Blog Archives

Deutsche Bank has Collapsed! Part 2

collapse-of-deutsche-bank

By Tom Heneghan, International Intelligence Expert

UNITED States of America   –   It can now be reported that Deutsche Bank is BROKE!

A FEW OF PREVIOUS VITAL BRIEFINGS ON THE NAZI GERMAN DEUTSCHE BANK:

Oct 11, 2008     …P.S. The Virginia National Security Court, which George W. Bush fraud wants to close down, has compiled evidence showing the UN-elected punk Bush fraud has paid MILLIONS of dollars of BRIBES to German Prime Minister Angela Merkel in exchange for keeping secret the $BILLIONS of STOLEN U. S. Treasury funds kept at the Deutsche Bank.

Merkel is keeping secret the Deutsche Bank account numbers of Bush fraud’s sociopath father, East German DVD agent, former president George Herbert Walker Bush.

It can be reported that daddy Bush has BILLIONS of dollars of STOLEN U. S. Treasury funds parked in his secret private accounts at the Deutsche Bank.

P.P.S. At least ten (10) assassinations of bank officials in Germany and World Bank employees have taken place in the last two weeks. All of the assassinations are linked to elements of the East German DVD and the rogue Bush – Bill Clinton – Israeli Mossad – Gary Best “TRUE COLORS” assassination teams.

These murdered bank officers had a long-standing relationship with former [privately owned] U. S. Federal Reserve Chairman Alan Greenspan.

Sep 18, 2016     …U.S. Treasury officials are now in possession of financial evidence tying Nazi German Deutsche Bank, HSBC Bank of Englewood, Colorado, run by Jewish Mobster and Bank Bail Out Scamster Larry Mizel, along with Bank of America and Wells Fargo, to secret ISIS accounts involving the sale of black market oil.

May 27, 2015     …It can now be reported that the massive bribery scandal involving the World Soccer Federation (FIFA) and its president Sepp Blatter currently being investigated by the U.S. Department of Justice reaches beyond bribery and blackmail regarding competition between nations to host the World Cup Soccer Championships, which happens every four years.

This massive scandal involves the actual bribery of referees and the fixing of games tied to massive offshore gambling profits and international foreign currency trading.

FACT: The last World Cup semi-final in 2014 between host nation Brazil and the Federal Republic of Germany was fixed.

Joint U.S.-French Intelligence Task Force can now reveal that both the Central Bank of Brazil and the German Deutsche Bank paid off Brazilian coaches, Brazilian players, and totally corrupt Brazilian politicians to lose the World Cup semi-final by an unbelievable 7 to 1 margin.

This result on Brazilian home soil, a 5-time world champion, was clearly a scripted result with the financial gains in offshore gambling casinos who bet on Brazil to lose by this unprecedented margin was in the millions.

Jun 22, 2014    …the financial psyops involving “Crisis Actors” (NOT terrorists) in Iraq is being financed by British MI-6 aka the Bank of England’s secret proprietary “Humewood Assoc” along with Sherwood Investments, a Bahamas money laundry tied to HSBC Hong Kong.

There is a tie in to United Asian Group, a Central Bank of Japan secret proprietary that specializes in writing illegal cross – collateralized derivatives based on the world price of oil with the benefactors being the German NAZI Deutsche Bank, Barclays Bank of England and the Bank of England.

The bagman for this money laundry is Hillary Rodham Clinton’s financial stooge George Pasmore who works for Merrill Lynch and Bank of America and corresponds with Hillary by calling her “Queen Melusina”.

Profits in these over inflated asset bubbles in the latest foreign currency ponzi scheme are being laundered through another secret CIA-P2 Bush proprietary, code name “Malaga” headquartered at the National Bank of Spain.

Saudi Arabia, the nation of Qatar, the United Arab Emirates (UAE) and British Petroleum (BP) are actually paying commissions to the ISIS “Crisis Actors” for their role in boosting the price of oil and other asset and currency bubbles as to allow the crooked banks to write even more derivatives aka I.O.U.s between each others, which will eventually collapse the entire world economy.

P.S. At this hour we can report that the IMF has frozen the NAZI German “Black Eagle Trust” account at the NAZI German Deutsche Bank.

Aug 10, 2014    …Mellon Bank of New York, U.S. Citibank and German Deutsche Bank as the …

Dec 28, 2014     …Barclays Bank of England, Citibank USA, the German Deutsche Bank, Bank of …

Bank Runs Hit Greece and Thomas Jefferson is in the Building, Next!

Jun 28, 2015     …”bail-out” plan proposed by European creditors (the Deutsche Bank) …

Apr 29, 2015     …of this massive Bush-Clinton-NAZI German Deutsche Bank ponzi scheme?

Aug 1, 2016      …Merkel administered Deutsche Bank derivative debt has now reach 98 TRILLION

May, 8, 2016     …the collusion between the Bush – Clinton – Barack Obama – Mitt Romney crooked bank alleged ISIS (a British MI6 entity) has allowed Saudi Arabia and Iran to control 80% of what is now a black market oil consortium, which allows the alleged terrorist organization ISIS to buy oil at $20 barrel.

This allows crooked worldwide banks, including Citibank, Bank of America, Wells Fargo, Bank of New York Mellon and the noted Nazi German Deutsche Bank, to roll over worthless derivatives reference I.O.U.s between each other as collateral to rig worldwide financial markets with no real collateral or margin as a basis for their worldwide financial ponzi scheme.

At this hour, the International Monetary Fund (IMF) Managing Director Christine Lagarde has frozen crooked foreign currency Danish kroner based accounts tied to the Bank of England and other crooked worldwide banks that have been tied to the theft of both U.S. and French Treasury funds based on the Reagan-Mitterrand Protocols.

Dec 16, 2012    …Psyops, Black Ops and Rip Offs

…It is important to remember that the night of the failed psyop in Benghazi, Libya massive volatility took place in the trading of both precious metals and energy futures markets.

We can now divulge that billions of dollars were exchanged the night of the Benghazi attack between U.S., Turkish, Saudi and Iranian representatives with the funds and proceeds laundered into the German Deutsche Bank, UBS Switzerland, U.S. Citibank and the Royal Bank of Scotland.

European INTERPOL, the IMF and the U.S. Provost Marshal are now in possession of computerized records generated by PROMIS software that fingers the aforementioned gangsters in this massive money laundry.

Item: We now know why the U.S. State Department refused to send armed security to the CIA outpost in Benghazi, Libya.

It is now clear that Ambassador Christopher Stevens own State Department wanted him kidnapped.

Stevens was quickly assassinated when he got a heads up from his own intelligence in the CIA, along with French intelligence, about this kidnapping ransom scheme involving the Muslim cleric.

However, Stevens did not die in vain since he was able to tip off the IMF, European INTERPOL and the U.S. Provost Marshal on what was occurring.

P.P.S. We can now report that Deutsche Bank, UBS Switzerland, HSBC Hong Kong and the Royal Bank of Scotland are about to face new IMF charges regarding the illegal manipulation of the London LIBOR rate.

New evidence links these crooked banks to rigging the LIBOR rate with the assistance of the U.S. Federal Reserve in keeping the Japanese yen at an artificially high rate of exchange versus the U.S. dollar for a period of two (2) years

Insider “Deutsche Bank COLLAPSE Tomorrow – Friday 9-30-2016” – Will Wipe out banking system worldwide!

Post by Newsroom

– Sep 29, 2016

https://www.superstation95.com/index.php/world/2130

Insider “Deutsche Bank COLLAPSE Tomorrow – Friday 9-30-2016″ – Will Wipe out banking system worldwide!

German Bank insiders are confirming to SuperStation95 that Germany’s largest, Bank, Deutsche Bank” will “colapse” tomorrow, Friday, September 30, 2016. The German government has no plans to bail out the bank and its demise could wipe out Banks in the US and other countries worldwide!

According to the insider:

System downfall tomorrow. A collapse of this bank is unavoidable now, and it wipes out everything immediately.

Wolfgang Gerke, President of the Bavarian Finance Centre, the German bank sees in a serious imbalance.

“This is absolutely not about Peanuts. We experience real shockwaves. The Bank is in real trouble, “Gerke said the Thursday edition of the” Passauer Neue Presse “.

This is as good as a death sentence. It is insider info (presumably from the DB itself), after the financial collapse is to take place on 30 September.

MORE: A “run” is taking place against Deutsche Bank in Germany as citizens rush to take out money . . . but they are being systematically delayed. At least on Depositor ordered 2,000 Euros transferred out yesterday via wire transfer. At close of business, Deutsche Bank had still NOT sent the money. When challenged, the bank claimed they needed to verify all the information. The Depositor now says he feels they no longer have liquidity and cannot pay depositors.

UPDATE 12:58 PM EDT —

Germans are being quietly told that ALL BANKS in Germany will close on October 1, ALL ATMS, Credit and Debit Cards are likely to be “unavailable” for unknown duration! ! !

European Central Bank Chairman Draghi refused to talk about Deutsche Bank today, saying It is not his fault the bank appears to be in trouble.

German Insider:

There is panic in DB now. A lot of People withdraw money, close accounts. One guy says he transferred 25’000 Euro and the bank called him back if the amount and transaction is correct and true! Still has not sent the money!

This is a developing story, please check back.

Stock markets worldwide have now tuned-in to this situation and they are falling fast . . . .

Last modified on Thursday, 29 September 2016 13:07

https://www.superstation95.com/index.php/world/2130

VITAL INTELLIGENCE BRIEFINGS

August 4, 2013     It can now be reported that the nation of Yemen has arrested five (5) Israeli Mossad agents who have been operating an alleged al-Qaeda terror cell on Yemeni soil.

This new Israeli Spy Ring is responsible for the alleged terrorist threats made against the American, British, German and French diplomatic installations around the world.

Note: The five (5) Israeli Mossad agents masquerading as al-Qaeda terrorists also have ties to the American-Turkish Council operating out of Istanbul, Turkey.

The American – Turkish Council (which has direct working relationship with the U.S. State Department) was responsible for the assassination of the late U.S. Ambassador to Libya Christopher Stevens and three other Americans in Benghazi, Libya.

P.S. At this hour the Obama Administration, along with the U.S. State Department, the CIA and the U S Department of Justice, are involved in a massive obstruction of justice operation in attempting to silence former and current CIA employees who are material witnesses to the massive TREASON that took place in Benghazi, Libya on 09-11-2012.

