portland independent media center  
images audio video
newswire article announcements global

9.11 investigation | imperialism & war

9/11 Insurance Document Dump Announcement 1st January 2019

1 January 2019

Source via email:
"This is going to top Edward Snowden's NSA leaks."
[1,000s of hacked confidential documents pertaining to 9/11 litigation]

Press Release:  https://pastebin.com/4F5R8QyQ

LINK:  https://anonfiles.com/U714sep7b8/release_01_zip

Your friends, thedarkoverlord (@tdo_h4ck3rs)
Professional Adversarial Threat Group



Hiscox Syndicates Ltd and Lloyds of London are some of the biggest insurers on the planet insuring everything from the smallest policies to some of the largest policies on the planet, and who even insured structures such as the World Trade Centers.
Hash: SHA256

This is the thedarkoverlord here to deliver a message.

For those of you who live in the Nothern Hemisphere of planet Earth, Autumn has come to an end and Winter has arrived. The deciduous trees have been stripped nude with their discoloured leaves having fallen to the ground. Many creatures have had to prepare for their hibernation in Winter, eating and then gaining body fat (similar to humans during the holidays which are celebrated during this time of year). However, the creatures that make up thedarkoverlord do not hibernate, sleep, slow down, pause, or stop. For they work around the clock, pillaging and taking whatever they desire or seeping through the cracks of the foundation of the unlucky entity they targeted, weaving into them undetected and striking with surgical precision.

As 2018 has drawn to a close, we're welcoming 2019 with open arms and a big announcement, as we've done in the past. Many companies have received letters from us in the past few days and everyone who's a prospective client of ours should take note of this announcement.

Throughout our demonic fits of hacking, we often come across or create situations that turn quite peculiar very quickly. One such case was when we initiated an action against a seemingly ordinary company located in the United States, that unfortunately, didn't turn out the way we wanted. We breached their network and stole hundreds of gigabytes of litigation related documents (and others, that the world may soon come to see). We investigated our grand pile of loot and we found documents in regards to one of the most infamous events in the history of the United States. The key is that the documents were not public, nor would this company want them public. Not to mention thousands of documents surrounding companies such as Monsanto, Bank of America, and many other Fortune 500 companies. Hundreds of thousands of documents. What sorts of documents, specifically? E-mails, retainer agreements, non-disclosure agreements, settlements, litigation strategies, liability analysis, defence formations, collection of expert witness testimonies, testimonies, communications with government officials in countries all over the world, voice mails, dealings with the FBI, USDOJ, DOD, and more, confidential communications, and so much more.

We immediately approached this company with our most handsome business proposition, which they were reluctant to accept. However, they ultimately accepted and provided us a financial payment that satisfied our agreement. However, as with previous clients in the past (we're looking at you: Larson Studios), this client of ours also violated the agreement and began cooperating with law enforcement, which our agreements strictly forbid unless it's legally required of the client. This involvement with law enforcement became clear to us months later through a source of ours disclosing details of the client to us that we never informed the source about. We were absolutely appalled by this transgression against our agreement. We decided to offer this company a second chance to repent, accept responsibility, and satisfy our penalty request. They declined to accept our offer, so we're here today.

Let's get right into the juicy bits, shall we? Since our organisation has been around, we've performed many hacks that have resulted in some hilarious news articles and reports, grandiose stories of entire regions closing schools, NSA, CIA, GCHQ investigating us, hoping to hunt us down, raids all over the world, arrests of alleged members, and so much more. Most of you may know us from our hacks of Netflix and other studios such as ABC, HBO, CBS, and others. We do hope you haven't cancelled your subscription to them. However, the entire planet will now know our name as a result of a single client of ours failing our arrangement and refusing to accept the fair penalties. Edward Snowden leaks were quite impressive and caught the world's attention due to the highly sensitive nature of the materials and the global impact. What we're about to announce and leak will top Edward Snowden's finest work, both in volume and in impact. We'll guarantee to all our astute readers that the subsequent release of these materials will generate millions of news articles and result in the biggest and most significant data breach ever to have occurred.

