarkoverlord-hackers-of-911-docs)).


Image is from x files prop.

https://makeupmag.com/the-x-files-returns-with-a-new-group-of-monsters/

From "Makeupmag.com"

https://makeupmag.com/wp-content/uploads/2016/02/1-alien-autopsy.jpg

Ba-ba-Ra
4th January 2019, 00:26
Joseph Farrell's take



http://www.youtube.com/watch?v=-a5Dh0x-nNU

Innocent Warrior
4th January 2019, 01:12
Computer Business Review - Lloyd’s of London Denies Hack Claims, As 9/11 Docs Posted Online (Nov 3). Emphasis mine.

Lloyd’s of London on Thursday denied it has been hacked after confidential litigation documents belonging to the leading insurance platform were posted online by a figure calling themselves “The Dark Overlord”.

A sample cache of confidential documents, including some linked to the September 11 2001 terrorist attacks, was posted on the Pastebin site on New Year’s Eve along with threats, and demands to pay a Bitcoin ransom.

A Lloyd’s spokesperson told Computer Business Review in an emailed statement: “Lloyd’s has no evidence to suggest that the Corporation’s networks and systems have been compromised by the hacker group.”

It is understood the documents the hackers have shown so far were stolen during the hack of a specialist law firm in the United States last April. (Lloyd’s didn’t name the law firm in question, but said that they worked with Lloyds syndicate Hiscox).

The incident is understood to be being treated by Lloyd’s of London as a fresh extortion attempt, rather than a fresh hack. The specialist insurance market added: “We remain vigilant with a number of protections in place to ensure the security and safety of data and information held by the Corporation.”

The spokesman added: “Lloyd’s will continue to monitor the situation closely, including working with managing agents targeted by the hacker group.”

The Pastebin documents were rapidly removed, while Twitter accounts linked to the account were also swiftly suspended. The hacker group has since shifted to making the threats on social media network Steemit.

One of the several Bitcoin accounts linked to the group appears to have received 108.34 Bitcoin over the last two days with 250 seperate transactions. The figure equates to approximately £330,200. It is unclear whether these are ransom payments.

The account, set up in August 2018, now has the equivalent to £5.6 million in it, received via 2403 transactions (as calculated by Computer Business Review).

Another Bitcoin wallet linked to the hackers has had the cryptocurrency equivalent to £12 billion (at current conversion rates) moved in and out of it over the past two years.

(An independent academic report sponsored by cybersecurity company Bromium last year estimated that cybercriminal proceeds amounting to an estimated $80-$200 billion are laundered globally each year through crypto and gaming currencies.)

Lloyd’s syndicate Hiscox in a statement on December 31 that the firm breached in April has no connecting systems to their own and their network is not affected.

“One of the cases the law firm handled for Hiscox and other insurers related to subrogation litigation arising from the events of 9/11, and we believe that information relating to this was stolen during that breach.”

thedarkoverlord said many of the purported 18,000 stolen documents relate to litigation cases that followed the 9/11 New York terrorist attacks and said they were up for grabs to the highest bidder: “If you’re a terrorist organisation such as ISIS/ISIL, Al-Qaeda, or a competing nation state of the USA such as China or Russia, you’re welcome to purchase our trove of documents.”

Source (https://www.cbronline.com/news/lloyds-of-london-hack) (with links).

Innocent Warrior
4th January 2019, 04:18
UPDATE: The public has bought all of the layer 1 container and checkpoints 5, 6, and 7 of the layer 2 container.

"9/11 Papers" MegaLeak - Layer 1 + Checkpoint 03, 04, 05, 06, & 07: Cyber-Cash For Cyber-Cache

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

"9/11 Papers" MegaLeak - Layer 1 + Checkpoint 03, 04, 05, 06, & 07: Cyber-Cash For Cyber-Cache

https://steemit.com/@thedarkoverlord

This is the thedarkoverlord here to deliver a message.

We're now calling this megaleak, the '9/11 Papers'. Keep giving us cyber-cash for cyber-cache.

Hello, world. As you're well-aware, we designed a compensation plan that would allow for the public crowd-funding of our organisation in order to permit the public disclosure of our "9/11 Papers" in the interest of the public. Part of this plan was to create a tiered escalation plan that would result in multiple layers and milestones (which we're calling checkpoints) to ensure the powers at be are being properly bent over a barrel. We've said it before, and we'll say it again: we're financially motivated, and you (the public) has spoken to us in our language (internet money, specifically Bitcoin). Through voicing your satisfaction by sending us 3.27 BTC for a total of over 12.000 USD of BTC (at the time of writing), you've successfully unlocked Layer 1 as well as Checkpoint 03, Checkpoint 04, Checkpoint 05, Checkpoint 06, and Checkpoint 07. As with our previous paid releases, we've demonstrated to you that we're honest about our intentions and we're transparent. As a result of this most magnificent achievement, we're continuing to follow the wishes of the public by releasing the Layers and Checkpoints we promised you we would. Remember, continuing to fund our wallet will continue to keep us motivated to help break the truth to the world by open-sourcing what we're calling the "9/11 Papers". As such, let the leaking continue:

Statistics:
Layer 1 = 500 Files
Checkpoint 05 = 50 Files
Checkpoint 06 = 50 Files
Checkpoint 07 = 50 Files