GOP Rep: Obama WH Is Hiding Benghazi Survivors AND Changing Their Names

http://www.thegatewaypundit.com/2013/08/breaking-obama-administration-is-hiding-benghazi-survivors-dispursing-them-around-the-country-and-changing-their-names-video/

P.P.S. We can also divulge that Canadian Intelligence officials have turned over new evidence to the U.S. Department of Justice that fingers two (2) Iranian Intelligence officers: Chiheb Esseghaier and Raed Jaser as the operatives responsible for the Patriot Day bombing in Boston, Massachussets (Operation Wack-a-Mole aka Benghazi Blowback).

Note: Both Esseghaier and Jaser were part of a four-man team that were on the ground in Boston and included two (2) Saudi nationals that escaped and flew out of Boston Logon Airport on a Lufthansa flight that arrived in the nation of Leichtenstein.

The two were assassinated the next day by outsourced Israeli Mossad assets, Blackwater mercenaries tied to British MI6, while they were on their way to the National Bank of Liechtenstein to receive their commissions. The commissions were to be paid out by none other than an American-Turkish Council account at the National Bank of Liechtenstein.

The two Iranians were arrested on April 23, 2013 by Canadian Law Enforcement and charged with plotting a terrorist attack against a Canadian passenger train that just so happened to have three former CIA officials as passengers who had worked at the Benghazi, Libyan outpost.

It is not a coincidence that Canadian officials have produced evidenced showing that the two Iranians arrested in the plot to bomb a Canadian passenger train were also employees of none other than the American-Turkish Council.

Item: Dzhokhar Tsarnaev, the crisis actor and patsy and former Department of Homeland Security employee, who is on trial now for the Boston bombing FALSE FLAG remains totally innocent.

We can now divulge that Tsarnaev was never wounded in the neck and the injuries he received were at the Jewish administered hospital in Boston when the FBI and CIA officials violated Tsarnaev’s Miranda Rights and then used intimidation and physical assault in a failed attempt to get Tsarnaev to give them a false confession.

http://www.tomheneghanbriefings.com/Criminal-Blowback-Exposed-NEXT__11-22-2015.html

January 31, 2016     It can now be reported that four (4) of the now classified TOP SECRET national security emails tied to the FBI investigation of former U.S. Secretary of State NAZI neocon Hillary Rodham Clinton deal with the existence of domestic political assassination teams headquartered in Albuquerque, New Mexico with a link to the NSA – administered E-Systems out of Dallas, Texas aka Bush NAZI ‘Skull and Bones’ headquarters.

http://www.tomheneghanbriefings.com/Clinton-Bush-Assassination-Teams-Revealed__01-31-2016.html

June 9, 2016     It can now be reported that, as of this hour, alleged ISIS aka the Israeli Secret Intelligence Services, along with the NAZI Paperclip Bush-Clinton-Obama-CIA-NSA Crime Family Syndicate, have activated forty-five (45) U.S. domestic assassination teams on American soil to coordinate the murders of thousands of patriotic American citizens who are described as “loud mouths” and who know too much and are opposed to the illegal, un-Constitutional occupation of the United States of America by this treasonous filth that began in earnest with the year 2000 election coup d’état against the American People.

http://www.tomheneghanbriefings.com/Hillary-Clinton-Now-Fingered-as-Lesbian-Racist-Crooked-Bank-Stooge__06-09-2016.html

September 4, 2016     Stone also reveals that the corrupt Nazi Paperclip U.S. NSA and CIA plan to steal the year 2016 presidential election using NSA technicians headquartered in Trenton, New Jersey, which is a known outpost for the Israeli Mossad.

Reference: These are the same NSA technicians that were led by CIA – Bush Crime Family crony Charles Kane that hacked the Voters News Service at 8:00 p.m. CST presidential election night 2000.

It is called “Strip and Flip”.

http://www.tomheneghanbriefings.com/Roger-Stone-Fingers-the-Bush-Clinton-CIA-Crime-Syndicate-Plus-Emergency-Update__09-04-2016.html

September 10, 2016     It can now be reported that Green Party candidate Jill Stein calls for a new independent investigation of 9/11 further confirms that the U.S. Military Michigan and Tennessee Flag Officers have enough evidence to arrest and detain year 2000 illegal White House occupant, junior George W. BushFRAUD and former alleged Vice pResident Richard Cheney for HIGH TREASON involving the 9/11 BLACK OPS aka Adolf Hitler – style Reichstag Fire that led to the destruction of the U.S. Constitution aka the Patriot Act aka junior Bush FRAUD’s Nazi German-style Enabling Act, which made every American citizen a guinea pig to have all of their phone calls and email conversations monitored by the NAZI German administered CIA and NSA – totally illegally and UN-Constitutional!

Co-conspirators included Israeli Prime Minister Benjamin Netanyahu, Israeli Mossad agent and then U.S. Assistant Attorney General Michael Chertoff, then U.S. Senator and Bush-Crime Family CIA stooge, lesbian Hillary Rodham Clinton, as well as former New York Mayor, Nazi Jew Michael Bloomberg.

All of the aforementioned parties were fully aware of intelligence briefings months before the 9/11 BLACK OP that the United States was about to be attacked aka a U.S. intelligence run Psy Op with the assistance of Benjamin Netanyahu’s Israel Mossad as to end the U.S. Constitution as we know it, legitimize junior George W. Bush FRAUD after his blatant theft of the year 2000 presidential election, and pave the way for a U.S. CIA line of secession based on junior BushFRAUD and, of course, Nazi Jew neocon warmonger Hillary Rodham Clinton.

Note: John ‘Skull and Bones’ CIA Kerry Cohen Kahn was junior George W. Bush FRAUD’s 2004 Massachusetts patsy like Dukakis was for daddy Bush (George Herbert Walker Bush) in 1988.

It should also be remembered that ‘Skull and Bones’ Kerry was ‘Skull and Bones’ George W. Bush’s third cousin.

P.S. The dots have now been connected by the U.S. Military Flag Officers relating to the previously redacted 9/11 documents which connect the role of Saudi Intelligence assets in Los Angeles and San Diego to Israeli Mossad assets in Trenton, New Jersey to their role in the 9/11 BLACK OP including planting demolitions in the World Trade Center buildings the night before the 9/11 Reichstag Fire.

It should be noted that it was then Assistant U.S. Attorney General, Nazi Jew Michael Chertoff, that allowed the 9/11 co-conspirators aka “The Dancing Israelis” to be flown out of the United States days after 9/11 before the FBI could conduct and interrogation of the suspects.

It should also be noted that sexual deviate, junior George W. Bush FRAUD, allowed members of Osama bin Laden’s aka CIA employee Tim Osman’s family to be flown out of the United States on the actual night of 9/11 while junior BushFRAUD was getting drunk with the Saudi Ambassador.

In closing, at this hour, US. Supreme Court Justice Ruth Ginsburg is in possession of the U.S. Military-Russian Federation year 2000 presidential election electronic audit, which clearly proves massive fraud on the U.S. Supreme Court in December of 2000 involving the late U.S. Supreme Court Justice John Scalia and lifelong Bush Crime Family crony James Baker III.

As reported in previous intelligence briefings, Albert Gore Jr. of Carthage, Tennessee actually won the U.S. popular vote by over four (4) million and amassed over 330 Electoral College votes.    MORE

http://www.tomheneghanbriefings.com/The-911-Junior-George-W-BushFRAUD-Reichstag-Fire-Totally-Unravels__09-10-2016.html

September 18, 2016 excerpt

In closing, EXPECT THE UNEXPECTED:

PSY OPS

BLACK OPS

ATTEMPTS AT MARTIAL LAW

A PATRIOTIC U.S. MILITARY COUNTER-COUP

ANYTHING IS POSSIBLE!

Yes, the history book on the shelf is always repeating itself. We are dealing with human beings so it has already gotten personal and you know it is going to get physical.

RELATED

Sunday November 15, 2015

The Time is Now the Match is Hot!

by Tom Heneghan, International Intelligence Expert

P.S. At this hour the United States faces a direct declaration of martial law as the NAZI Paperclip forces that control and occupy the United States have declared “Operation Jade Helm” (aka a martial law declaration).

This criminal NAZI filth have allowed up to 700,000 alleged Arab immigrants to illegally cross over the U.S. border with Canada and Mexico. At least 100,000 of these illegal INVADERS are scripted Islamic Jihadists who were trained in Yemen by the U.S. CIA and the Israeli Mossad.

P.P.S. We can now also report that command and control for the terrorist attacks in Paris, France last Friday was the U.S.-Israeli Mossad controlled American-Turkish Council headquartered in Istanbul, Turkey.

Command and control was also headquartered in Hamburg, Germany, the headquarters for the NAZI German Bush P2 Adamus Group 9/11 Kurt Becker cell.   MORE

http://www.tomheneghanbriefings.com/The-Time-is-Now-the-Match-is-Hot__11-15-2015.html

Facebook, Google, Twitter Push Congress to Cede Control of Internet

http://www.breitbart.com/tech/2016/09/13/facebook-google-twitter-push-congress-to-cede-control-of-internet/

Facebook and Twitter will help Google filter out fake news

https://www.engadget.com/2016/09/14/facebook-twitter-first-draft-google/

Facebook And Israel Officially Announce Collaboration To Censor Social Media Content

http://www.activistpost.com/2016/09/facebook-israel-officially-announce-collaboration-censor-social-media-content.html

FBI Granted Powers To Hack ‘Unlimited Computers’ By December

http://yournewswire.com/fbi-granted-powers-to-hack-unlimited-computers-by-december/

ALERT: U.S. CDC Giving Itself Unconstitutional POWERS to Round Up and Detain Citizens En Masse Anytime, Anywhere And Throw Away the Key

http://www.activistpost.com/2016/09/alert-u-s-cdc-giving-unconstitutional-powers-round-detain-citizens-en-masse-anytime-anywhere-throw-away-key.html

CDC declares medical police state, announces power to detain the sick and punish those who do not comply

http://www.naturalnews.com/055242_medical_police_state_CDC_regulations_involuntary_detainment.html

http://www.tomheneghanbriefings.com/Prepare-for-the-Unexpected__09-18-2016.html

Stew Webb Radio Network
Listen Live
US Intel Breaking News
http://www.stewwebb.com
Listen live by phone
712-775-8269
federalwhistleblower@gmail.com
Radio Archives

Stew Webb Radio Archives

 




US NSA Cyber Attacks against Stew Webb Whistle blower

Gun_Dog Spot Dog

By Stew Webb

Federal Whistle blower

The United States of America Department of Defense “DOD” and the US National Security Agency “NSA” along with the Joint Task Force Group of Homeland Security “DHS” have for over two years been doing a massive cyber attacks against this Federal Whistle blowers website using thousands of mail servers along with the State of Israel out of the Secretive US NSA secret Satellite Facility base in Jerusalem, Israel at the University of Jerusalem. This secret Espionage was allowed by George HW Bush while President of the United States of America. Israel is able for the Zionist Illuminati Satanic Organized Crime Syndicate to tap in to every ones computers and listen to all telephone conversations. Below you will see the secretive NSA base in Utah below in the evidence I am posting today.