Before we continue onto the story at hand, we'd like to remind the people of this planet who we are. We're now going to quote one of our own posts that we made on the very famous dark web hacker market and forum 'KickAss' (which you can find at the Tor address after this message) that was in response to a forum member stating that most hackers have nothing to worry about "if you're hacking a small dog food shop website, the people that will be after you won't be the same people that after you if you are carbanak."


"That's strange. We hack 'small dog food shops' regularly and yet we're hunted by the NSA and CIA. Our threat model is quite different than the majority of KA users. In fact, GCHQ has publicly released an advisory about thedarkoverlord hacking organisation. The NSA and even the CIA have been confirmed as hunting down thedarkoverlord. We're more hunted than Carbanak.

Our favourite article:  https://billingsgazette.com/news/local/after-columbia-falls-hack-that-closed-schools-experts-call-for/article_e3a8584e-cd15-5f19-a4e0-37bc2dbb2a1c.html

[begin quote]
Flathead Valley authorities contacted the FBI about two days after threats began, once they realized the group was not local. Lawrence said experts from the CIA and NSA also became involved in investigating the hack.

"These were world-class people," Lawrence said.

At one point, unsuccessful raids were conducted in London attempting to locate hackers, Lawrence said. But hackers use programs that cycle rapidly through IP addresses, which can show where someone is connecting to the internet, masking their location.

"They actually kicked down a couple of doors," Lawrence said.
[end quote]

Our second favourite:  https://www.ncsc.gov.uk/report/weekly-threat-report-3rd-november-2017

[begin quote]
The Dark Overlord Systematic cyber-enabled extortion

A cyber crime group called 'The Dark Overlord' has claimed responsibility for conducting cyber-enabled extortion campaigns in recent weeks. Victims include a London-based plastic surgery clinic and a Hollywood production studio, both of which are believed to have a number of high-profile clients. The group has a history of hacking organisations to obtain sensitive information before demanding money in exchange for not leaking it into the public domain. They leak snippets of data to the media to encourage them to report on their activity. This is aimed at "proving" that a breach has taken place, and increases the pressure on the victim to pay the ransom. 'The Dark Overlord' has been responsible for indiscriminately targeting health institutions, schools and media production companies over the last year.

Any organisation that deals with sensitive personal information (e.g. medical institutions, law firms) is at a higher risk of being targeted, and owes a particular duty of care to its clients because of the risk of severe emotional distress if client data is made public. Whilst evidence of the stolen data is often provided, the volume and sensitivity of the data may be exaggerated to maximise impact. This may inspire other cyber extortionists to adopt a similar methodology, especially as new opportunities present themselves due to an increasing amount of sensitive data being stored online. Any data breach and the associated media exposure may cause significant reputational damage and loss of business.
[end quote]

Listen to that one 'The Dark Overlord Systematic cyber-enabled extortion'. Beautiful.

As you can see, publicly reported proof that we have nation-states hunting us, and we're still here, stronger than ever. We have government agencies from all over the world writing advisories about our threat activities:


[begin quote]
TDO engages in a pattern of verbal abuse and threats of violence during communication with victims, regardless of the victims' willingness to pay extortion demands. In a recent incident, TDO threatened to publicize the sensitive behavioral reports and private health information of students. Throughout September and October 2017, TDO was reportedly connected to multiple threats of violence on school campuses, often prior to extortion attempts.
[end quote]

In fact, you can find dozens of videos of law enforcement agents standing behind podiums speaking about how they're working to stop us, from making appearances in conferences all over the world, to speaking behind podiums in their districts after we've pwned a local business. The United States Congress has even had a hearing about us, true story, and Christopher Wray himself (director of the U.S. FBI) has testified about his efforts against us.

Enjoy the director of the FBI speaking to U.S. Congress about thedarkoverlord:  https://flatheadbeacon.com/2017/09/27/daines-raises-concerns-cyber-terrorism-fbi-director/

[begin quote]
Daines: "So I understand it's an active investigation and you're limited in finding details however looking back at the big picture, what is the F.B.I. doing to attribute these cyber crimes and help bring these criminals to justice?"