TOTAL = 650 Files

Layer 1
Layer_1.container Decryption Key: uS\gY(oY@(5e=#(8e2nXOZ:9.DqK#abx>v4YUPqlb*~`d$76?VFZPN0Bh2\6vT=N

If you still haven't downloaded all the 9/11 Archive with the Layer containers, the torrent link is below:

9/11 Archive
LINK: https://anonfiles.com/6fx7q6pfb6/911_Archive.zip_torrent
SHA1 HASH: F4C18CF980648E9FBDAC55952F5F3485DBBA95F9

Checkpoint 05
LINK: https://anonfiles.com/Vds5Aapaba/Checkpoint_05_zip
SHA-1 HASH: C00B9117F08EEBF261DA32DDAB8EC97AF382CE8F

Checkpoint 06
LINK: https://anonfiles.com/c2t6A2p6b2/Checkpoint_06_zip
SHA-1 HASH: 42C3DE7CAE57702A1ADA84FC396B7EAEBA84B925

Checkpoint 07
LINK: https://anonfiles.com/V4v1A8p9b2/Checkpoint_07_zip
SHA-1 HASH: 3D76610FECCF093250F39354DB70A704D47D241C

Instructions to decrypt the containers - Download Veracrypt and use the decryption key above.

If you don't have our previously released 'Preview_Documents.container' key, it is here: *CZ4=I{YZ456zGecgg9/cCz|zNP5bZ,nCvJqDZKrq@v?O5V$FezCNs26CD;e:%N^

Transparency Disclaimer: Checkpoint 03 and Checkpoint 04 would have been comprised of documents from Layer 1, but since the single donation covered past Layer 1, we're releasing Layer 1 as an aggregate of itself along with Checkpoint 03 and Checkpoint 04.

Let this serve as more definitive proof that what we're saying is true, and that we're doing exactly as we promised you. Continue to keep the bitcoins flowing, and we'll continue to keep the truth flowing. Remember, Cyber-Cash for Cyber-Cache. We hope that there'll be more releases. Continue to share these download links and decryption keys on Reddit, 4chan, Steemit, Voat, your siblings, your friends, your pets, and anyone else! We can't allow the mainstream media to silence the truth any longer. We must ensure they're propaganda is crushed by the truths we're dealing today.

Stay tuned on PasteBin for future announcements related to this leak. We'll always sign all of our releases for verification of authenticity.

Teaser Statistics:

Layer 2 = 7.566 Files

Your friends,
thedarkoverlord
Professional Adversarial Threat Group
TheDarkOverlord Solutions LLC, World Wide Web, LLC

Source (https://steemit.com/thedarkoverlord/@thedarkoverlord/9-11-papers-megaleak-layer-1-checkpoint-03-04-05-06-and-07-cyber-cash-for-cyber-cache).

Contact details etc. omitted from this post (their PGP signature has already been posted on this thread in earlier posts, will not include them in future unless authenticity is in question), see source for full article.

***

"9/11 Papers" MegaLeak Checkpoint 02 Documents Analysis (https://steemit.com/thedarkoverlord/@thedarkoverlord/9-11-papers-megaleak-checkpoint-02-documents-analysis)

***

I personally won’t be downloading and decrypting any releases or researching but will post any decrypted files and research articles that are published by others as they are made available, along with articles/statements published by involved/affected parties.

UPDATE: Layer 1 container decrypted - https://drive.google.com/drive/mobile/folders/11po4R8PVxhMXnxvFSVxRG_LKl-za__HA?usp=drive_open

Kryztian
5th January 2019, 18:57
Rachel and others, thanks for this excellent thread on an very important topic. Looking forward to updates.

I think there are a lot of narrow fixed ideas about who the "Dark Overlords" are and what their intentions are. Perhaps the media is at fault and trying to give us their story, or perhaps we humans just like simple answers so we can make a simple picture in our mind of what is going on. But there are a lot of possibilities.

The Dark Overlords are acting out an act of extortion and blackmail here in a very visible and public way. Extortionists, scammers, hoaxsters and other fraudsters rarely tell you they are really about - they are "here to help" and "to offer their services to humanity." They paint a picture of themselves as having integrity and good heartedness. The Dark Overlords, on the other hard, paint a picture of themselves as being motivated only by money. Of course, paint is used as a cover and can often conceal something very different.

Here are some scenarios that might apply to who the actually are:

1) Perhaps they are, just as they say, a group of hackers bent on making money. Perhaps they hacked a large stash of documents from insurance companies, and some of them were related to 9/11. The stash may have been so large, and they might have decided to focus their efforts on the 9/11 documents because they are sensationalistic and can help them get media attention. Even though the documents say nothing to counter the official story of who planned 9/11, they can make people assume they will. There are plenty of other secrets in these documents that companies and individuals will want to have kept secret. Insurance companies may not want the terms and amounts of their payments made public. A claimant might not want his ex-wife to know that part of the settlement payment was deferred until after a divorce went through, or might not want the IRS to know that payment was made directly to her bank account in the Cayman Islands. There is good money for extortionists in black mail and the 9/11 gives them extra free publicity.

2) They might have ideological motivations, whether or not greed is also a factor. Many hackers have anarchistic tendencies - after all, they like breaking through barriers, and sometimes they like to see those barriers shattered behind them. They might withhold documents after accepting their ransom payments, but then, after their last payment is received, might just decide to release all the documents and keys anyway, or, at least on the documents that would alter the public perception on who did 9/11. Of course, this would be bad for future business because they could not be trusted to honor their agreements as black mailers and this would besmirch the "good" name of the Dark Overlords.