I have over two years of raw evidence of their attacks against my website StewWebb.com

and the mail servers involved in Violations of my First Amendment Rights under the United States Constitution as an Americans Right to Freedom of Speech.

Under 18 U.S.C. 4 The Federal Reporting Crime Act this serves as your Official Notice until I get to a Court of Law.

To all Patriotic Americans who expose the Bush Millman Mizel Clinton Satanic Organized Crime Syndicate I suggest you block all the below IP numbers to prevent Illegal Cyber attacks upon your websites.

DOD US Government, NSA and JTFG
St Louis, United States visited http://www.stewwebb.com/
4/6/2016 10:57:15 AM (4 minutes ago) IP: 207.132.76.16 [block] Hostname: ndwuaw5500wbg05.nga.mil
Browser: IE version 11.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; Win64; x64; Trident/7.0; rv:11.0) like Gecko
ndwuaw5500wbg05.nga.mil
208.46.37.38
Address lookup
canonical name ndwuaw5500wbg05.nga.mil.
aliases
addresses 207.132.76.16
Domain Whois record

Queried with “ndwuaw5500wbg05.nga.mil”…

Query error: NoWhoisServerForDomain
Network Whois record

Queried whois.arin.net with “n 207.132.76.16″…

NetRange: 207.132.0.0 – 207.133.255.255
CIDR: 207.132.0.0/15
NetName: DNIC-NETBLK-207-132
NetHandle: NET-207-132-0-0-1
Parent: NET207 (NET-207-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: DoD Network Information Center (DNIC)
RegDate: 1996-05-08
Updated: 2009-09-23
Ref: https://whois.arin.net/rest/net/NET-207-132-0-0-1
OrgName: DoD Network Information Center
OrgId: DNIC
Address: 3990 E. Broad Street
City: Columbus
StateProv: OH
PostalCode: 43218
Country: US
RegDate:
Updated: 2011-08-17
Ref: https://whois.arin.net/rest/org/DNIC
OrgTechHandle: REGIS10-ARIN
OrgTechName: Registration
OrgTechPhone: +1-844-347-2457
OrgTechEmail: disa.columbus.ns.mbx.arin-registrations@mail.mil
OrgTechRef: https://whois.arin.net/rest/poc/REGIS10-ARIN

OrgAbuseHandle: REGIS10-ARIN
OrgAbuseName: Registration
OrgAbusePhone: +1-844-347-2457
OrgAbuseEmail: disa.columbus.ns.mbx.arin-registrations@mail.mil
OrgAbuseRef: https://whois.arin.net/rest/poc/REGIS10-ARIN

OrgTechHandle: MIL-HSTMST-ARIN
OrgTechName: Network DoD
OrgTechPhone: +1-614-692-6337
OrgTechEmail: disa.columbus.ns.mbx.hostmaster-dod-nic@mail.mil
OrgTechRef: https://whois.arin.net/rest/poc/MIL-HSTMST-ARIN

DNS records

DNS query for nga.mil failed: TimedOut
name class type data time to live
ndwuaw5500wbg05.nga.mil IN A 207.132.76.16 3600s (01:00:00)
ndwuaw5500wbg05.nga.mil IN RRSIG
type covered: A (1)
algorithm: RSA/SHA-256 (8)
labels: 3
original ttl: 3600 (01:00:00)
signature expiration: 2016-04-11 09:01:01Z
signature inception: 2016-04-04 08:56:01Z
key tag: 48649
signer’s name: nga.mil
signature:
(2048 bits)

A241D4403A4AFD2727DA91CB9A23AA27
6CEAA69BB3E2521BCFC678404C036EE0
D36C43BE2A283353DB4A28015C46674C
87F0979DEE3991385F73484B5E48EDA7
B3A2E0699B172D7DDEAE0282AC25C973
23246905C9080243602E2920F8D519B9
19B26855336B5140B006476BC367546B
C074395444635F84E040E98ABE0BAE20
1B0E52EFFC4AC44D25010807657E1CCA
F313B05F96AC6E0ED6BAA8A35BE4AB60
2458F09A470F03EBA93712FFDDAE89E2
D855357CE0FF6F21AB6E7FFF34AB21FE
F0B0DF73CDCBAEB82B2BAC688E0E35A9
D815C98F3928F6F75940459A5FCAAF31
727C540AC19D493D4C74B71270BE529D
AE73EC3A2F51EA240070283DEBB8C3D7

3600s (01:00:00)
nga.mil IN MX
preference: 20
exchange: sec-jeemsg.eemsg.mail.mil
1932s (00:32:12)
nga.mil IN MX
preference: 10
exchange: pri-jeemsg.eemsg.mail.mil
1932s (00:32:12)
nga.mil IN MX
preference: 30
exchange: mailnde.nga.mil
1932s (00:32:12)
nga.mil IN MX
preference: 30
exchange: mailarn.nga.mil
1932s (00:32:12)
nga.mil IN RRSIG
type covered: MX (15)
algorithm: RSA/SHA-256 (8)
labels: 2
original ttl: 3600 (01:00:00)
signature expiration: 2016-04-11 09:01:01Z
signature inception: 2016-04-04 08:56:01Z
key tag: 48649
signer’s name: nga.mil
signature:
(2048 bits)

200B1D1A6A51643715067FB8A2A73D01
24CDC6C182884F034BFC9A44B0530DCA
742AB514977DD16F39080C6BB57612FA
DB3A57C173A9C466CDAFF48CDCD17D66
7F4AEA05857AFB24EAF457009768D75B
65623C9EA38B97E62ADBAB93135D6E3A
7FB750368C9280E423233CA6E7C6E66D
C40D1AB6BA2BD860BF8A6AA7EAB81AC4
BEA39C5DBF734E16A10508EBC598F724
38DD4AB70FCBA6697E7AE15231781CD2
D9D15BCF95C439836460C0ADB54298DA
D2701E08D9968086E60FBF732E02C16C
3459AFB39BFEC5954F6BEBB4136A7CA8
3C2A876272639933FB49A1D98DFB324E
F4E7A373E0726F676AEEBF673E13BA4F
647BE608B7D86009B41D36A44B3C3770

1932s (00:32:12)
nga.mil IN DNSKEY
flags: SecureEntryPoint, ZoneKey (257)
protocol: 3
algorithm: RSA/SHA-256 (8)
public key:
(2080 bits)

03010001C8DE15CFAE20CE5E76F72187
0FDE886850CD755402082C3B5F66F3B0
48FA69C843462ADCA975EB9A89B2F2A0
2BAE0A47140D163FD2C518457D6987E2
0BBEBC77EE98479969A470E929F9CCA2
59688CC689741A351D898132DD5FFF73
FC4B1AEFEB27877C20FD47796FCD9B4F
A4F5FAA2CA6E3394106B396142A97D4E
F627DB5E92013368A8F8F546C938908B
F69966134E8B71CCDE3CFC1CAFC154CA
7C0CB11E0E6A1BD51DADABE7FD5F6968
DC342470E98DBA39B693B8684B792EEF
19773808C4ACFC2A562435EB1AC6C5A7
4D6FB099489390BD90F65D7874BC1F8A
CE7A33C6E2127A19E75BD98139E933CF
EF31E294CA577ED4999F103AD8103473
4F8733C3

363s (00:06:03)
nga.mil IN DNSKEY
flags: ZoneKey (256)
protocol: 3
algorithm: RSA/SHA-256 (8)
public key:
(2080 bits)

03010001B585E65EB5B04A155F3BFAFC
E309B3FFF8E4B68D503AEE4AAE08AA53
6931590ED5B820B50B8EE36926874E7D
DB7A7EEEEC8A6FCA64289C29A0617CFE
5861B402FDF9AC9760095C1951E3DBA2
729350F3B2225CF433FB6E7790C75DF3
345AF2617F0701636805A98C76DEE64E
9D7665061DEAF5E86F098091F8A2ADBC
BD6D2421114874439157DE7EB456D921
77550D46FA5AF7AC431579E6CAE797E1
B66B0267F40003811C43CBB718735193
1F8ABBB9FC33CDFAA2382B075DC03B37
B63904CBA604DE328C73DDDEC64604D9
5C9E3D16EDA59D1CECF1B24416C2D261
4AAB32120A327BAB30E1A958014D0817
F4AD3DD2A5ABA0900B7342EEE5BA8530
3EF7AA7D

363s (00:06:03)
nga.mil IN RRSIG
type covered: DNSKEY (48)
algorithm: RSA/SHA-256 (8)
labels: 2
original ttl: 3600 (01:00:00)
signature expiration: 2016-04-11 09:01:01Z
signature inception: 2016-04-04 08:56:01Z
key tag: 12835
signer’s name: nga.mil
signature:
(2048 bits)

A44D4EC73CAB6A7904D6784482129D28
305301D7ACCACEB5DB767704D9995F69
B79E7DA45876C3CEAF59F5B8090E51F5
DCA788D4F6640E344B21C94F0BFE1BF7
BCCEC59EC4CAAE79927663ABA4E983E7
1C49F1ACF4F6023BDAFB5C7345F62D71
E0E739B9488AB8BA04A307FBA8BF0221
72F5E3A0527715A187C785DA0CDDE301
7669E61D9CF9636137A7CA0B42F46B08
79600B7D8B6BC17046A67D72D48AA559
B9E401038150F5DCD9A58A2EBB6D902D
4B8676BE8BE7514EEFA945CABC4AC532
D99C24305BEF911F6BFB21DFA4BDCD60
2C322653B2B45A2B7F78716EB16E9DED
7BB733A174388C5795C375789A6AF16C
18D0E67412BDCB6C547B96F38A8AD495