Wray: "There's a of variety of technological things we can do. We are also working with partners to try to exchange information to help identify telltale signs that may help us link back to particular organizations. I think one of things we're seeing more and more in this area as much as any other is how this stuff transcends boundaries, and so some of the same organizations are targeting victims in other countries as well. We're really working more and more with our partners to try to see if we can have their two plus our two to get more than four, to get five and six and so that we can really deal with these otherwise very elusive foes."
[end quote]

Listen to this: 'so that we can really deal with these otherwise very elusive foes.'. We're 'very elusive foes'. Brilliant. Not to mention we're published in virtually every major news publication. Let's chat about threat models, shall we?"


We had the United State's Congress speaking about us then, now we'll see how they speak about now, after this announcement. Now that you're present on who we are and what we've done, let's dive deeper into this announcement.

Earlier in 2018, there was a fantastic and very brief article that was published about a global insurer being hacked. The hackers weren't named and the story fell to the darkness shortly after it came about. No further mentions were made. You might guess who these hackers were. Hello world! What was that story? It was this one:  http://www.globallegalpost.com/big-stories/us-law-firm-hack-hits-global-insurer-15490236/

What's the takeaway? We hacked Hiscox Syndicates Ltd.

And why didn't Hiscox Syndicates Ltd make this more public? Well, keep reading on to find out! It wasn't just Hiscox Syndicates Ltd that was put at risk, it was Lloyds of London as well as others. Another entity unnamed in this article is Lloyds of London and who we'll attribute as also being involved. Hiscox Syndicates Ltd and Lloyds of London are some of the biggest insurers on the planet insuring everything from the smallest policies to some of the largest policies on the planet, and who even insured structures such as the World Trade Centers. At this point, the keen amongst you may finally be drawing conclusions at this point, but you'll still be astonished at what's to come. Keep reading. This also means that Silverstein Properties is involved, doesn't it? Now things are getting more interesting. Most of you readers will not be privy to the processes and methods utilised by Fortune 500s to litigate high-impact cases, but we are, and thankfully for us, we're going to let you in on this process. When major incidents like the WTC 911 incident happen, part of the litigation must involve SSI (Sensitive Security Information) and SCI (Special Compartment Information) from the likes of the FBI, CIA, TSA, FAA, DOD, and others being introduced into evidence, but of course this can't become public, for fear of compromising a nation's security, so they temporarily release these materials to the solicitor firms involved in the litigation with the strict demand they're destroyed after their use and that remain highly protected and confidential to only be used behind closed doors. However, humans aren't perfect and many of these documents don't become destroyed, and when thedarkoverlord comes along hacking all these solicitor firms, investment banks, and global insurers, we stumble upon the juiciest secrets a government has to offer.

What's the takeaway? We hacked Lloyds of London and Silverstein Properties.

This release of 911 Litigation Documents is highly exclusive and only available from thedarkoverlord! For a limited time only, we're leaking the first few documents as proof of our trove on the famous dark web hacker forum 'KickAss'. For those of you who are most interested in acquiring the entire set of documents, which counts at over 18.000 documents, to include .doc, .pdf, .ppt, .xls, .tif, .msg, and many other interesting formats (or just to acquire the most highly secret and confidential documents), the good news for you is that we'll be selling these documents for a limited time. If you're a terrorist organisation such as ISIS/ISIL, Al-Qaeda, or a competing nation state of the USA such as China or Russia, you're welcome to purchase our trove of documents. You can easily contact us on the dark web hacker forum 'KickAss' or by e-mailing us at the e-mail found below. We'll also sign our PGP key into this message so that you may use our PGP key to contact us if you prefer to be more discreet.

What we'll be releasing is the truth. The truth about one of the most recognisable incidents in recent history and one which is shrouded in mystery with little transparency and not many answers. What we're offering to the world is the truth, exclusively from us, one of the planets premier hacking organisations dedicated to breaching leading targets and acquiring the most scandalous materials that we may use in our systematic extortion campaigns.