3) The Dark Overlords could be part of a nation state's intelligence agency, especially a nation like China or Russia, that wants to bring anarchy and destabilize the United States, which could happen if a new truth to who did 9/11 emerges. Americans will be told that these documents "threaten American securtiy" when in fact they really threaten a cabal of corporations and bankers that want to use the political and military systems of Western nations to further their interests.

4) The Dark Overlord might be part of the same network that planned 9/11 and are creating a story to distract us from the truth. They may introduce some fake or altered documents into the realm of the public and conspiracy research. They may release some documents and withhold others so that we will think "Oh, we've seen all those documents, there's nothing there" when in fact the incriminating ones have been withheld. Or they might be a large international borderless group that want us to focus our attention on just one piece of the puzzle (e.g. Saudi Arabia or Isreal).

Please keep yourselves open to all these possiblities and others that have yet to be enumerated here as this story continues to unfold.

Innocent Warrior
6th January 2019, 03:01
Rachel and others, thanks for this excellent thread on an very important topic. Looking forward to updates.

Hi Kryztian. Yeah, the potential is huge. Their wallet hasn’t moved since they released the first level container, perhaps people are still going through the docs and we’ll see if they think it’s worth the gamble to see if the next level is worth buying or not soon. Yes, I’ve considered the options you’ve outlined, I hope it’s not the fourth one.

I watched a bloke who was discussing TDOs in a video and he had a pretty interesting idea. He suggested making hackers a legitimate resource for the public. Something like the following; the public puts in orders for certain information, it’s then voted on by the public which one to get, the funds are raised and then the first hacker who delivers gets paid the funds. They could have rules that protect the innocent parties (info redacted), in the interest of the public etc. A bit like TDOs, the targets get a taste of their own medicine, ruthlessness turned on them, except the public gets the best info instead of their rich clients and nobody is blackmailed.

Kryztian
6th January 2019, 20:20
Some interesting thoughts on the Dark Overlord by Jason Bermas of We Are Change

QGSpBa4xBys

Kryztian
6th January 2019, 20:24
Their wallet hasn’t moved since they released the first level container, perhaps people are still going through the docs and we’ll see if they think it’s worth the gamble to see if the next level is worth buying or not soon.

I am not sure what the means Rachel. Aren't Bitcoin accounts secret: if you are not directly involved in the transaction, you can't see what is being transacted? Also, since they are encouraging those whom they are getting into direct contact with to contact, they could be receiving funds through other accounts.

Clear Light
6th January 2019, 22:33
Meh, nothing much to see in the "Layer 1" documents and according to their "Payment Structure" [1], it's going to take $2,000,000 USD to get ALL of the "Layer 5" documents released ... which seems somewhat unlikely eh ?

FYI : If you want to see the "current balance" of their Bitcoin Wallet, click here (https://www.blockchain.com/btc/address/192ZobzfZxAkacLGmg9oY4M9y8MVTPxh7U)

If I was going to contribute towards getting as far as "Layer 5" I'd probably want to see something a bit more "explosive" or "revealing" first ... so far that's not the case !

. : . : . : . : . : . : . : . : . : . : . : . : . : . : . : . : . : . : .

[1] Click here (https://steempeak.com/@thedarkoverlord) and then scroll down to "Press Release 02 - Crypto-Cash for Crypto-Cache"

Clear Light
6th January 2019, 22:50
For reference these are the Sizes of each Layer :


Layer_1.container
75 Mb
Layer_2.container
3.36 Gb
Layer_3.container
4.75 Gb
Layer_4.container
1.30 Gb
Layer_5.container
300 Mb

Innocent Warrior
7th January 2019, 02:18
Their wallet hasn’t moved since they released the first level container, perhaps people are still going through the docs and we’ll see if they think it’s worth the gamble to see if the next level is worth buying or not soon.

I am not sure what the means Rachel. Aren't Bitcoin accounts secret: if you are not directly involved in the transaction, you can't see what is being transacted? Also, since they are encouraging those whom they are getting into direct contact with to contact, they could be receiving funds through other accounts.

Here’s the transactions for the official address they’ve provided to the public for the 911 papers: https://www.blockchain.com/btc/address/192ZobzfZxAkacLGmg9oY4M9y8MVTPxh7U. If you click on the BTC amount buttons it will show you the dollar value. The deposit for $12,608.69 was the last one before they released the first level container (five small amounts since and two withdrawals).

Yep, they’re definitely receiving funds through other accounts, see the emboldened text in the Computer Business Review article in post #23 (http://projectavalon.net/forum4/showthread.php?105535-Hacker-group-threatens-to-leak-9-11---truth---unless-paid-in-Bitcoin&p=1267530&viewfull=1#post1267530) of this thread. Looks like a ransom or purchase has been paid into another address (that Netflix production company paid $50,000 to them through a series of deposits too), but there’s no way of knowing what that was for, since they’re selling other info on the dark web.

