FalconFanSince1969

Forum Members
  • Content count

    6,200
  • Joined

  • Last visited

  • Days Won

    8

FalconFanSince1969 last won the day on November 27 2016

FalconFanSince1969 had the most liked content!

4 Followers

About FalconFanSince1969

  • Rank
    Veteran Falcon

Recent Profile Visitors

5,105 profile views
  1. Haven't you been proven wrong enough? Who hired both of those guys?
  2. David Boston?
  3. It's a lot easier to boast when you're right than it is to own up to it when you're wrong. I've stuck my foot deep in my mouth plenty of times to know.
  4. Man the backfield of Freebird and Coletrain is gonna wreck next year.....
  5. Yea, but....
  6. What exactly do you expect when you have two RB's that combined for 24 TDs?
  7. And gotten a lot worse of a player allowing the defense to focus more on those other options on offense. Always gotta have something to complain about though.
  8. Really? Yes, I expect more. We should have been the best offense of all time instead of the 8th best. Ridiculous.
  9. https://wikileaks.org/ciav7p1/ UMBRAGE The CIA's hand crafted hacking techniques pose a problem for the agency. Each technique it has created forms a "fingerprint" that can be used by forensic investigators to attribute multiple different attacks to the same entity. This is analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible. As soon one murder in the set is solved then the other murders also find likely attribution. The CIA's Remote Devices Branch's UMBRAGE group collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation. With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the "fingerprints" of the groups that the attack techniques were stolen from. UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques. It's like you guys just choose to ignore that this information is out there because it violates your safe space and cozy outlook on the world
  10. You wanna talk about conspiracy theories when you spout this Russia ******** daily? THAT is a conspiracy theory with ZERO evidence. None, zilch, nada.
  11. Again, just a coincidence that WAPO keeps putting out this garbage since they've hired John Podesta right?
  12. https://twitter.com/MarinaMarraco?re...Ctwgr%5Eauthor https://www.washingtonpost.com/world...mepage%2Fstory Wrong.
  13. Extremely convenient how this WAPO story comes out right as the Seth Rich info does. Oh Podesta, you're going down.
  14. What we've all been saying for MONTHS Now we see where this story came from. A cover up for the real news of the day involving Seth Rich. Btw, John Podesta now works for the Washington Post https://www.washingtonpost.com/pr/wp...=.49cc29d4d1db John Podesta also left this email Agree. Happy to talk to the David's. Call me crazy, but I think if we can survive the next month, it will be possible, maybe even straightforward to get our arms around this once there is an actual campaign. I'm definitely for making an example of a suspected leaker whether or not we have any real basis for it. Full email convo with Robbie Mook https://wikileaks.org/podesta-emails/emailid/36082
  15. Why would you think that Thornton and Franklin would get the same kind of contract?