If a full public release happens in the near future, we'll guarantee that we're going to withhold only the most highly confidential and sensitive documents for private sale. For the rest of you: don't worry, there's thousands of documents still to go around.

If you're one of the dozens of solicitor firms who was involved in the litigation, a politician who was involved in the case, a law enforcement agency who was involved in the investigations, a property management firm, an investment bank, a client of a client, a reference of a reference, a global insurer, or whoever else, you're welcome to contact our e-mail below and make a request to formally have your documents and materials withdrawn from any eventual public release of the materials. However, you'll be paying us.

If you're a member of the press and would like to make an enquiry, you may do so at our press e-mail which is well known by members of the press. You may acquire this from any reporters who've published our quotes, as they all have it and will accept this signed announcement as permission to share our press e-mail address with you.

We've linked below sixteen images from a very few of the documents from the legal firm Blackwell Sanders Peper Martin, who is now Husch Blackwell. More details and files are available on the KickAss dark web hacker forum.


If the images above are taken down, use the link below:

LINK:  https://anonfiles.com/59G5hep8ba/images_zip

We're also releasing a small part of the larger archive of the 911 World Trade Center Litigation documents publicly. There's thousands of files included in the archive. Everyone can freely have a copy of the archive and we would encourage it. However, the archive is completely encrypted using a very strong AES encryption and very strong master keys that will prevent anyone from decrypting the veracrypt containers until we publicly release the keys for each layer. The archive is split between five layers. Layer 1 being the most modest, and Layer 5 containing the most heavy hitting and impactful documents, with Layer 2, Layer 3, and Layer 4 containing ever-increasingly scandalous materials. We encourage everyone to obtain a copy of all five archives. As time goes on, we may publicly release keys for each of these containers if our requests from the involved companies are not met. The link to download the 10 GB archive is below. Stay tuned for the possible release of decryption keys. We may release these keys on our new official Twitter page (@tdo_h4ck3rs) and/or on the dark web hacker forum 'KickAss'.

Below is the link to the torrent file to download the archive. The magnet URL follows the PGP at the end of this release.

LINK:  https://anonfiles.com/6fx7q6pfb6/911_Archive.zip_torrent
SHA1 HASH: F4C18CF980648E9FBDAC55952F5F3485DBBA95F9

And finally, a message to the companies directly involved to include the airlines, government agencies, the dozens of solicitor firms, the insurers, and the many others, this is a message directly to you: pay the fuck up, or we're going to bury you with this. If you continue to fail us, we'll escalate these releases by releasing the keys, each time a Layer is opened, a new wave of liability will fall upon you. You know our contact details.

You're welcome, heathens and what's the final lesson? When you're a client of ours and you've accepted an agreement of ours: follow it to the letter. We're not motivated by any political thoughts. We're not hacktivists. We're motivated only by our pursuit of internet money (Bitcoin).

Stay tuned on PasteBin for future announcements related to this leak. We'll always sign all of our releases for verification of authenticity. Subsequent announcements may include this original announcement.

Your friends,
thedarkoverlord (@tdo_h4ck3rs)
Professional Adversarial Threat Group
TheDarkOverlord Solutions LLC, World Wide Web, LLC

Give us a follow on our new Twitter (@tdo_h4ck3rs)!

P.S. We have more documents like these from other hacks of ours. If you're interested in industry specific materials, we can supply them for your purchase. We have dozens of TBs of data from almost all industries! We have everything from customer databases, medical records, credit cards, intellectual property, classified materials, source code, and much more and it's all for sale. Many of our for-sale threads are on the dark web hacker forum 'KickAss' and they detail our requested prices and the content available. We're of course always negotiable on pricing.