Ba-ba-Ra
8th January 2019, 00:08
Joseph Farrell's 2nd blog on this matter: Note: the complete article is worth a read as it ties in the PROMIS software. https://gizadeathstar.com/2019/01/that-strange-dark-overload-story-is-now-a-little-stranger/

". . . . to put it country simple, I've long suspected that there is some sort of "deep story" here, connecting 9/11, its financial shenanigans, and PROMIS (in some "updated" version). Which brings us to the Dark Overlord hacks. One of the little details that emerged during the whole INSLAW scandal was that the software had undergone several modifications after its theft, some carried out by private corporations on Indian reservations at the behest of the intelligence "community". Digging deeper (really deeper), allegations even surfaced that an Inslaw programmer had installed his own private and personal back door before this whole process had even begun! Let that sink in for a moment. It means that, if all those stories are true, then (1) a "multi-lingual" software platform was created that could read and translate from any computer language, (2) it was then stolen by the USA, and widely disseminated throughout the world's intelligence and financial "community" after a number of modifications with back doors were made to it, and (3) in addition to those back doors, there were private and personal backdoors potentially added by any number of programmers themselves who worked on it each step of the way. That's a useful thing to have around, especially when you're taking all the financial ledgers "secret" (See Catherine Austin Fitt's year-end wrap up, available at Solari.com).

In essence it boils down to a system where non-state actors or "extra-territorial 'states'" could gain access. Recall in this respect the Chinese hacking and spy in New Mexico, who allegedly rode into classified US systems using - you guessed it - one of the PROMIS backdoors. In short, the are two tiers of access - one official and "American", and one much deeper, "unofficial" and representing something much different, much like my hypothesis that 9/11 was a three-tiered penetrated operation of level one (the patsies flying the airplanes), level two (the rogue group within the American deep state that planned and pulled it off), and level three, the group penetrating the whole operation and using it for their own purposes, part of which was to "pin" the second level to a plan of action.

All this puts the release of a "preview layer" of documents by The Dark Overlord group, and its threats to the Deep State not to try to stonewall the process, into a very intriguing light, for the releases, of course, concern 9/11. As the second article linked above concludes,

TheDarkOverlord is a professional, as you might have gathered from his track record. There was very little “noise” in the volume – files weren’t shuffled around and reorganized. There are no glaring artifacts that scream out TDO’s true identity.

I am surprised that Windows was used. I expected TAILS or another Linux flavor. There are a lot of privacy implications from using Windows – even in a VM.

File metadata suggests the files are authentic. It would be a huge amount of work to create these files out of nothingness, using outdated Office products (or modifying metadata to show that), and then match these timestamps to file system timestamps. It isn’t impossible, but I would classify it as “extremely extremely unlikely”.

And, lastly – if and when more VeraCrypt volumes are decrypted, we will learn more about TDO’s tactics and techniques.

In other words, this group, whoever it is, are very serious players. And much more serious, the whole cyber-world and national security state built upon it, might be infested with cyber-moles and might have more holes in it than a sponge... and Barr's appointment might be yet another attempt at more damage control. And it may just also mean that the "Dark Overlord" group has some connection to, or is the "public face" of my hypothesized "level three" of 9/11. And it may just also mean that the reason for taking all the financial operations "secret" and "dark" is a defensive measure as much as an offensive one."

Innocent Warrior
8th January 2019, 07:21
Update: TDO’s Steemit blog (https://steemit.com/@thedarkoverlord) is “page not found”.

The Dark Overlord Steemit Page down? (http://boards.4chan.org/pol//thread/199035395/the-dark-overlord-steemit-page-down)

Clear Light
8th January 2019, 11:42
Update: TDO’s Steemit blog (https://steemit.com/@thedarkoverlord) is “page not found”.

The Dark Overlord Steemit Page down? (http://boards.4chan.org/pol//thread/199035395/the-dark-overlord-steemit-page-down)

Yeah, I spotted that last night (UK time) but all their posts remain available at https://busy.org/@thedarkoverlord and https://steempeak.com/@thedarkoverlord however there has not been any recent activity for four days or so now ... :sherlock:

mountain_jim
8th January 2019, 13:21
I was reading about the theft of Promis software conspiracy on the From The Wilderness website before I had discovered Project Camelot and before Project Avalon existed.

I find these inferences quite interesting.

later: here is an article written 1 year before 9/11

https://www.fromthewilderness.net/free/pandora/052401_promis.html

another interesting discussion re 9/11

https://www.ign.com/boards/threads/promis-ptech-terror.250208458/



PROMIS Connections to Cheney Control of 9/11 Attacks Confirmed

by Jamey Hecht

With research assistance by Michael Kane

and editorial comment by Michael C. Ruppert

FTW: You said at the 9/11 Citizens’ Commission hearings, you mentioned – it’s on page 139 of transcript – that Ptech was with Mitre Corporation in the basement of the FAA for 2 years prior to 9/11 and their specific job was to look at interoperability issues the FAA had with NORAD and the Air Force, in case of an emergency.

Indira Singh: Yes, I have a good diagram for that.

FTW: And that relationship had been going on mediated by Ptech for 2 years prior to 9/11. You elsewhere say that the Secret Service is among the government entities that had a contract with Ptech. Mike Ruppert’s thesis in Crossing the Rubicon, as you know, is that the software that was running information between FAA & NORAD was superseded by a parallel, subsuming, version of itself that was being run by the Secret Service on state of the art parallel equipment in the PEOC with a nucleus of Secret Service personnel around Cheney. In your view, might it have been the case that Cheney was using Ptech to surveil the function of the people in FAA & NORAD who wanted to do their jobs on 9/11, and then intervene to turn off the legitimate response?