363s (00:06:03)
nga.mil IN RRSIG
type covered: DNSKEY (48)
algorithm: RSA/SHA-256 (8)
labels: 2
original ttl: 3600 (01:00:00)
signature expiration: 2016-04-11 09:01:01Z
signature inception: 2016-04-04 08:56:01Z
key tag: 48649
signer’s name: nga.mil
signature:
(2048 bits)

1C0F525C3B6C71C66CBFA2F9836D474E
BEBD2A56E49D116578242BF718339174
38B99A1E624B34871E074BFC378A586C
BB27A0F8C7E5057B45A5BC8EC1F1C3A8
672E7F0DB2B47E3AE1E703882D25A772
D9873AE88BCB806BD91B78725AB5F5AD
3E37D5BBF7D9577D064293E18BF38097
CAE8E1B213E538FED53B0A637614940B
8EE830C5BDF454AC830A470537378917
6B0FDF7F6DFC1F7EDAEF3D8883F92F02
7074CE3A820BECBEE37E3BC33F85CAD8
84E5B7B0FA67C1B122B424B394F5C32C
B98FF259FA1005F5645A383E73005AB6
5EE07C8492F8ECD987656A0870006D05
FB168E66890F550CD4F895ECAC181D7E
DDA893EC55BCBB321454202A1D95AD88

363s (00:06:03)
nga.mil IN NS ndedaa175rdns01.nga.mil 1484s (00:24:44)
nga.mil IN NS arnnsahslpdns1.nga.mil 1484s (00:24:44)
nga.mil IN RRSIG
type covered: NS (2)
algorithm: RSA/SHA-256 (8)
labels: 2
original ttl: 3600 (01:00:00)
signature expiration: 2016-04-11 09:01:01Z
signature inception: 2016-04-04 08:56:01Z
key tag: 48649
signer’s name: nga.mil
signature:
(2048 bits)

B10BCBC545C60C33C2E84DB55444901C
75153DB7BCFD1D8BF21C42FBD0F9FC0A
9808497ED34159E5384EFE790D2D464D
5BDD25113AE2CEA65BA2A85D593925DD
9B03B24264033A95D1D77342C6E2A5FF
294ACCC524EF538C8F8CC0A4809C6F2C
75F19616E97CD8F1A4E1B95CE69EC21D
844C863EB54771F3AEDA56DC60E20E69
04C9A99FC5219011AA6FB52EDC6A88B4
D320BAD5EDACBA2C71C5BD9C19B91940
19534A526D958336F9AA0410548E98DB
BDEE9D4CEEA7EB0C32E0E2FFDF847705
67609A702E75F40166DDACAB0F62E620
A035E3067AFC263489CA1D3A5E86C218
6E08FA5756EFBF1C6CC3C028964E751E
B8ECACBFBCCFF786A038CF34B3078059

3599s (00:59:59)
16.76.132.207.in-addr.arpa IN PTR ndwuaw5500wbg05.nga.mil 2101s (00:35:01)
76.132.207.in-addr.arpa IN NS ndedaa175rdns01.nga.mil 2208s (00:36:48)
76.132.207.in-addr.arpa IN NS arnnsahslpdns1.nga.mil 2208s (00:36:48)
Traceroute

Tracing route to ndwuaw5500wbg05.nga.mil [207.132.76.16]…
hop rtt rtt rtt ip address fully qualified domain name
1 0 0 0 208.101.16.73 49.10.65d0.ip4.static.sl-reverse.com
2 0 0 0 66.228.118.153 ae11.dar01.sr01.dal01.networklayer.com
3 0 0 0 173.192.18.210 ae6.bbr01.eq01.dal03.networklayer.com
4 0 0 2 157.238.224.225 ae-6.r07.dllstx09.us.bb.gin.ntt.net
5 0 0 1 129.250.3.106 ae-2.r08.dllstx09.us.bb.gin.ntt.net
6 0 0 0 129.250.66.78 ae-0.centurylink.dllstx09.us.bb.gin.ntt.net
7 * * *
8 39 39 39 208.46.37.38
9 * * *
10 * * *
11 * * *
12 * * *

Trace aborted

— end —
Address lookup
canonical name mailarn.nga.mil.
aliases
addresses 164.214.251.1
Domain Whois record

Queried with “mailarn.nga.mil”…

Query error: NoWhoisServerForDomain
Network Whois record

Queried whois.arin.net with “n 164.214.251.1″…

NetRange: 164.214.0.0 – 164.214.255.255
CIDR: 164.214.0.0/16
NetName: DMA-B
NetHandle: NET-164-214-0-0-1
Parent: NET164 (NET-164-0-0-0-0)
NetType: Direct Assignment
OriginAS:
Organization: DoD Network Information Center (DNIC)
RegDate: 1993-09-30
Updated: 2011-02-16
Ref: https://whois.arin.net/rest/net/NET-164-214-0-0-1

OrgName: DoD Network Information Center
OrgId: DNIC
Address: 3990 E. Broad Street
City: Columbus
StateProv: OH
PostalCode: 43218
Country: US
RegDate:
Updated: 2011-08-17
Ref: https://whois.arin.net/rest/org/DNIC
OrgTechHandle: REGIS10-ARIN
OrgTechName: Registration
OrgTechPhone: +1-844-347-2457
OrgTechEmail: disa.columbus.ns.mbx.arin-registrations@mail.mil
OrgTechRef: https://whois.arin.net/rest/poc/REGIS10-ARIN

OrgAbuseHandle: REGIS10-ARIN
OrgAbuseName: Registration
OrgAbusePhone: +1-844-347-2457
OrgAbuseEmail: disa.columbus.ns.mbx.arin-registrations@mail.mil
OrgAbuseRef: https://whois.arin.net/rest/poc/REGIS10-ARIN

OrgTechHandle: MIL-HSTMST-ARIN
OrgTechName: Network DoD
OrgTechPhone: +1-614-692-6337
OrgTechEmail: disa.columbus.ns.mbx.hostmaster-dod-nic@mail.mil
OrgTechRef: https://whois.arin.net/rest/poc/MIL-HSTMST-ARIN

DNS records

DNS query for nga.mil failed: TimedOut
name class type data time to live
mailarn.nga.mil IN RRSIG
type covered: A (1)
algorithm: RSA/SHA-256 (8)
labels: 3
original ttl: 3600 (01:00:00)
signature expiration: 2016-04-11 09:01:01Z
signature inception: 2016-04-04 08:56:01Z
key tag: 48649
signer’s name: nga.mil
signature:
(2048 bits)

4F754CBFC9094678A7495CEB7154C75B
A003D6B56731DD83C842F8FF7829F84F
A1A3FE8903E08C171D762F291C5D5AA9
E020E1870500D91A5B416DF02AD2E4DC
7B0DE7A193FC85039CA8DFBAB6C9322C
48682960806343F45CD53F149F2CDFFD
67C81024F1505901CFD7B5FD0C340B6B
FF67C06A46CAD4832E5C4111D3815EDC
CBA11A6822793E4239CA7CF96D9840F8
D3A1C98958B07E7DA4B67393F22ED93E
88E0FE2959230703C814C21918A41CEB
E70B5AB26E18C2AF73D978136523123D
0DA193FBC659C5B579883697618C1797
472AA2F934874CAB5B9F6F793EBB8666
C06029A44B57C1E39B639D198330499F
CFFBEF60CE10DA3A6A5F9FABCD0B85AA

1611s (00:26:51)
mailarn.nga.mil IN A 164.214.251.1 1611s (00:26:51)
nga.mil IN MX
preference: 10
exchange: pri-jeemsg.eemsg.mail.mil
1201s (00:20:01)
nga.mil IN MX
preference: 30
exchange: mailarn.nga.mil
1201s (00:20:01)
nga.mil IN MX
preference: 30
exchange: mailnde.nga.mil
1201s (00:20:01)
nga.mil IN MX
preference: 20
exchange: sec-jeemsg.eemsg.mail.mil
1201s (00:20:01)
nga.mil IN RRSIG
type covered: MX (15)
algorithm: RSA/SHA-256 (8)
labels: 2
original ttl: 3600 (01:00:00)
signature expiration: 2016-04-11 09:01:01Z
signature inception: 2016-04-04 08:56:01Z
key tag: 48649
signer’s name: nga.mil
signature:
(2048 bits)

200B1D1A6A51643715067FB8A2A73D01
24CDC6C182884F034BFC9A44B0530DCA
742AB514977DD16F39080C6BB57612FA
DB3A57C173A9C466CDAFF48CDCD17D66
7F4AEA05857AFB24EAF457009768D75B
65623C9EA38B97E62ADBAB93135D6E3A
7FB750368C9280E423233CA6E7C6E66D
C40D1AB6BA2BD860BF8A6AA7EAB81AC4
BEA39C5DBF734E16A10508EBC598F724
38DD4AB70FCBA6697E7AE15231781CD2
D9D15BCF95C439836460C0ADB54298DA
D2701E08D9968086E60FBF732E02C16C
3459AFB39BFEC5954F6BEBB4136A7CA8
3C2A876272639933FB49A1D98DFB324E
F4E7A373E0726F676AEEBF673E13BA4F
647BE608B7D86009B41D36A44B3C3770

1201s (00:20:01)
nga.mil IN NS ndedaa175rdns01.nga.mil 675s (00:11:15)
nga.mil IN NS arnnsahslpdns1.nga.mil 675s (00:11:15)
nga.mil IN RRSIG
type covered: NS (2)
algorithm: RSA/SHA-256 (8)
labels: 2
original ttl: 3600 (01:00:00)
signature expiration: 2016-04-11 09:01:01Z
signature inception: 2016-04-04 08:56:01Z
key tag: 48649
signer’s name: nga.mil
signature:
(2048 bits)

B10BCBC545C60C33C2E84DB55444901C
75153DB7BCFD1D8BF21C42FBD0F9FC0A
9808497ED34159E5384EFE790D2D464D
5BDD25113AE2CEA65BA2A85D593925DD
9B03B24264033A95D1D77342C6E2A5FF
294ACCC524EF538C8F8CC0A4809C6F2C
75F19616E97CD8F1A4E1B95CE69EC21D
844C863EB54771F3AEDA56DC60E20E69
04C9A99FC5219011AA6FB52EDC6A88B4
D320BAD5EDACBA2C71C5BD9C19B91940
19534A526D958336F9AA0410548E98DB
BDEE9D4CEEA7EB0C32E0E2FFDF847705
67609A702E75F40166DDACAB0F62E620
A035E3067AFC263489CA1D3A5E86C218
6E08FA5756EFBF1C6CC3C028964E751E
B8ECACBFBCCFF786A038CF34B3078059

