Numerous parties would like this answered, in public, in front of a Grand Jury, A DOJ Special Prosecutor and a public federal court trial, but Elon Musk has spent vast amounts of money in order to delay the justice system from bring him to such a hearing.

The Following inquiries, though, should serve to resolve the issue.

All of the following questions have now been FAXED, EMAILED, U.S. POSTAL SERVICED MAILED to Elon Musk at his homes and offices and to the corporate offices of the companies and U.S. Senators that he owns. He is now fully aware that answers for each of the following questions is required from him. It is no longer possible for him to not have immediate answers to these questions should you encounter him in-person, at a conference or in a broadcast news interview.

If you see him, ask him: “Elon…
  1. Why was Tesla located on the same geological land, next door to, FBI-raided Solyndra?
  2. Did Senator Dianne Feinstein ever have a personal meeting with you?
  3. Did you or your staff ever promise, or deliver, any favors or items of value to Senator Dianne Feinstein
  4. Did you or your staff ever promise, or deliver, any favors or items of value to Senator Harry Reid?
  5. Have you, or any family members or friends ever placed money in a family trust fund that originally came from the U.S. Treasury?
  6. Had you ever met Steven Chu, Steve Spinner, Alison Spinner, Matt Rogers or Jonathan Silver before they were appointed to run the U.S. Department of Energy?
  7. Did you ever say, in a recorded conversation, that the NUMMI factory made no sense for Tesla to occupy?
  8. What is your relationship with Richard Blum, the husband of Senator Dianne Feinstein and his real estate company CBRE?
  9. When your Tesla and Powerwall batteries explode, do they release any toxic fumes? How many different kinds of toxic fumes do they release? In what year were you aware of these toxic fumes. Did your employee: Bernard Tse, ever warn you about these toxic fumes?
  10. Did you, or your associates ever benefit from lithium mining in the Afghanistan War?
  11. Did three of your employees suddenly die in a plane crash? What engineering information did they have about Tesla Motors?
  12. Did your patent filings include any language which specifically and intimately disclosed the deadly danger of your batteries? Please quote those paragraphs from your very own patent filings that you were forced to give away for free because they were rendered value-less by those disclosures?
  13. The news stories said that, even though you were a billionaire, you got over thirty billion dollars in taxpayer-funded handouts from California and Federal government officials in hard cash, tax waivers, free NASA buildings, government jet fuel, credits, stock market pumps and other things; Did you get all of this free cash in exchange for conduit-ing campaign funding for Obama, Reid and Feinstein?
  14. Were you involved in the death of your competitor: Gary D. Conley?
  15. Does Google rig search engine results about you because they covertly co-own some of your assets? Do Twitter and Google hype up PR aggrandizement about you and hide negative news stories about you?
  16. Have you hidden money from state and federal tax collection in off-shore tax evasion schemes?
  17. Do you hire troll-farms, click-farms and meat-puppet fake bloggers to write self-glory statements about you on reddit, twitter, facebook and other social media?
  18. Have Tesla’s killed anybody? How many people have died in, or near a Tesla, ever? Do you run cover-ups about the deaths?


….(More questions to be added, as submitted, and hot-linked to back-ground details, as they come in…)


Petya Global Hacker Attack Is HUGE!!!!

Petya Ransomware Spreading Rapidly Worldwide, Just Like WannaCry




Watch out, readers! It is ransomware, another WannaCry, another wide-spread attack.

The WannaCry ransomware is not dead yet and another large scale ransomware attack is making chaos worldwide, shutting down computers at corporates, power supplies, and banks across Russia, Ukraine, Spain, France, UK, India, and Europe and demanding $300 in bitcoins.

According to multiple sources, a new variant of Petya ransomware, also known as Petwrap, is spreading rapidly with the help of same Windows SMBv1 vulnerability that the WannaCry ransomware abused to infect 300,000 systems and servers worldwide in just 72 hours last month.