Indira Singh: Is it possible from a software point of view? Absolutely it’s possible. Did he (Cheney) have such a capability? I don’t know. But that’s the ideal risk scenario – to have an overarching view of what’s going on in data. That’s exactly what I wanted for JP Morgan. You know what’s ironic about this – I wanted to take my operational risk blueprint which is for an operational event going wrong and I wanted to make it generic for extreme event risk to surveil across intelligence networks. What you’re describing is something that I said, ‘boy if we had this in place maybe 9/11 wouldn’t have happened.’ When I was going down to DARPA and getting these guys excited about creating an extreme event risk blueprint to do this, I’m thinking of doing exactly what you’re saying Cheney might have already had!

***

I believe that Dick Cheney also had the ability using evolutions of the PROMIS software, to penetrate and override any other radar computer or communications system in the government.

- Mike Ruppert, in “Summation: Ladies and Gentlemen of the Jury,” from Crossing The Rubicon, p.592

[Few have grasped the overall long-term significance of the saga of PROMIS software and what it has become. When I reported on it in October 2000, after meeting with and assisting members of the RCMP's National Security Staff I was aware that - in terms of secret technologies - PROMIS and its evolutions were the lynchpin of every new military, scientific and financial advance being pursued by the US government and corporate sector. PROMIS progeny have become the "operating system" underlying data management and data mining for every major technology under development in all arenas of technological advance from medicine, to finance, to surveillance, to battlefield Command, Control and Communications or C3.

In the long ordeal to secure a publisher for Crossing the Rubicon, my agent and I went through a number of publishers who expressed keen interest in the book. The problem was that almost every one we dealt with came back to us and said, "We'd like to publish the book but we need for you to remove certain things." By a great margin, it was our chapter on PROMIS and my many subsequent references to it that appeared to be public enemy number one for mainstream publishers (most owned by multi-national corporations).

By definition, PROMIS progeny are the backbone of a current DoD plan to develop a "Godlike" view of all human (or battlefield) activity from space. They are also inherently a part of the data processing being envisioned for advanced space weapons requiring machines to think as they share data in virtual real time. MIT in a recent scientific publication titled "Space Weapons: Crossing the US Rubicon"(a possible tip of the hat to my book) described a number of capabilities to which FTW referred in our October 2000 story on PROMIS, including a statement that space is "the ultimate high ground."

The MIT article also contains a reference to one of the greatest fears expressed by all who wonder what hidden technologies might be making the Neocons so brazen in their attempts at bullying the world into submission: "On the other hand, the prospect of weapons in orbit-poised to strike anywhere on the globe at any time-has elicited vigorous opposition, both in the United States and abroad."45 The Neocons have placed their faith in technologies we have only begun to evaluate and discuss, and this is an area needing much additional research by authentic journalists.

Iran is a much more industrialized and automated nation than the ruin and rubble of Iraq. What if Donald Rumsfeld believed that he could use computers through the Internet to turn off all of the power generating stations supplying Tehran? What if Dick Cheney could shut down all of the computerized pumping, pipeline, refining and chemical technology used to keep Iran's oil flowing to the rest of the world? This is how the American, British and Israeli elites (including corporations) think and how they plan.

All three countries have long, deep and continuous links to PROMIS software. As time passes it is beginning to appear that PROMIS is literally what made possible not only 9/11, but everything that has followed since and what is being planned.

Recently the New York Times published a story about how the US military was envisioning a costly new "Internet" in space to control all military operations worldwide, calling it a "God's-eye view" of battle. Called Global Information Grid or GIG, this new platform performs the exact functions we described in an FTW article more than four years ago. Then we were called delusional conspiracy theorists. Four years later we are shown to have been right on the money.

Giant, expensive technology programs like SDI and GIG are sometimes neither wasteful porkbarrels nor the actual instruments that are presented to the public; instead, they are some third thing nobody knows about. This is the way large black projects are funded.

Total Information Awareness or TIA, an Orwellian nightmare of data mining that uses PROMIS-evolved technologies and artificial intelligence, is now operating and able to incorporate vastly divergent data bases of personal information on private citizens from computer systems using different languages in near-real-time. Every bit of personal information from grocery shopping habits to driving records, credit reports, credit card transactions and medical records is now almost instantly accessible. Access will be expedited and broadened to local law enforcement agencies when what will become a national ID card comes into being. That will happen as driver's licenses are standardized nationwide (following the recent intelligence reform act) to include a simple UPC-like code that will allow approved agencies to get all of our data. The surveillance and intervention capabilities of PROMIS progeny can now be used to prohibit a credit card purchase or (soon) prevent someone from boarding a commercial aircraft. These capabilities could also be used to empty a private bank account or - when coupled with biometric face recognition technology - prevent you from making a withdrawal from your bank or even buying food.

In every one of these software applications there are two themes: machines that "talk" to each other and artificial intelligence. (Please see Crossing the Rubicon). As you will see below, these capabilities are now known to exist.

TIA has been renamed several times. We know that the first software was delivered to the Defense Advanced Research Projects Agency (DARPA) in 2003. Its latest nom de guerre is TIE or Trusted Information Environment. According to the San Francisco Chronicle last October TIE now allows the government to access private databases without a warrant. I go one step further to assert that TIE allows access to private databases without the knowledge of the database owners, provided only one condition exists: the database can be accessed through the internet.