2790s (00:46:30)
nga.mil IN DNSKEY
flags: ZoneKey (256)
protocol: 3
algorithm: RSA/SHA-256 (8)
public key:
(2080 bits)

03010001B585E65EB5B04A155F3BFAFC
E309B3FFF8E4B68D503AEE4AAE08AA53
6931590ED5B820B50B8EE36926874E7D
DB7A7EEEEC8A6FCA64289C29A0617CFE
5861B402FDF9AC9760095C1951E3DBA2
729350F3B2225CF433FB6E7790C75DF3
345AF2617F0701636805A98C76DEE64E
9D7665061DEAF5E86F098091F8A2ADBC
BD6D2421114874439157DE7EB456D921
77550D46FA5AF7AC431579E6CAE797E1
B66B0267F40003811C43CBB718735193
1F8ABBB9FC33CDFAA2382B075DC03B37
B63904CBA604DE328C73DDDEC64604D9
5C9E3D16EDA59D1CECF1B24416C2D261
4AAB32120A327BAB30E1A958014D0817
F4AD3DD2A5ABA0900B7342EEE5BA8530
3EF7AA7D

2908s (00:48:28)
nga.mil IN DNSKEY
flags: SecureEntryPoint, ZoneKey (257)
protocol: 3
algorithm: RSA/SHA-256 (8)
public key:
(2080 bits)

03010001C8DE15CFAE20CE5E76F72187
0FDE886850CD755402082C3B5F66F3B0
48FA69C843462ADCA975EB9A89B2F2A0
2BAE0A47140D163FD2C518457D6987E2
0BBEBC77EE98479969A470E929F9CCA2
59688CC689741A351D898132DD5FFF73
FC4B1AEFEB27877C20FD47796FCD9B4F
A4F5FAA2CA6E3394106B396142A97D4E
F627DB5E92013368A8F8F546C938908B
F69966134E8B71CCDE3CFC1CAFC154CA
7C0CB11E0E6A1BD51DADABE7FD5F6968
DC342470E98DBA39B693B8684B792EEF
19773808C4ACFC2A562435EB1AC6C5A7
4D6FB099489390BD90F65D7874BC1F8A
CE7A33C6E2127A19E75BD98139E933CF
EF31E294CA577ED4999F103AD8103473
4F8733C3

2908s (00:48:28)
nga.mil IN RRSIG
type covered: DNSKEY (48)
algorithm: RSA/SHA-256 (8)
labels: 2
original ttl: 3600 (01:00:00)
signature expiration: 2016-04-11 09:01:01Z
signature inception: 2016-04-04 08:56:01Z
key tag: 12835
signer’s name: nga.mil
signature:
(2048 bits)

A44D4EC73CAB6A7904D6784482129D28
305301D7ACCACEB5DB767704D9995F69
B79E7DA45876C3CEAF59F5B8090E51F5
DCA788D4F6640E344B21C94F0BFE1BF7
BCCEC59EC4CAAE79927663ABA4E983E7
1C49F1ACF4F6023BDAFB5C7345F62D71
E0E739B9488AB8BA04A307FBA8BF0221
72F5E3A0527715A187C785DA0CDDE301
7669E61D9CF9636137A7CA0B42F46B08
79600B7D8B6BC17046A67D72D48AA559
B9E401038150F5DCD9A58A2EBB6D902D
4B8676BE8BE7514EEFA945CABC4AC532
D99C24305BEF911F6BFB21DFA4BDCD60
2C322653B2B45A2B7F78716EB16E9DED
7BB733A174388C5795C375789A6AF16C
18D0E67412BDCB6C547B96F38A8AD495

2908s (00:48:28)
nga.mil IN RRSIG
type covered: DNSKEY (48)
algorithm: RSA/SHA-256 (8)
labels: 2
original ttl: 3600 (01:00:00)
signature expiration: 2016-04-11 09:01:01Z
signature inception: 2016-04-04 08:56:01Z
key tag: 48649
signer’s name: nga.mil
signature:
(2048 bits)

1C0F525C3B6C71C66CBFA2F9836D474E
BEBD2A56E49D116578242BF718339174
38B99A1E624B34871E074BFC378A586C
BB27A0F8C7E5057B45A5BC8EC1F1C3A8
672E7F0DB2B47E3AE1E703882D25A772
D9873AE88BCB806BD91B78725AB5F5AD
3E37D5BBF7D9577D064293E18BF38097
CAE8E1B213E538FED53B0A637614940B
8EE830C5BDF454AC830A470537378917
6B0FDF7F6DFC1F7EDAEF3D8883F92F02
7074CE3A820BECBEE37E3BC33F85CAD8
84E5B7B0FA67C1B122B424B394F5C32C
B98FF259FA1005F5645A383E73005AB6
5EE07C8492F8ECD987656A0870006D05
FB168E66890F550CD4F895ECAC181D7E
DDA893EC55BCBB321454202A1D95AD88

2908s (00:48:28)
1.251.214.164.in-addr.arpa IN PTR mailarn.nga.mil 3600s (01:00:00)
214.164.in-addr.arpa IN NS arnnsahslpdns1.nga.mil 1106s (00:18:26)
214.164.in-addr.arpa IN NS ndedaa175rdns01.nga.mil 1106s (00:18:26)
Traceroute

Tracing route to mailarn.nga.mil [164.214.251.1]…
hop rtt rtt rtt ip address fully qualified domain name
1 0 0 0 208.101.16.73 49.10.65d0.ip4.static.sl-reverse.com
2 0 0 0 66.228.118.153 ae11.dar01.sr01.dal01.networklayer.com
3 0 0 0 173.192.18.254 ae14.bbr02.eq01.dal03.networklayer.com
4 0 0 0 157.238.224.229 ae-11.r01.dllstx04.us.bb.gin.ntt.net
5 0 0 0 129.250.3.232 ae-5.r08.dllstx09.us.bb.gin.ntt.net
6 0 0 0 129.250.66.78 ae-0.centurylink.dllstx09.us.bb.gin.ntt.net
7 * * *
8 39 39 45 208.46.37.38
9 * * *
10 * * *
11 * * *
12 * * *

Trace aborted

— end —

Address lookup
canonical name pri-jeemsg.eemsg.mail.mil.
aliases
addresses 156.112.250.0
156.112.250.3
156.112.250.4
156.112.250.2
156.112.250.1
Domain Whois record

Queried with “pri-jeemsg.eemsg.mail.mil”…

Query error: NoWhoisServerForDomain
Network Whois record

Queried whois.arin.net with “n ! NET-156-112-0-0-2″…

NetRange: 156.112.0.0 – 156.112.255.255
CIDR: 156.112.0.0/16
NetName: DISA-CSD-101
NetHandle: NET-156-112-0-0-2
Parent: NIPRNET-IAPS (NET-156-112-0-0-1)
NetType: Reassigned
OriginAS:
Organization: DoD Network Information Center (DNIC)
RegDate: 2008-07-10
Updated: 2009-04-17
Ref: https://whois.arin.net/rest/net/NET-156-112-0-0-2
OrgName: DoD Network Information Center
OrgId: DNIC
Address: 3990 E. Broad Street
City: Columbus
StateProv: OH
PostalCode: 43218
Country: US
RegDate:
Updated: 2011-08-17
Ref: https://whois.arin.net/rest/org/DNIC
OrgAbuseHandle: REGIS10-ARIN
OrgAbuseName: Registration
OrgAbusePhone: +1-844-347-2457
OrgAbuseEmail: disa.columbus.ns.mbx.arin-registrations@mail.mil
OrgAbuseRef: https://whois.arin.net/rest/poc/REGIS10-ARIN

OrgTechHandle: MIL-HSTMST-ARIN
OrgTechName: Network DoD
OrgTechPhone: +1-844-347-2457
OrgTechEmail: disa.columbus.ns.mbx.hostmaster-dod-nic@mail.mil
OrgTechRef: https://whois.arin.net/rest/poc/MIL-HSTMST-ARIN

OrgTechHandle: REGIS10-ARIN
OrgTechName: Registration
OrgTechPhone: +1-844-347-2457
OrgTechEmail: disa.columbus.ns.mbx.arin-registrations@mail.mil
OrgTechRef: https://whois.arin.net/rest/poc/REGIS10-ARIN

DNS records

DNS query for mail.mil failed: TimedOut
name class type data time to live
pri-jeemsg.eemsg.mail.mil IN RRSIG
type covered: A (1)
algorithm: RSA/SHA-256 (8)
labels: 4
original ttl: 3600 (01:00:00)
signature expiration: 2016-04-17 13:30:56Z
signature inception: 2016-03-18 13:30:56Z
key tag: 24126
signer’s name: mail.mil
signature:
(1024 bits)

89637AEE51B3D14F8424B9082AFCE93A
81A246CD95B4752E94224B217CF051F7
CC52C3AAC7E619344172F6B72E511573
ABECBC31CA4500B634DA886A8D22D10F
C386CF1DE699334D0427328D458F7652
DAEFB3F950D58C9B4847A74C86B76CA2
A643CBA86EFC8499E5642CBE4F9E1B48
5183B6EF018E8CAB264105A56B1632F0

2963s (00:49:23)
pri-jeemsg.eemsg.mail.mil IN RRSIG
type covered: A (1)
algorithm: RSA/SHA-256 (8)
labels: 4
original ttl: 3600 (01:00:00)
signature expiration: 2016-04-17 13:30:56Z
signature inception: 2016-03-18 13:30:56Z
key tag: 64491
signer’s name: mail.mil
signature:
(1024 bits)

B264106703A55E003C793702C82D51B2
DC50223D5448D7DA23134CF7F65156EC
15B0A5042677EED702E7CF0880DD60B3
F2DE22AF8CFB72DE7750C48D7BFB7C37
5DEE698A6685AC3115090518B1E8CF42
4874DB9F3DA94C33DC5FCEE1B1FC9EA3
6F247E0B700620FA2E7B07ACB8E4848C
A035041F30239CE3983E54F9B7F6D13B