Petya is a nasty piece of ransomware and works very differently from any other ransomware malware. Unlike other traditional ransomware, Petya does not encrypt files on a targeted system one by one.

Instead, Petya reboots victims computers and encrypts the hard drive’s master file table (MFT) and renders the master boot record (MBR) inoperable, restricting access to the full system by seizing information about file names, sizes, and location on the physical disk.

Petya ransomware replaces the computer’s MBR with its own malicious code that displays the ransom note and leaves computers unable to boot.

Apart from this, many victims have also informed that Petya ransomware has also infected their patch systems.

“Petya uses the NSA Eternalblue exploit but also spreads in internal networks with WMIC and PSEXEC. That’s why patched systems can get hit.” Mikko Hypponen confirms, Chief Research Officer at F-Secure.

Petya! Petya! Another Worldwide Ransomware Attack

Petya Ransomware Spreading Rapidly Worldwide, Just Like WannaCry

Screenshots of the latest Petya infection, shared on Twitter, shows that the ransomware displays a text, demanding $300 worth of Bitcoins. Here’s what the text read:

If you see this text, then your files are no longer accessible, because they are encrypted. Perhaps you are busy looking for a way to recover your files, but don’t waste your time. Nobody can recover your files without our decryption service.”

According to a recent VirusTotal scan, currently, only 16 out of 61 anti-virus services are successfully detecting the Petya ransomware malware.

Petya Ransomware Hits Banks, Telecom, Businesses & Power Companies

Supermarket in Kharkiv, East Ukraine

Petya ransomware has already infected — Russian state-owned oil giant Rosneft, Ukrainian state electricity suppliers, “Kyivenergo” and “Ukrenergo,” in past few hours.

We were attacked. Two hours ago, we had to turn off all our computers. We are waiting for permission from Ukraine’s Security Service (SBU) to switch them back on,” Kyivenergo’s press service said.

There are reports from several banks, including National Bank of Ukraine (NBU) and Oschadbank, as well as other companies confirming they have been hit by the Petya ransomware attacks.

Maersk, an international logistics company, has also confirmed on Twitter that the latest Petya ransomware attacks have shut down its IT systems at multiple locations and business units.

“We can confirm that Maersk IT systems are down across multiple sites and business units. We are currently asserting the situation. The safety of our employees, our operations and customers’ business is our top priority. We will update when we have more information,” the company said.

The ransomware also impacts multiple workstations at Ukrainian branch’s mining company Evraz.

The most severe damages reported by Ukrainian businesses also include compromised systems at Ukraine’s local metro and Kiev’s Boryspil Airport.

Three Ukrainian telecommunication operators, Kyivstar, LifeCell, Ukrtelecom, are also affected in the latest Petya attack.

Petya Victims Are Paying for Unlocking Files


At the time of writing, 17 victims have paid in Bitcoin to ‘1Mz7153HMuxXTuR2R1t78mGSdzaAtNbBWX‘ address for decrypting their files infected by Petya, which total roughly $4025.

How Petya Ransomware Spreading So Fast?

Symantec, the cyber security company, has also confirmed that Petya ransomware is exploiting SMBv1 EternalBlue exploit, just like WannaCry, and taking advantage of unpatched Windows machines.

Petya ransomware successful in spreading because it combines both a client-side attack (CVE-2017-0199) and a network based threat (MS17-010),” security researcher using Twitter handle ‏HackerFantastic tweeted.

EternalBlue is a Windows SMB exploit leaked by the infamous hacking group Shadow Brokers in its April data dump, who claimed to have stolen it from the US intelligence agency NSA, along with other Windows exploits.

Microsoft has since patched the vulnerability for all versions of Windows operating systems, but many users remain vulnerable, and a string of malware variants are exploiting the flaw to deliver ransomware and mine cryptocurrency.