P.S.S. To all of our current and past associates, clients, colleagues, customers, and friends: we thank you for your entertaining exchanges and relationships and we wish you continued success.

thedarkoverlord E-Mail Address:  tdohackers@protonmail.com
Backup1 E-Mail Address:  thedarkoverlord@msgsafe.io
Backup2 E-Mail Address:  thedarkoverlord@torbox3uiot6wchz.onion
Make your own at (www.torbox3uiot6wchz.onion)
KickAss Tor Address: kickassugvgoftuk.onion





MAGNET: magnet:?xt=urn:btih:4123c41c1040ff55f9fcc381ded2b0cfa44ba5f3&dn=911_Archive.zip&tr=udp%3a%2f%2ftracker.coppersurfer.tk%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.internetwarriors.net%3a1337%2fannounce&tr=udp%3a%2f%2ftracker.opentrackr.org%3a1337%2fannounce&tr=http%3a%2f%2ftracker.internetwarriors.net%3a1337%2fannounce&tr=udp%3a%2f%2f9.rarbg.to%3a2710%2fannounce&tr=udp%3a%2f%2fexodus.desync.com%3a6969%2fannounce&tr=udp%3a%2f%2fexplodie.org%3a6969%2fannounce&tr=http%3a%2f%2fexplodie.org%3a6969%2fannounce&tr=udp%3a%2f%2ftracker2.itzmx.com%3a6961%2fannounce&tr=udp%3a%2f%2ftracker1.itzmx.com%3a8080%2fannounce&tr=http%3a%2f%2ftracker2.itzmx.com%3a6961%2fannounce&tr=http%3a%2f%2ftracker1.itzmx.com%3a8080%2fannounce&tr=udp%3a%2f%2fipv4.tracker.harry.lu%3a80%2fannounce&tr=udp%3a%2f%2fbt.xxx-tracker.com%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.torrent.eu.org%3a451%2fannounce&tr=udp%3a%2f%2ftracker.tiny-vps.com%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.cyberia.is%3a6969%2fannounce&tr=udp%3a%2f%2fthetracker.org%3a80%2fannounce&tr=udp%3a%2f%2fopen.stealth.si%3a80%2fannounce&tr=udp%3a%2f%2fopen.demonii.si%3a1337%2fannounce&tr=udp%3a%2f%2fdenis.stalker.upeer.me%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.vanitycore.co%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.port443.xyz%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.iamhansen.xyz%3a2000%2fannounce&tr=udp%3a%2f%2fretracker.lanta-net.ru%3a2710%2fannounce&tr=http%3a%2f%2ftracker.tfile.me%3a80%2fannounce.php&tr=http%3a%2f%2ftracker.tfile.me%3a80%2fannounce&tr=http%3a%2f%2ftracker.tfile.co%3a80%2fannounce&tr=http%3a%2f%2ftracker.port443.xyz%3a6969%2fannounce&tr=http%3a%2f%2fprivate.minimafia.nl%3a443%2fannounce&tr=http%3a%2f%2fprestige.minimafia.nl%3a443%2fannounce&tr=http%3a%2f%2fpeersteers.org%3a80%2fannounce&tr=http%3a%2f%2fopen.acgnxtracker.com%3a80%2fannounce&tr=https%3a%2f%2ftracker.fastdownload.xyz%3a443%2fannounce&tr=https%3a%2f%2fopentracker.xyz%3a443%2fannounce&tr=http%3a%2f%2ftracker3.itzmx.com%3a6961%2fannounce&tr=http%3a%2f%2ftorrent.nwps.ws%3a80%2fannounce&tr=http%3a%2f%2fopentracker.xyz%3a80%2fannounce&tr=http%3a%2f%2fopen.trackerlist.xyz%3a80%2fannounce&tr=http%3a%2f%2ft.nyaatracker.com%3a80%2fannounce&tr=udp%3a%2f%2fzephir.monocul.us%3a6969%2fannounce&tr=udp%3a%2f%2ftracker1.wasabii.com.tw%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.swateam.org.uk%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.open-tracker.org%3a1337%2fannounce&tr=udp%3a%2f%2ftracker.gbitt.info%3a80%2fannounce&tr=udp%3a%2f%2ftracker.freddit.nl%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.filepit.to%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.dyn.im%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.dler.org%3a6969%2fannounce&tr=udp%3a%2f%2ftorrentclub.tech%3a6969%2fannounce&tr=udp%3a%2f%2fpubt.in%3a2710%2fannounce&tr=https%3a%2f%2ftracker.gbitt.info%3a443%2fannounce&tr=http%3a%2f%2ftracker1.wasabii.com.tw%3a6969%2fannounce&tr=http%3a%2f%2ftracker.torrentyorg.pl%3a80%2fannounce&tr=http%3a%2f%2ftracker.open-tracker.org%3a1337%2fannounce&tr=http%3a%2f%2ftracker.gbitt.info%3a80%2fannounce&tr=http%3a%2f%2ftracker.city9x.com%3a2710%2fannounce&tr=http%3a%2f%2ftorrentclub.tech%3a6969%2fannounce&tr=http%3a%2f%2fopen.acgtracker.com%3a1096%2fannounce&tr=http%3a%2f%2fnode.611.to%3a9000%2fannounce&tr=http%3a%2f%2f0d.kebhana.mx%3a443%2fannounce&tr=wss%3a%2f%2ftracker.openwebtorrent.com%3a443%2fannounce&tr=wss%3a%2f%2ftracker.fastcast.nz%3a443%2fannounce&tr=wss%3a%2f%2ftracker.btorrent.xyz%3a443%2fannounce&tr=udp%3a%2f%2ftracker4.itzmx.com%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.kamigami.org%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.justseed.it%3a1337%2fannounce&tr=udp%3a%2f%2fpackages.crunchbangplusplus.org%3a6969%2fannounce&tr=https%3a%2f%2f1337.abcvg.info%3a443%2fannounce&tr=http%3a%2f%2ftracker4.itzmx.com%3a2710%2fannounce&tr=http%3a%2f%2fshare.camoe.cn%3a8080%2fannounce&tr=http%3a%2f%2fretracker.mgts.by%3a80%2fannounce&tr=http%3a%2f%2fomg.wtftrackr.pw%3a1337%2fannounce&tr=http%3a%2f%2ffxtt.ru%3a80%2fannounce&tr=http%3a%2f%2fagusiq-torrents.pl%3a6969%2fannounce