2963s (00:49:23)
pri-jeemsg.eemsg.mail.mil IN A 156.112.250.2 2963s (00:49:23)
pri-jeemsg.eemsg.mail.mil IN A 156.112.250.0 2963s (00:49:23)
pri-jeemsg.eemsg.mail.mil IN A 156.112.250.3 2963s (00:49:23)
pri-jeemsg.eemsg.mail.mil IN A 156.112.250.1 2963s (00:49:23)
pri-jeemsg.eemsg.mail.mil IN A 156.112.250.4 2963s (00:49:23)
mail.mil IN SOA
server: sdns1.csd.disa.mil
email: hostmaster@csd.disa.mil
serial: 2016020802
refresh: 3600
retry: 600
expire: 2592000
minimum ttl: 900
2032s (00:33:52)
mail.mil IN RRSIG
type covered: SOA (6)
algorithm: RSA/SHA-256 (8)
labels: 2
original ttl: 3600 (01:00:00)
signature expiration: 2016-04-17 13:30:56Z
signature inception: 2016-03-18 13:30:56Z
key tag: 24126
signer’s name: mail.mil
signature:
(1024 bits)

7D27A0560EB9A02CBBD1063CCC45F053
407643EFBF186C03D419D01108D79EB7
44EFDC31015F51C9B303F397405947FF
5453F4C49649694ED636455AB7BEF862
8D888934D94467E27071BBBB9FBF00FB
4779A996D376F76261194EB4B8C73183
363803187567DF8EB1B286A36E45E74A
86AE5EF868F87E8D5FC8E2BBAF4601A5

2032s (00:33:52)
mail.mil IN RRSIG
type covered: SOA (6)
algorithm: RSA/SHA-256 (8)
labels: 2
original ttl: 3600 (01:00:00)
signature expiration: 2016-04-17 13:30:56Z
signature inception: 2016-03-18 13:30:56Z
key tag: 64491
signer’s name: mail.mil
signature:
(1024 bits)

37A1C4A94F468EF7FF28064F2D6E0150
AC68A247B9E8223C63E5EC2322149F35
205E007C0CA755523AD6A8EF9F433C4D
601036E10B53DA737944C37E99CB8153
42B914C114D46827300928313F33E86F
9589121C5EC7BB7F1D5709DE21BD84CD
4BD35353CFF1A8E3B1B3278D25A56F08
7B3B4F4E7B4CFFEE1C0AB8F0EB1CC39C

2032s (00:33:52)
mail.mil IN MX
preference: 10
exchange: pri-jeemsg.eemsg.mail.mil
516s (00:08:36)
mail.mil IN MX
preference: 20
exchange: sec-jeemsg.eemsg.mail.mil
516s (00:08:36)
mail.mil IN RRSIG
type covered: MX (15)
algorithm: RSA/SHA-256 (8)
labels: 2
original ttl: 3600 (01:00:00)
signature expiration: 2016-04-17 13:30:56Z
signature inception: 2016-03-18 13:30:56Z
key tag: 24126
signer’s name: mail.mil
signature:
(1024 bits)

56AB53E5092939975437E27A9B602871
51AC658A16FF79681FD7944C21E3135E
241DB7ECCA5F6130510A9EA8ADA16B85
8EFE732B457BDA6F0B61D69127C947A0
C35E8676476CC8FED263ED43716CB26D
F481C0500A47D20DF966C9FEB93274B3
E04759E59B5339FC2A5A4877F1293688
45AA349E903BEDC1D9E941CDDED97367

516s (00:08:36)
mail.mil IN RRSIG
type covered: MX (15)
algorithm: RSA/SHA-256 (8)
labels: 2
original ttl: 3600 (01:00:00)
signature expiration: 2016-04-17 13:30:56Z
signature inception: 2016-03-18 13:30:56Z
key tag: 64491
signer’s name: mail.mil
signature:
(1024 bits)

04A04E76716A2E0936BA28EC4771FF4C
B9A53C223049CF07175A46A168629606
CAD194D3DA56616C8189E74E01308FA5
0816C74D8D7A49D53A4E92D4326320CB
0B4C10CDD33DBD5800D7984A264B7202
7D363C43EC2492B5A6B23EB8E10D75B1
1156120C2383CD30BBF452EF73631C9E
AEE96A2E2EBE3E45BA9E9BCFA134C0CC

516s (00:08:36)
mail.mil IN DNSKEY
flags: SecureEntryPoint, ZoneKey (257)
protocol: 3
algorithm: RSA/SHA-256 (8)
public key:
(2080 bits)

03010001AC77ADC11B6B3DC9A24A693A
F601C6D9F4BE3A81DAFC9E7DB1AE03A5
1E58F2DA79BE66B903986FB7DEBE7493
F93B72DD8AD44FADC5C3A20303F38477
85C2F52B5C5029B0AEC5777B0B24CDCB
50FBAF17771E99EAEB6AE56018BC0165
903FA799251C78EAEEDE2CEFBF25F624
E2D6737AEC7B5BBF6B73D54B261152E7
DDF8824D35C2FE1A95970DF7CD4F1DFD
90040D7BDB1986879A4ABE16C1EF3D6A
C12EEBF4F3BE0D5C0641A429771CB1D6
3FDE77F8AD5B2763C448998EF74612CB
C0D809B78D4E156155AE5241B43005E8
F95DD792B10945E5E7DD11CF9E93EF2D
5D25013F96BF2EF081FCE549DC502815
DC1DEDEDB97B0BAB6606DADD342E7ED1
BF718171

2963s (00:49:23)
mail.mil IN DNSKEY
flags: ZoneKey (256)
protocol: 3
algorithm: RSA/SHA-256 (8)
public key:
(1056 bits)

03010001A27445B6B785C4AB31ED68F9
5FF607653BFD268F0040EA696C3F76D9
A821F078FB2EE7532FDBE990637688F8
6DF0D2BD65020CB7588903C46DD12C19
D7BC42D25FBB5E33D4118C6819CE2F32
AC9F6AA16F1E8BABA882BC45DB5BAF0A
06BBA030D2D87E90A28C1B1B410EE078
4B72973A290DA8F42D9664B5DB6DFF56
545BC5DD

2963s (00:49:23)
mail.mil IN DNSKEY
flags: ZoneKey (256)
protocol: 3
algorithm: RSA/SHA-256 (8)
public key:
(1056 bits)

03010001D3B3EDA4AEEC1CE788B3099E
4A29D5E3D7D53C5C5328E31E8BC109DA
350EAF8668F818A2B281EA0A1B911A75
D02CFC5B98504FE12DA441E6E761D89E
B06A5B51FB52DCC0DD4C7A5F08667DC6
5BDD494747BA04EBF07E339580852640
F20F65AFC4354FD3547760A157FBF7BE
1BC68C541421E404AE71BB0E0D5C19E6
FCB09B9D

2963s (00:49:23)
mail.mil IN DNSKEY
flags: SecureEntryPoint, ZoneKey (257)
protocol: 3
algorithm: RSA/SHA-256 (8)
public key:
(2080 bits)

03010001DAA1DBFB4A5E1C16D1023416
F56864831EA2DA14DACEE26E38E8C979
E4B405879D8CD6185AA6B4253C763164
EDED7B6377EA80D502C3EDE3BD7325D9
2BA69F25CC947D2836C17AA53A20CF44
248054419BD7B1DE974AC302081A998C
7AD871BCA4C27B5DDCB84D4CD63EC107
3E7374B122503956EF5F3AC4669AB374
C19C193AE902A01CD7F6C849B233963B
DCA285BA39C3FD4956984609025E5345
1B6E00B9485A5F9FE94FC1C394424D23
558E369666A69232BB30BDF279408C86
199A837DEE84333CCAA7BB5E4D62188F
D93CE19B81D7BBE9FC01F37BA358D5AA
9809D5A4EA3BEB8DBE02D3266B39D3B1
116D451E85DBD78B04B9F88AADCB63AA
5F1B19F5

2963s (00:49:23)
mail.mil IN RRSIG
type covered: DNSKEY (48)
algorithm: RSA/SHA-256 (8)
labels: 2
original ttl: 3600 (01:00:00)
signature expiration: 2016-04-17 13:30:56Z
signature inception: 2016-03-18 13:30:56Z
key tag: 11695
signer’s name: mail.mil
signature:
(2048 bits)

68B898D311AE00926DACB19C66694FCE
AB5C7F6D248BA674ECA04FB0B59E8E94
574E9A298A7B2154774E8175AA0B3C53
24BD038989D4EFAE73EEA8F8D5017FEB
E781B87C73913BF2D5922B9AE0DF0F2B
550AAC600A392831AC8B7D372506A181
FFB311BAC8B242FA1DFFF8E744D080E5
5E4294855CADD273F1176AD480004EB9
40E6E9EC09DC7D39128AEC31548FB78B
AC9893538CC38614FD5B37ACF6DE90BD
200D6848D0F8591FD34EC7AEA06B3E38
D18FA0CEB0BDD77BBEA96C9F74897DFD
61AC4746A3A39E8B19BD3AA51BE4920F
EBDD3E7BE4A7005DC7ED14BA1561195F
986018A943163FC20425921B693857EC
F933068CE4AAECC9483DFC8896D569DE

2963s (00:49:23)
mail.mil IN RRSIG
type covered: DNSKEY (48)
algorithm: RSA/SHA-256 (8)
labels: 2
original ttl: 3600 (01:00:00)
signature expiration: 2016-04-17 13:30:56Z
signature inception: 2016-03-18 13:30:56Z
key tag: 24126
signer’s name: mail.mil
signature:
(1024 bits)

5A0CC9367781B403A5A0204635953799
7103E83954AF24A58FF895693709D3C7
133CF44C106925BC7D3C3BFDEBB6E6BD
7CFE0E0236C4A8E505908E5490E4777D
5F72624F801AF1E33FE047666A5BE769
CA28CC294A390257093CBCD7F6640956
64D571034261BBED93AB800270971F13
8FAF63B410789C1E8AE28117CF35276A

2963s (00:49:23)
mail.mil IN RRSIG
type covered: DNSKEY (48)
algorithm: RSA/SHA-256 (8)
labels: 2
original ttl: 3600 (01:00:00)
signature expiration: 2016-04-17 13:30:56Z
signature inception: 2016-03-18 13:30:56Z
key tag: 34516
signer’s name: mail.mil
signature:
(2048 bits)

884ED35266535EB1132A564899F0D308
CF3229EEB87E7BAA6754B245136859A3
A0F147431BC8F0E13B55BAD38BD67A4D
0B99FDA03E2B57185B42E5C610159D07
9B0C02C5C81589BC4470D5B5B4B4117D
D7B897E0E5DF6F1E4A0EED37A86671E5
AE4D0C89B9128448E1836249005F5726
04445247A34D79A5D7583F663F72D114
A25EFEE6D0CA682C4CD2949052EC2020
60083383CEE0930AC96153ED114F41B3
9FF721BA3CBFD70A02C2FE5D5A53B523
F42B75A8A2776A49B6779358564C76DB
D4E9E6CBA74FED566825CBC252E81501
18A65FE1DAF70D7EF76A4DE0C7FAC049
0EB37A1E581762684CD52B91233456C2
B5532D0BE05C43A0BDAEEDCB78EE7640