And although the public face of TIA pretends that these technologies have not yet been applied, we are certain with the publication of this story that the same software the government needs is already in use by private corporations - the big ones - and we remind the reader that FTW's map of the world states that the government has been turned into a franchise operation of these corporations anyway. So where's the seam?

What the courageous and brilliant Indira Singh has to tell us is a matter of monumental importance. Based upon these new revelations which confirm what I suggested in Crossing the Rubicon every American and quite likely every citizen of an industrialized nation should assume that all of these technologies are operational today. A bit of breathing room is left as I conclude that they have not been sufficiently deployed yet to monitor all citizens in real time. My best assumption is that right now perhaps a million or so high-interest Americans are under constant surveillance; all by computer technology which has proven so accurate that it can detect suspicious movements just by correlating gasoline and food purchases with bank withdrawals and utility consumption. [--MCR]

FTW readers are aware that on the morning of 9/11 NORAD was engaged in multiple war games which drew fighter jets away from the doomed airliners, and polluted air traffic control screens with false information from the exercises. One of those injected blips was the so-called “phantom Flight 11,” which appeared and persisted on control screens after the war games had been aborted.1 That would require exactly the kind of technology that Ptech (with whom Singh did business) and its partner Mitre had been providing to each of the three agencies involved: the FAA, NORAD, and – most significantly for Dick Cheney that morning – the Secret Service. In other words, one of the most central arguments in the Rubicon’s case has just been independently validated. (See Part II)

In this electrifying timeline-driven report, Wall Street whistleblower Indira Singh lays out the connections between the providers of this advanced software (derived from the PROMIS software stolen from the Inslaw corporation in the 1980s by the US Justice Department and others) and the network of terrorist financing (sustained with US blessing) that has pervaded U.S covert operations for years. That deep-political relationship is at its strongest in the Bush administration, whose Saudi and Pakistani ties go back decades.

Dick Cheney, James Baker, GHWB, Dubya, and the people in and around the once and future American ruling junta have financially live links to the Muslim Brotherhood milieu that formed part of BCCI and, more recently, al Qaeda (this is also the context of a fascinatingly influential relationship among Kermit Roosevelt, GHWB, and Adnan Khashoggi). Nazis and their admirers are the third piece in the triangle, connected to Islamists since the Muslim Brotherhood’s creation in 1928 by Hitler ally Hasam al-Banna, and connected to the Bush clan through decades of interdependence with American oil and intelligence elites – including the Rockefellers (Standard Oil) and the Harrimans (Brown Bros. Harriman / Kellogg Brown and Root / Halliburton).2

Viewed in this context, the Ptech story is a chilling reminder that this network is still in charge; that it facilitated the 9/11 attacks that murdered thousands and destroyed the health of thousands more; and that “our” American defenses against sabotage are woefully dependent upon the goodwill of saboteurs (both foreign and domestic). – JAH]

…..

Watching from Cyprus
8th January 2019, 14:48
Could all this be set up as the final strike against block chain, as there will not be one bank left in the world who will accept any funds deriving from Bitcoin, since the average Joe reads this as BTC is a money laundering vehicle.. and this incident (false flag) will now be used as yet another “evidence” for “terror funding” documentation to restrict or make blockchain based money/tender illegal !!!

I think so..

We are surely in WW3, the currency war at its end right now... not looking good

Did You See Them
8th January 2019, 19:55
51% Ethereum Attack

"Unknown hackers may have successfully hijacked the Ethereum Classic blockchain through a rare so-called "51% attack".

https://news.sky.com/story/ethereum-classic-hackers-hijack-blockchain-in-rare-51-attack-11601786

Watching from Cyprus
9th January 2019, 13:43
Further to my suspicion on crypto attack going on, here is an article from today about a Norwegian Millionaire who’s wife have been kidnapped and the kidnappers asking £8 million in crypto currency Monero in randsome.

https://www.theguardian.com/world/2019/jan/09/norwegian-millionaires-wife-anne-elisabeth-falkevik-hagen-likely-kidnapped-say-police

guayabal
9th January 2019, 13:52
thedarkoverlord just released new set of decrypted files. See:
https://busy.org/@thedarkoverlord/9-11-papers-megaleak-layer-2-checkpoint-08-cyber-cash-for-cyber-cache.

Dennis Leahy
9th January 2019, 15:03
I hope this isn't just a black op to make Wikileaks look bad.
On the other hand, it would be fantastic if Wilileaks hacked darkoverlord and published the material they claim to have for free!
Wikileaks is not a hacking organization.

onawah
9th January 2019, 16:30
True, they publish leaked information. Apologies for forgetting that.:blushing:
Good point; there IS a BIG difference.
But it would be cool if there was a hacker group similar to Wikileaks in terms of ethics that hacked darkoverlord and published the info for free.


Wikileaks is not a hacking organization.