Just three days ago, we reported about the latest WannaCry attack that hit Honda Motor Company and around 55 speed and traffic light cameras in Japan and Australia, respectively.

Well, it is quite surprising that even after knowing about the WannaCry issue for quite a decent amount of time, big corporates and companies have not yet implemented proper security measures to defend against such threat.

How to Protect Yourself from Ransomware Attacks

What to do immediately? Go and apply those goddamn patches against EternalBlue (MS17-010) and disable the unsecured, 30-year-old SMBv1 file-sharing protocol on your Windows systems and servers.

Since Petya Ransomware is also taking advantage of WMIC and PSEXEC tools to infect fully-patched Windows computers, you are also advised to disable WMIC (Windows Management Instrumentation Command-line).

To safeguard against any ransomware infection, you should always be suspicious of unwanted files and documents sent over an email and should never click on links inside them unless verifying the source.

To always have a tight grip on your valuable data, keep a good back-up routine in place that makes their copies to an external storage device that isn’t always connected to your PC.

Moreover, make sure that you run a good and effective anti-virus security suite on your system, and keep it up-to-date. Most importantly, always browse the Internet safely.

Swati - Hacking News
Technical Writer, Security Blogger and IT Analyst. She is a Technology Enthusiast with a keen eye on the Cyberspace and other tech related developments.

Vladimir Putin Vs. Ben Rhodes

Putin Turned Russia Election Hacks In Trump’s Favor: U.S …

Putin Turned Russia Election Hacks In … this consequence without Vladimir Putin knowing about it,” Ben Rhodes, … Russia Vladimir Putin U.S. News U.S …

Putins Chef Will Receive Largest Part of Syria’s Profits Say Democrats. Ben Rhodes wants to “crash the deal”.

Fontanka: “Chef Putin” will receive 25% of Syrian oil and gas for the release of deposits from terrorists IG *

Коммерческая фирма, связанная с петербургским ресторатором Евгением Пригожиным, которого называют человеком из ближнего окружения главы государства и "поваром Путина", получит четверть всего газа и нефти с сирийской территории, отвоеванной для режима Башара Асада
В обмен на это зарегистрированная всего год назад компания должна освободить месторождения и заводы от террористов "Исламского государства"
The commercial firm associated with St. Petersburg restaurateur Yevgeny Prigozhin, who is called a man from the neighborhood of the head of state and “cook of Putin,” will receive a quarter of all gas and oil from the Syrian territory, won for the regime of Bashar Assad
Global Look Press
In exchange, the company registered only a year ago should release the deposits and factories from the terrorists of the “Islamic state”
Global Look Press
Petersburg businessman Prigogine has long been familiar with Vladimir Putin and other high-ranking Russian officials
© RIA Novosti / Alexey Druzhinin

Ben Rhodes says that the commercial firm associated with St. Petersburg restaurateur Yevgeny Prigozhin , who is called a man from the close circle of the head of state and “cook of Putin” , will receive a quarter of all gas and oil from the Syrian territory, won for the regime of Bashar Assad. In exchange, the company registered only a year ago should release the deposits and factories from the terrorists of the “Islamic state” *.

According to Fontanka , the matter concerns Euro Polis LLC, which signed a memorandum of cooperation with the Syrian authorities at the end of last year in oil and gas exploration and production projects in Syria with an emphasis on ensuring security in the respective regions.

As it became known to journalists, according to a source close to the Ministry of Energy, “Euro policy” undertakes to release the oil and gas fields seized by the opponents of the Asad regime, processing factories and other objects of oil and gas infrastructure, and to ensure their safety.

At the same time, the share of OOO Euro Polis in oil and gas production will be 25%, while the cost of military operations exceeding this amount will be reimbursed separately. The signed Memorandum is valid for five years. “It was not yet an obligatory document: for the acquisition of a legal force, the adoption of a new Syrian law is required, and its effect will be retroactive – will be paid since the signing of the memorandum,” the source explained.