2963s (00:49:23)
mail.mil IN RRSIG
type covered: DNSKEY (48)
algorithm: RSA/SHA-256 (8)
labels: 2
original ttl: 3600 (01:00:00)
signature expiration: 2016-04-17 13:30:56Z
signature inception: 2016-03-18 13:30:56Z
key tag: 64491
signer’s name: mail.mil
signature:
(1024 bits)

094680EB0884C3DA3665921E03A6E056
D2FAAC5B2CB2AB951BF40DB64A136B05
C7355C0F647F5E543BE7AA1577248433
582BD89888D93625482F707B4C340DAF
967B9228B022203B6A95D57C5E974B30
0E54E64608134363D034D98196AFC403
2D97F119463256C166E3D7AD112E34B9
B9FCE97B1E00B4A19397FCBC5A71F0BC

2963s (00:49:23)
mail.mil IN NS sdns2.csd.disa.mil 3067s (00:51:07)
mail.mil IN NS sdns1.csd.disa.mil 3067s (00:51:07)
mail.mil IN NS sdns3.csd.disa.mil 3067s (00:51:07)
mail.mil IN RRSIG
type covered: NS (2)
algorithm: RSA/SHA-256 (8)
labels: 2
original ttl: 3600 (01:00:00)
signature expiration: 2016-04-17 13:30:56Z
signature inception: 2016-03-18 13:30:56Z
key tag: 24126
signer’s name: mail.mil
signature:
(1024 bits)

5A8EFBCB010E4BC0328B837362416C3F
BBF79B08D8AEB9A7F50C3B4B8EC69279
CBD1D03DAC4FA23D9B1BEFBDCA51AF17
D45E1421581D47BAA4B9C8ABCC53D489
7586CA272FC22FF5845EB003C7852039
489E95760EA301516DA77AB1CA055C51
69B2FB2E4D77CA1FACAC04B992766767
9904E8CFC2B63649CA96871C55C0A1BF

3597s (00:59:57)
mail.mil IN RRSIG
type covered: NS (2)
algorithm: RSA/SHA-256 (8)
labels: 2
original ttl: 3600 (01:00:00)
signature expiration: 2016-04-17 13:30:56Z
signature inception: 2016-03-18 13:30:56Z
key tag: 64491
signer’s name: mail.mil
signature:
(1024 bits)

1E41E68C167786F0B98ED05441176A9D
090835D2BC483294CFA1F870DDD1089E
49FF03D8C90CA2C4079928CED9CBE72F
B95E69C60814A8068A01C8C3DBD6FB89
BBCAC6B91DDD1C333A7A0C208E261EB2
840710393E2310B0D2932A50970CC399
B006A337511E6704D77D0BDFA081CFD2
CEA63D4A6CE22DC553B69DDA84182B91

3597s (00:59:57)
0.250.112.156.in-addr.arpa IN PTR pri-jeemsg.eemsg.mail.mil 133s (00:02:13)
112.156.in-addr.arpa IN NS ns3.csd.disa.mil 2585s (00:43:05)
112.156.in-addr.arpa IN NS ns.cybercom.mil 2585s (00:43:05)
112.156.in-addr.arpa IN NS ns1.csd.disa.mil 2585s (00:43:05)
112.156.in-addr.arpa IN NS ns.jtfgno.mil 2585s (00:43:05)
112.156.in-addr.arpa IN NS ns2.csd.disa.mil 2585s (00:43:05)
Traceroute

Tracing route to pri-jeemsg.eemsg.mail.mil [156.112.250.0]…
hop rtt rtt rtt ip address fully qualified domain name
1 0 0 0 208.101.16.73 49.10.65d0.ip4.static.sl-reverse.com
2 0 0 0 66.228.118.157 ae11.dar02.sr01.dal01.networklayer.com
3 0 0 0 173.192.18.212 ae6.bbr02.eq01.dal03.networklayer.com
4 0 0 0 157.238.224.229 ae-11.r01.dllstx04.us.bb.gin.ntt.net
5 0 0 0 129.250.3.232 ae-5.r08.dllstx09.us.bb.gin.ntt.net
6 0 0 0 129.250.66.78 ae-0.centurylink.dllstx09.us.bb.gin.ntt.net
7 * * *
8 9 9 9 63.158.243.46 63-158-243-46.dia.static.qwest.net
9 * * *
10 * * *
11 * * *
12 * * *

Trace aborted

— end –
Address lookup
canonical name pri-jeemsg.eemsg.mail.mil.
aliases
addresses 156.112.250.0
156.112.250.3
156.112.250.4
156.112.250.2
156.112.250.1
Domain Whois record

Queried with “pri-jeemsg.eemsg.mail.mil”…

Query error: NoWhoisServerForDomain
Network Whois record

Queried whois.arin.net with “n ! NET-156-112-0-0-2″…

NetRange: 156.112.0.0 – 156.112.255.255
CIDR: 156.112.0.0/16
NetName: DISA-CSD-101
NetHandle: NET-156-112-0-0-2
Parent: NIPRNET-IAPS (NET-156-112-0-0-1)
NetType: Reassigned
OriginAS:
Organization: DoD Network Information Center (DNIC)
RegDate: 2008-07-10
Updated: 2009-04-17
Ref: https://whois.arin.net/rest/net/NET-156-112-0-0-2
OrgName: DoD Network Information Center
OrgId: DNIC
Address: 3990 E. Broad Street
City: Columbus
StateProv: OH
PostalCode: 43218
Country: US
RegDate:
Updated: 2011-08-17
Ref: https://whois.arin.net/rest/org/DNIC
OrgAbuseHandle: REGIS10-ARIN
OrgAbuseName: Registration
OrgAbusePhone: +1-844-347-2457
OrgAbuseEmail: disa.columbus.ns.mbx.arin-registrations@mail.mil
OrgAbuseRef: https://whois.arin.net/rest/poc/REGIS10-ARIN

OrgTechHandle: MIL-HSTMST-ARIN
OrgTechName: Network DoD
OrgTechPhone: +1-844-347-2457
OrgTechEmail: disa.columbus.ns.mbx.hostmaster-dod-nic@mail.mil
OrgTechRef: https://whois.arin.net/rest/poc/MIL-HSTMST-ARIN

OrgTechHandle: REGIS10-ARIN
OrgTechName: Registration
OrgTechPhone: +1-844-347-2457
OrgTechEmail: disa.columbus.ns.mbx.arin-registrations@mail.mil
OrgTechRef: https://whois.arin.net/rest/poc/REGIS10-ARIN

DNS records

DNS query for mail.mil failed: TimedOut
name class type data time to live
pri-jeemsg.eemsg.mail.mil IN RRSIG
type covered: A (1)
algorithm: RSA/SHA-256 (8)
labels: 4
original ttl: 3600 (01:00:00)
signature expiration: 2016-04-17 13:30:56Z
signature inception: 2016-03-18 13:30:56Z
key tag: 24126
signer’s name: mail.mil
signature:
(1024 bits)

89637AEE51B3D14F8424B9082AFCE93A
81A246CD95B4752E94224B217CF051F7
CC52C3AAC7E619344172F6B72E511573
ABECBC31CA4500B634DA886A8D22D10F
C386CF1DE699334D0427328D458F7652
DAEFB3F950D58C9B4847A74C86B76CA2
A643CBA86EFC8499E5642CBE4F9E1B48
5183B6EF018E8CAB264105A56B1632F0

2963s (00:49:23)
pri-jeemsg.eemsg.mail.mil IN RRSIG
type covered: A (1)
algorithm: RSA/SHA-256 (8)
labels: 4
original ttl: 3600 (01:00:00)
signature expiration: 2016-04-17 13:30:56Z
signature inception: 2016-03-18 13:30:56Z
key tag: 64491
signer’s name: mail.mil
signature:
(1024 bits)

B264106703A55E003C793702C82D51B2
DC50223D5448D7DA23134CF7F65156EC
15B0A5042677EED702E7CF0880DD60B3
F2DE22AF8CFB72DE7750C48D7BFB7C37
5DEE698A6685AC3115090518B1E8CF42
4874DB9F3DA94C33DC5FCEE1B1FC9EA3
6F247E0B700620FA2E7B07ACB8E4848C
A035041F30239CE3983E54F9B7F6D13B

2963s (00:49:23)
pri-jeemsg.eemsg.mail.mil IN A 156.112.250.2 2963s (00:49:23)
pri-jeemsg.eemsg.mail.mil IN A 156.112.250.0 2963s (00:49:23)
pri-jeemsg.eemsg.mail.mil IN A 156.112.250.3 2963s (00:49:23)
pri-jeemsg.eemsg.mail.mil IN A 156.112.250.1 2963s (00:49:23)
pri-jeemsg.eemsg.mail.mil IN A 156.112.250.4 2963s (00:49:23)
mail.mil IN SOA
server: sdns1.csd.disa.mil
email: hostmaster@csd.disa.mil
serial: 2016020802
refresh: 3600
retry: 600
expire: 2592000
minimum ttl: 900
2032s (00:33:52)
mail.mil IN RRSIG
type covered: SOA (6)
algorithm: RSA/SHA-256 (8)
labels: 2
original ttl: 3600 (01:00:00)
signature expiration: 2016-04-17 13:30:56Z
signature inception: 2016-03-18 13:30:56Z
key tag: 24126
signer’s name: mail.mil
signature:
(1024 bits)

7D27A0560EB9A02CBBD1063CCC45F053
407643EFBF186C03D419D01108D79EB7
44EFDC31015F51C9B303F397405947FF
5453F4C49649694ED636455AB7BEF862
8D888934D94467E27071BBBB9FBF00FB
4779A996D376F76261194EB4B8C73183
363803187567DF8EB1B286A36E45E74A
86AE5EF868F87E8D5FC8E2BBAF4601A5

2032s (00:33:52)
mail.mil IN RRSIG
type covered: SOA (6)
algorithm: RSA/SHA-256 (8)
labels: 2
original ttl: 3600 (01:00:00)
signature expiration: 2016-04-17 13:30:56Z
signature inception: 2016-03-18 13:30:56Z
key tag: 64491
signer’s name: mail.mil
signature:
(1024 bits)