Clear Light
10th January 2019, 00:36
Ah, so they've released the Decryption Key for "Layer 2" despite not having received the BTC they had asked for ... and once decrypted, there are just over 7,500 files comprising of a total size of approximately 3.3 Gb :happythumbsup:

Included is a text Directory file but it is full of "whitespace" and isn't particularly readable so I played about with it in Excel and have attached a modified version here if you're interested to have a look ... :sherlock:

39690

As it is, I don't have the spare time to go rummaging through all of this Layer but if there's any particular file that catches your eye (so-to-say) and you'd like to have a more in-depth look at it please let me know and I'll send you a copy of it eh ? :typing:

onawah
10th January 2019, 01:17
Love your Avatar!
Ah, so they've released the Decryption Key for "Layer 2" despite not having received the BTC they had asked for ... and once decrypted, there are just over 7,500 files comprising of a total size of approximately 3.3 Gb :happythumbsup:

Included is a text Directory file but it is full of "whitespace" and isn't particularly readable so I played about with it in Excel and have attached a modified version here if you're interested to have a look ... :sherlock:

39690

As it is, I don't have the spare time to go rummaging through all of this Layer but if there's any particular file that catches your eye (so-to-say) and you'd like to have a more in-depth look at it please let me know and I'll send you a copy of it eh ? :typing:

Innocent Warrior
10th January 2019, 08:45
thedarkoverlord just released new set of decrypted files. See:
https://busy.org/@thedarkoverlord/9-11-papers-megaleak-layer-2-checkpoint-08-cyber-cash-for-cyber-cache.


Thank you!

"9/11 Papers" MegaLeak - Layer 2 + Checkpoint 08: Cyber-Cash For Cyber-Cache

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

"9/11 Papers" MegaLeak - Layer 2 + Checkpoint 08: Cyber-Cash For Cyber-Cache

https://busy.org/@thedarkoverlord/

This is the thedarkoverlord here to deliver a message.

This is the '9/11 Papers' MegaLeak. Keep giving us cyber-cash for cyber-cache.

Hello, world. As you're well-aware, we designed a compensation plan that would allow for the public crowd-funding of our organisation in order to permit the public disclosure of our "9/11 Papers" in the interest of the public. Part of this plan was to create a tiered escalation plan that would result in multiple layers and milestones (which we're calling checkpoints) to ensure the powers at be are being properly bent over a barrel. We've said it before, and we'll say it again: we're financially motivated, and you (the public) has spoken to us in our language (internet money, specifically Bitcoin). Remember, continuing to fund our wallet will continue to keep us motivated to help break the truth to the world by open-sourcing what we're calling the "9/11 Papers". To create a bit more buzz, we've decided to continue forward and release the decryption key for Layer 2. As such, let the leaking continue:

Statistics:
Layer 2 = 7.566 Files
Checkpoint 08 = 50 Files

TOTAL = 7.616 Files

Layer 2
Layer_2.container Decryption Key: 8JYIy&BRIkLi<7mku]nJGRS9YXwXs#udwvCr]MTV02"8@J0c%9ZC/*t7'r&@W

If you still haven't downloaded all the 9/11 Archive with the Layer containers, the torrent link is below:

9/11 Archive
LINK: https://anonfiles.com/6fx7q6pfb6/911_Archive.zip_torrent
SHA1 HASH: F4C18CF980648E9FBDAC55952F5F3485DBBA95F9

Checkpoint 08
LINK: https://anonfiles.com/ebVdf4q9bf/Checkpoint_08_zip
SHA-1 HASH: C285ACE02A9E046083B4F6149112569EC7CFB769

Instructions to decrypt the containers - Download Veracrypt and use the decryption key above.

Let this serve as more definitive proof that what we're saying is true, and that we're doing exactly as we promised you. Continue to keep the bitcoins flowing, and we'll continue to keep the truth flowing. Remember, Cyber-Cash for Cyber-Cache. We hope that there'll be more releases. Continue to share these download links and decryption keys on Reddit, 4chan, Steemit, Voat, your siblings, your friends, your pets, and anyone else! We can't allow the mainstream media to silence the truth any longer. We must ensure they're propaganda is crushed by the truths we're dealing today.

We'll always sign all of our releases for verification of authenticity.

Teaser Statistics:

Layer 3 = 8.279 Files

Your friends,
thedarkoverlord
Professional Adversarial Threat Group
TheDarkOverlord Solutions LLC, World Wide Web, LLC

Innocent Warrior
10th January 2019, 08:52
Ah, so they've released the Decryption Key for "Layer 2" despite not having received the BTC they had asked for ... and once decrypted, there are just over 7,500 files comprising of a total size of approximately 3.3 Gb :happythumbsup:

Included is a text Directory file but it is full of "whitespace" and isn't particularly readable so I played about with it in Excel and have attached a modified version here if you're interested to have a look ... :sherlock:

39690

As it is, I don't have the spare time to go rummaging through all of this Layer but if there's any particular file that catches your eye (so-to-say) and you'd like to have a more in-depth look at it please let me know and I'll send you a copy of it eh ? :typing:

Great, thanks!

I’m thinking each layer will expand on and go deeper with the info from the previous layer. They wanted another $15 k for the last checkpoint, so I’m thinking this layer will be more interesting than the last and it was given for the public to see that. Wish I had time to go through it myself but then that’s best done by some hardcore 911 researchers anyway, which I am not. Anyone seen any good 911 researchers going through these docs?

Did You See Them
10th January 2019, 09:39
Ah, so they've released the Decryption Key for "Layer 2" despite not having received the BTC they had asked for ... and once decrypted, there are just over 7,500 files comprising of a total size of approximately 3.3 Gb :happythumbsup:

Included is a text Directory file but it is full of "whitespace" and isn't particularly readable so I played about with it in Excel and have attached a modified version here if you're interested to have a look ... :sherlock:

39690

As it is, I don't have the spare time to go rummaging through all of this Layer but if there's any particular file that catches your eye (so-to-say) and you'd like to have a more in-depth look at it please let me know and I'll send you a copy of it eh ? :typing:

Great, thanks!