VICE 01.Jan.2019 17:23


cybercrime | by Joseph Cox | Jan 1 2019, 1:11pm

Hackers Threaten to Dump Insurance Files Related to 9/11 Attacks

Image: Carol M. Highsmith

On Monday, New Year's Eve, a hacker group announced it had breached a law firm handling cases related to the September 11 attacks, and threatened to publicly release a large cache of related internal files unless their ransom demands were met.

The news is the latest public extortion attempt from the group known as The Dark Overlord, which has previously targeted a production studio working for Netflix, as well as a host of medical centres and private businesses across the United States. The announcement also signals a slight evolution in The Dark Overlord's strategy, which has expanded on leveraging the media to exert pressure on victims, to now distributing its threats and stolen data in a wider fashion.

In its announcement published on Pastebin, The Dark Overlord points to several different insurers and legal firms, claiming specifically that it hacked Hiscox Syndicates Ltd, Lloyds of London, and Silverstein Properties.

"Hiscox Syndicates Ltd and Lloyds of London are some of the biggest insurers on the planet insuring everything from the smallest policies to some of the largest policies on the planet, and who even insured structures such as the World Trade Centers," the announcement reads.

"When major incidents like the WTC 911 incident happen, part of the litigation must involve SSI (Sensitive Security Information) and SCI (Special Compartment Information) from the likes of the FBI, CIA, TSA, FAA, DOD, and others being introduced into evidence, but of course this can't become public, for fear of compromising a nation's security, so they temporarily release these materials to the solicitor firms involved in the litigation with the strict demand they're destroyed after their use and that remain highly protected and confidential to only be used behind closed doors," the statement read. "

Read About What This Is 01.Jan.2019 19:32


"Motherboard" is certainly not a reliable source in every instance.

Hackers Threaten to Dump Insurance Files Related to 9/11 Attacks

"VICE" Is Also With The Dark Side 01.Jan.2019 19:49


"VICE" is a semi-tabloid which owns "Motherboard" (IIRC). At the end of the day, they are with Cheney.

2 articles are identical - Did you examine the Leaked Documents themselves? 01.Jan.2019 23:39



VICE = Motherboard. SAME ENTITY.