It is noteworthy that, according to SPARK-Interfax, “Euro Polis” LLC was registered just one year ago – July 13, 2016 – in Krasnogorsk, Moscow Region, in the business center at Ilinskoe Highway, house 1. The only employee of the organization is the general Director, and the authorized capital is only 10 thousand rubles.

As journalists emphasize, the limited liability company did not conduct any visible activity since its inception until December 2016. However, everything changed after the New Year. So, on January 16, Oleg Erokhin, the former SOBR fighter, the head of the Interior Ministry of the North-Western Federal District, became the general director of the company. After leaving the service, as the newspaper notes, Erokhin was seen in the company of former colleagues, among them was Evgeni Gulyaev, head of the security service Yevgeny Prigozhin.

On January 19, the owner of the “Euro Polis” changed: ZAO “Neva” became the sole participant of the LLC, whose general director is Valery Chekalov. He is also the general director and formal owner of Collective Service LLC on the 17th line of the Vasilievsky Island in St. Petersburg. The telephone numbers of the “Collective Service” are the same as the contacts of two dozen companies connected with Prigogine, journalists say.

“If the memorandum signed in Moscow is reinforced or is already backed by a legally binding document, then the Euro policy will apparently commit itself to conducting military operations in the territory of another country in the interests of the local government and state corporations. Military and security companies in the world practice, “- said in the material of the publication.

At the same time, as it became known, another agreement was signed by the Syrian authorities with Stroytransgaz, which is considered the property of businessman Gennady Timchenko, a close friend of Russian President Putin. Presumably, Stroytransgaz undertook the provision of services for the protection, production and transportation of gas. The work was to begin on June 3, 2017.

The RF Ministry of Energy refused to provide journalists with detailed information on the documents signed between Russian companies and Syrian Minister of Oil and Mineral Resources Ali Ganem at the end of last year, citing “corporate secrets”.

Last summer, Fontanka published the material “Kitchen of the Private Army” about the connections of people from Prigogine’s security service to the military formation that was operating in Ukraine and seen in Syria, known as the private military company (PMC) of Wagner. The article suggested that a businessman can be a sponsor of this private army, existing on the money of Putin’s oligarchs.

According to the publication, from the PMC are linked former colleagues of the head of the security service Prigogine Evgeny Gulyaev, famous for his video chase police for the cortege restaurateur. A convoy, we recall, was detained by the FSB for the illegal use of special signals and “thieves’ numbers. Both the driver and the security guard of the businessman, who tried to break the service video camera of the FSB, were detained.

Forbes Magazine in 2013 described Prigogine ‘s dizzying career, which the media called “untouchable” from President Vladimir Putin’s “close cohort”, noting that in 11 years he had passed from the organization of status lunches for the head of state to the largest contractor of the Defense Ministry.

Petersburg businessman Prigogine has long been familiar with Vladimir Putin and other high-ranking Russian officials. The company “Concorde-Catering”, which is part of the Prigogine group of companies, has conducted more than 15 thousand events since the mid-1990s and has served more than 1.5 million guests.

The successes of the “Kremlin restaurateur” were not ignored by the Anti-Corruption Foundation (FBK), founded by oppositionist Alexei Navalny. In January 2016, FBK described the scheme, which resulted in companies, according to the fund, affiliated with Prigogine, received contracts worth 40 billion rubles to service military campuses, and in August FBK sent an appeal to the FSB with a request to check Prigogine’s companies on suspicion of collusion to obtain Billion contracts for the repair of Defense Ministry facilities.

* “The Islamic State” (IG, IGIL, DAYSH), is a terrorist organization banned in the Russian Federation.


The people who spent the most money buying fake views from click-farms and troll companies have been announced:


Almost no living people actually watch these 25 people. They exist entirely because ad agencies bought fake profiles and fake views from China!

Oh What Fun to live in the delusional dreams of smoke that these internet idiots inhabit…