I’m thinking each layer will expand on and go deeper with the info from the previous layer. They wanted another $15 k for the last checkpoint, so I’m thinking this layer will be more interesting than the last and it was given for the public to see that. Wish I had time to go through it myself but then that’s best done by some hardcore 911 researchers anyway, which I am not. Anyone seen any good 911 researchers going through these docs?

It would be "nice" of them to give an overall general view of what would be uncovered having paid their "fee" !
It's one thing to have all these documents - but what do they show ?
An inside job or just the workings of big business for financial gain after the event !
Is there a "Smoking gun" in one of their "Lucky Bags" or just another lollipop !

Innocent Warrior
14th January 2019, 01:11
Ah, so they've released the Decryption Key for "Layer 2" despite not having received the BTC they had asked for ... and once decrypted, there are just over 7,500 files comprising of a total size of approximately 3.3 Gb :happythumbsup:

Included is a text Directory file but it is full of "whitespace" and isn't particularly readable so I played about with it in Excel and have attached a modified version here if you're interested to have a look ... :sherlock:

39690

As it is, I don't have the spare time to go rummaging through all of this Layer but if there's any particular file that catches your eye (so-to-say) and you'd like to have a more in-depth look at it please let me know and I'll send you a copy of it eh ? :typing:

Great, thanks!

I’m thinking each layer will expand on and go deeper with the info from the previous layer. They wanted another $15 k for the last checkpoint, so I’m thinking this layer will be more interesting than the last and it was given for the public to see that. Wish I had time to go through it myself but then that’s best done by some hardcore 911 researchers anyway, which I am not. Anyone seen any good 911 researchers going through these docs?

It would be "nice" of them to give an overall general view of what would be uncovered having paid their "fee" !
It's one thing to have all these documents - but what do they show ?
An inside job or just the workings of big business for financial gain after the event !
Is there a "Smoking gun" in one of their "Lucky Bags" or just another lollipop !

Depends if you see the details on how 911 was allowed to happen as insights into how an inside job was pulled off or not, if the answer to that is yes, then my answer to your question is possibly both (and those who profited financially are suspect, no?). There won’t be anything recorded that spoke directly and openly about an inside job or a false flag. They’re not that stupid. This is why I requested links for any good 911 researchers.

* * *

Bits and pieces -

https://mobile.twitter.com/Zeitgeist24_7/status/1083959118933635072

https://threadreaderapp.com/thread/1083849443412127744.html

wZRQLDMbU9g

Re. authenticity of docs: https://mobile.twitter.com/_cryptome_/status/1083455993445564416

Innocent Warrior
29th January 2019, 01:25
Update.


TDO’s wallet hasn’t received any more significant payments.
It appears the Feds seized Kickass, their dark web marketplace (I saw a screenshot of a notice saying such, shared on Twitter).


Nothing much going on for the past couple of weeks, this is where my interest ends unless something big enough happens for me to come across it in my usual internet travels. The docs are authentic, which is my primary interest, since they claim to be planning on releasing information on aliens next.

For anyone interested, TDO is on Partiko HERE (http://partiko.app/thedarkoverlord) and Busy HERE (https://busy.org/@thedarkoverlord/).

:waving:

Vangelo
17th February 2019, 05:20
Mods please move if this is not the right place...

I stumbled upon this video today. It lists 7 facts that contradict the official story.

http://www.youtube.com/watch?v=STICJ9gfB2s

Denise/Dizi
17th February 2019, 08:26
Wow Rachel, where are you finding all of this? While I know that most people are pissed that this is theft, and blackmail, The insurance payments for in inside job is just as much theft as this is. Only at least this person is being HONEST about their theft. Either way, we are going to have to pay for the truth because we seem to have a horrible leak of something in this world called HONESTY. Some TRANSPARENCY would be great too so this kind of thing never happened. If you're honest, you have nothing to hide right?

I don't know if copies of insurance payouts will prove anything.. Or copies of "expert witness testimony" will either. As we all know many people will lie and call it credible. They got away with it using that information, showing it, will it really change that?

I dunno.. It would be nice to be able to take out the trash for a change, it is long overdue.

Just a few thoughts aloud.

Innocent Warrior
22nd February 2019, 01:17
:waving: Thanks for sharing your thoughts.


Wow Rachel, where are you finding all of this?

I find that searching relevant hashtags on Twitter is the most efficient way to find the latest on information like this that’s moving around a lot and hard to find (in this case; #TDO (https://mobile.twitter.com/hashtag/tdo?src=hashtag_click) and #911papers (https://mobile.twitter.com/hashtag/911Papers?src=hashtag_click)). This is also a great way to save time by finding accounts which are following it closely.

Kryztian
24th April 2019, 17:05
It has been relatively quiet on the "Dark Overlord" front, however, Jason Bermas is still examining these files.

TbIjQ6QoaSM

In short:


Layers one to three have been released. There are still two layers left.


Some interesting connections to the BCCI, a bank linked to violent dictators, drug runners, terrorists, intelligence services and the Bush family.


There are thousands and thousands of documents that have been released and many of them have not been read or investigated.