'blues', Do You Ever READ before posting here? 01.Jan.2019 23:49

VICE 01.Jan.2019 17:23

^ JUST ABOVE-*before* YOUR 1st POST, 'blues'

Google Drive links for entire dump 01.Jan.2019 23:56

Posted by u/3x1x4

Google Drive Links for everything The Dark Overlord has released

I'll try to keep an eye on this and update as more releases become available.

For the unaware, hackers stole some 18,000 documents related to 9/11 and will be releasing them if their ransom isn't met

These documents show the legal fist fight companies went through to determine who was gonna be on the hook for hundreds of millions of dollars in insurance payments.

We Transfer link  https://we.tl/t-2yuRjaYSaG for all files if you don't trust Google Drive

Preview_Documents  https://drive.google.com/open?id=1oiPWfQy3TO0ZW-LGLKipdpl-DltAyXMu
The first of 5 encrypted folders

Advantage_Life  https://drive.google.com/open?id=1xc9elFmpuhsPhFVrOYgIjqbIrrBv6baY
Press release  https://pastebin.com/kjzX26AT

release_01  https://drive.google.com/open?id=1nZmymnOa1BB_GMkXU99AMn4YqbKXUQOB
Press release  https://pastebin.com/e5sKzQA0

images  https://drive.google.com/open?id=1yt7Frk1Ftsb3MbrPvFDePIVQRled-NhU
Press release  https://pastebin.com/4f5r8qyq

Other links:
Dark Overlord's Twitter profile  https://twitter.com/tdo_h4ck3rs
Dark Overlord's Reddit profile (unconfirmed)  https://www.reddit.com/user/tdo_h4ck3rs/comments/
Dark Overlord's First 4chan post  http://boards.4chan.org/pol/thread/198337573#p198358308
Dark Overlord's 4chan AMA thread  http://boards.4chan.org/pol/thread/198364116#p198364116

Big Problem Huh? 02.Jan.2019 00:02


Maybe you just don't like what I have to say about the war-mongering VICE and its Motherboard baby?

Well I don't appreciate fake hipsters who support war on the side.

blues, *STFU*. 02.Jan.2019 17:48



go elsewhere, blues

Checkpoint 01 for the document release, attained. 02.Jan.2019 17:54


Layer 1 of the release has not yet been decrypted.

9/11 Papers MegaLeaks: Checkpoint 01

Chronological breakdown (reddit) of the released documents

Updates (summarized) on the document release, bitcoin payments can be found at the link below :

9/11 Papers MegaLeaks: Checkpoint 01 02.Jan.2019 17:55

Posted byu/tdo_h4ck3rs

9/11 Papers MegaLeaks: Checkpoint 01


This is the thedarkoverlord here to deliver a message.

We're now calling this megaleak, the '9/11 Papers'.

Congratulations, public. A transfer to our official Bitcoin wallet was completed in the amount of 0.08 BTC which passes 'Checkpoint 01' of the 9/11 Papers leak. As promised, we're now releasing 25 random documents from, the yet to be decrypted, Layer 1. We're not releasing the key for Layer 1 yet, as our other checkpoints haven't been met. However, Checkpoint 01 of this Mega-leak has been passed.

Enjoy the well earned data.

LINK:  https://anonfiles.com/s5Zd2dp4b4/Checkpoint_01_zip SHA-1 HASH: 2978A2CB1D2E8B139B17DE5503C4D415AD59267B

We hope that there'll be more releases. Keep up the Bitcoin payments. Our reward: internet money, your reward: 9/11 secret documents, never before seen by the public. Your money is unlocking the truth and providing answers. Keep it flowing.

United States law enforcement agencies have attempted to silence us from our releases by requesting Twitter to suspend our account. An appeal to Twitter has gone unanswered. We'd like everyone to know that we're still here. We've taken to Reddit with our own sub. We'll provide updates as we have them.

Our sub-reddit:  https://www.reddit.com/r/thedarkoverlords

Second Press Release:  https://pastebin.com/8ksc0aYU Original Press Release:  https://pastebin.com/4F5R8QyQ

Stay tuned on PasteBin for future announcements related to this leak. We'll always sign all of our releases for verification of authenticity.

Your friends, thedarkoverlord Professional Adversarial Threat Group TheDarkOverlord Solutions LLC, World Wide Web, LLC


CONTACT AND LOCATION DETAILS: thedarkoverlord E-Mail Address:  tdohackers@protonmail.com Backup1 E-Mail Address:  thedarkoverlord@msgsafe.io Backup2 E-Mail Address:  thedarkoverlord@torbox3uiot6wchz.onion Make your own at (torbox3uiot6wchz.onion) KickAss Tor Address: kickassugvgoftuk.onion

motherboard 02.Jan.2019 20:01


Regardless of what you think about Vice, Motherboard is a legit source in terms of cybersecurity news. They have a few really good reporters who are extremely well versed in that area.

Vice is,,,, 02.Jan.2019 21:03

Lloyd Hart lloydhart2008@gmail.com

shit like democracy now. They report some news that they can't twist because other more ligitimate outlets are reporting the same stories but then they read off of the CIA's Syria talking points sheet. Motherboard is captured as well and is shit.

9/11 Papers MegaLeaks subreddit, Now banned. 04.Jan.2019 20:10



9/11 Papers MegaLeaks: Checkpoint 02 [*BANNED*]

Reddit admins have informed Conspiracy mods that:

"... links to the stolen insurance materials from the Dark Overlord hackers is considered against our policy on personal and confidential information."

All such links must be removed until we receive further clarification from Reddit administrators.

Thanks for your understanding.

documentation on Boston Logan Airport security screening companies 3 04.Jan.2019 22:29


Foreign-owned :

1) Huntleigh USA is (subsidiary of) ICTS International N.V. which is incorporated in Netherlands (but Israeli-owned; established in 1982 by former members of the Shin Bet, Israel's internal security agency, and El Al airline security agents).


Deposition of a former Huntleigh employee (Simon Robinson) in the document dump [ Source: Preview Documents, 00135820.MSG with attachment in the email called 022207srobinson.txt ] , states the name of his regional manager, Eytan Shafir, who was responsible for Huntleigh's Boston Logan Airport passenger screening at the time of 9/11. Eytan Shafir still would have been regional managing director of Huntleigh during 9/11.

2) Globe is a division of Securitas which is Swedish.

3) Argenbright is a division of Securicor from the UK.

Employees of the screening companies had access to the airport secure zone and even to airplanes. Security at Logan circa 1990s-2000 was notoriously bad. Three eyewitnesses spotted al Qaeda hijackers casing the security checkpoints at Boston's Logan Airport months prior to 11 September 2001.

Doesn't matter if the "hijackers" actually commandeered or guided the airliners to their targets that day.

What is crucial, is that 19 'culprits' were put into patsy-positions on board airline flights the morning of 9/11 to later be paraded in the government investigations / mass media as the "hijackers". Control of pre-board screening for 'culprits' would be central to any cover story or official explanation to be hoisted after the fact.

Marvin Bush was a on the board of directors of a company (Securacom at time of 9/11, later named Stratesec) providing electronic security for the World Trade Center, Washington-Dulles International Airport and United Airlines:

Recall also, 2002 amendment (by Dick Armey, R-Texas) to the Homeland Security bill that would grant immunity to airport screening firms whose 'negligence' may have contributed to the 9-11 attacks.

Jason Bermas: What's Actually In The Dark Overlord Files? 13.Jan.2019 16:06


January 5, 2019 - Jason Bermas discusses What's Actually In The Dark Overlord Files?

(23 minutes)  http://www.youtube.com/watch?v=H-4PKS4LNeI


Jan 8, 2019 James Corbett interviews Jason Bermas


Jason Bermas: The Dark Overlord Files Layer 2 Revealed! 13.Jan.2019 16:39


January 9, 2019 - The Dark Overlord Files Layer 2 Revealed!

(27 minutes)  http://www.youtube.com/watch?v=s0M3DciysGs