37A1C4A94F468EF7FF28064F2D6E0150
AC68A247B9E8223C63E5EC2322149F35
205E007C0CA755523AD6A8EF9F433C4D
601036E10B53DA737944C37E99CB8153
42B914C114D46827300928313F33E86F
9589121C5EC7BB7F1D5709DE21BD84CD
4BD35353CFF1A8E3B1B3278D25A56F08
7B3B4F4E7B4CFFEE1C0AB8F0EB1CC39C

2032s (00:33:52)
mail.mil IN MX
preference: 10
exchange: pri-jeemsg.eemsg.mail.mil
516s (00:08:36)
mail.mil IN MX
preference: 20
exchange: sec-jeemsg.eemsg.mail.mil
516s (00:08:36)
mail.mil IN RRSIG
type covered: MX (15)
algorithm: RSA/SHA-256 (8)
labels: 2
original ttl: 3600 (01:00:00)
signature expiration: 2016-04-17 13:30:56Z
signature inception: 2016-03-18 13:30:56Z
key tag: 24126
signer’s name: mail.mil
signature:
(1024 bits)

56AB53E5092939975437E27A9B602871
51AC658A16FF79681FD7944C21E3135E
241DB7ECCA5F6130510A9EA8ADA16B85
8EFE732B457BDA6F0B61D69127C947A0
C35E8676476CC8FED263ED43716CB26D
F481C0500A47D20DF966C9FEB93274B3
E04759E59B5339FC2A5A4877F1293688
45AA349E903BEDC1D9E941CDDED97367

516s (00:08:36)
mail.mil IN RRSIG
type covered: MX (15)
algorithm: RSA/SHA-256 (8)
labels: 2
original ttl: 3600 (01:00:00)
signature expiration: 2016-04-17 13:30:56Z
signature inception: 2016-03-18 13:30:56Z
key tag: 64491
signer’s name: mail.mil
signature:
(1024 bits)

04A04E76716A2E0936BA28EC4771FF4C
B9A53C223049CF07175A46A168629606
CAD194D3DA56616C8189E74E01308FA5
0816C74D8D7A49D53A4E92D4326320CB
0B4C10CDD33DBD5800D7984A264B7202
7D363C43EC2492B5A6B23EB8E10D75B1
1156120C2383CD30BBF452EF73631C9E
AEE96A2E2EBE3E45BA9E9BCFA134C0CC

516s (00:08:36)
mail.mil IN DNSKEY
flags: SecureEntryPoint, ZoneKey (257)
protocol: 3
algorithm: RSA/SHA-256 (8)
public key:
(2080 bits)

03010001AC77ADC11B6B3DC9A24A693A
F601C6D9F4BE3A81DAFC9E7DB1AE03A5
1E58F2DA79BE66B903986FB7DEBE7493
F93B72DD8AD44FADC5C3A20303F38477
85C2F52B5C5029B0AEC5777B0B24CDCB
50FBAF17771E99EAEB6AE56018BC0165
903FA799251C78EAEEDE2CEFBF25F624
E2D6737AEC7B5BBF6B73D54B261152E7
DDF8824D35C2FE1A95970DF7CD4F1DFD
90040D7BDB1986879A4ABE16C1EF3D6A
C12EEBF4F3BE0D5C0641A429771CB1D6
3FDE77F8AD5B2763C448998EF74612CB
C0D809B78D4E156155AE5241B43005E8
F95DD792B10945E5E7DD11CF9E93EF2D
5D25013F96BF2EF081FCE549DC502815
DC1DEDEDB97B0BAB6606DADD342E7ED1
BF718171

2963s (00:49:23)
mail.mil IN DNSKEY
flags: ZoneKey (256)
protocol: 3
algorithm: RSA/SHA-256 (8)
public key:
(1056 bits)

03010001A27445B6B785C4AB31ED68F9
5FF607653BFD268F0040EA696C3F76D9
A821F078FB2EE7532FDBE990637688F8
6DF0D2BD65020CB7588903C46DD12C19
D7BC42D25FBB5E33D4118C6819CE2F32
AC9F6AA16F1E8BABA882BC45DB5BAF0A
06BBA030D2D87E90A28C1B1B410EE078
4B72973A290DA8F42D9664B5DB6DFF56
545BC5DD

2963s (00:49:23)
mail.mil IN DNSKEY
flags: ZoneKey (256)
protocol: 3
algorithm: RSA/SHA-256 (8)
public key:
(1056 bits)

03010001D3B3EDA4AEEC1CE788B3099E
4A29D5E3D7D53C5C5328E31E8BC109DA
350EAF8668F818A2B281EA0A1B911A75
D02CFC5B98504FE12DA441E6E761D89E
B06A5B51FB52DCC0DD4C7A5F08667DC6
5BDD494747BA04EBF07E339580852640
F20F65AFC4354FD3547760A157FBF7BE
1BC68C541421E404AE71BB0E0D5C19E6
FCB09B9D

2963s (00:49:23)
mail.mil IN DNSKEY
flags: SecureEntryPoint, ZoneKey (257)
protocol: 3
algorithm: RSA/SHA-256 (8)
public key:
(2080 bits)

03010001DAA1DBFB4A5E1C16D1023416
F56864831EA2DA14DACEE26E38E8C979
E4B405879D8CD6185AA6B4253C763164
EDED7B6377EA80D502C3EDE3BD7325D9
2BA69F25CC947D2836C17AA53A20CF44
248054419BD7B1DE974AC302081A998C
7AD871BCA4C27B5DDCB84D4CD63EC107
3E7374B122503956EF5F3AC4669AB374
C19C193AE902A01CD7F6C849B233963B
DCA285BA39C3FD4956984609025E5345
1B6E00B9485A5F9FE94FC1C394424D23
558E369666A69232BB30BDF279408C86
199A837DEE84333CCAA7BB5E4D62188F
D93CE19B81D7BBE9FC01F37BA358D5AA
9809D5A4EA3BEB8DBE02D3266B39D3B1
116D451E85DBD78B04B9F88AADCB63AA
5F1B19F5

2963s (00:49:23)
mail.mil IN RRSIG
type covered: DNSKEY (48)
algorithm: RSA/SHA-256 (8)
labels: 2
original ttl: 3600 (01:00:00)
signature expiration: 2016-04-17 13:30:56Z
signature inception: 2016-03-18 13:30:56Z
key tag: 11695
signer’s name: mail.mil
signature:
(2048 bits)

68B898D311AE00926DACB19C66694FCE
AB5C7F6D248BA674ECA04FB0B59E8E94
574E9A298A7B2154774E8175AA0B3C53
24BD038989D4EFAE73EEA8F8D5017FEB
E781B87C73913BF2D5922B9AE0DF0F2B
550AAC600A392831AC8B7D372506A181
FFB311BAC8B242FA1DFFF8E744D080E5
5E4294855CADD273F1176AD480004EB9
40E6E9EC09DC7D39128AEC31548FB78B
AC9893538CC38614FD5B37ACF6DE90BD
200D6848D0F8591FD34EC7AEA06B3E38
D18FA0CEB0BDD77BBEA96C9F74897DFD
61AC4746A3A39E8B19BD3AA51BE4920F
EBDD3E7BE4A7005DC7ED14BA1561195F
986018A943163FC20425921B693857EC
F933068CE4AAECC9483DFC8896D569DE

2963s (00:49:23)
mail.mil IN RRSIG
type covered: DNSKEY (48)
algorithm: RSA/SHA-256 (8)
labels: 2
original ttl: 3600 (01:00:00)
signature expiration: 2016-04-17 13:30:56Z
signature inception: 2016-03-18 13:30:56Z
key tag: 24126
signer’s name: mail.mil
signature:
(1024 bits)

5A0CC9367781B403A5A0204635953799
7103E83954AF24A58FF895693709D3C7
133CF44C106925BC7D3C3BFDEBB6E6BD
7CFE0E0236C4A8E505908E5490E4777D
5F72624F801AF1E33FE047666A5BE769
CA28CC294A390257093CBCD7F6640956
64D571034261BBED93AB800270971F13
8FAF63B410789C1E8AE28117CF35276A

2963s (00:49:23)
mail.mil IN RRSIG
type covered: DNSKEY (48)
algorithm: RSA/SHA-256 (8)
labels: 2
original ttl: 3600 (01:00:00)
signature expiration: 2016-04-17 13:30:56Z
signature inception: 2016-03-18 13:30:56Z
key tag: 34516
signer’s name: mail.mil
signature:
(2048 bits)

884ED35266535EB1132A564899F0D308
CF3229EEB87E7BAA6754B245136859A3
A0F147431BC8F0E13B55BAD38BD67A4D
0B99FDA03E2B57185B42E5C610159D07
9B0C02C5C81589BC4470D5B5B4B4117D
D7B897E0E5DF6F1E4A0EED37A86671E5
AE4D0C89B9128448E1836249005F5726
04445247A34D79A5D7583F663F72D114
A25EFEE6D0CA682C4CD2949052EC2020
60083383CEE0930AC96153ED114F41B3
9FF721BA3CBFD70A02C2FE5D5A53B523
F42B75A8A2776A49B6779358564C76DB
D4E9E6CBA74FED566825CBC252E81501
18A65FE1DAF70D7EF76A4DE0C7FAC049
0EB37A1E581762684CD52B91233456C2
B5532D0BE05C43A0BDAEEDCB78EE7640

2963s (00:49:23)
mail.mil IN RRSIG
type covered: DNSKEY (48)
algorithm: RSA/SHA-256 (8)
labels: 2
original ttl: 3600 (01:00:00)
signature expiration: 2016-04-17 13:30:56Z
signature inception: 2016-03-18 13:30:56Z
key tag: 64491
signer’s name: mail.mil
signature:
(1024 bits)

094680EB0884C3DA3665921E03A6E056
D2FAAC5B2CB2AB951BF40DB64A136B05
C7355C0F647F5E543BE7AA1577248433
582BD89888D93625482F707B4C340DAF
967B9228B022203B6A95D57C5E974B30
0E54E64608134363D034D98196AFC403
2D97F119463256C166E3D7AD112E34B9
B9FCE97B1E00B4A19397FCBC5A71F0BC

2963s (00:49:23)
mail.mil IN NS sdns2.csd.disa.mil 3067s (00:51:07)
mail.mil IN NS sdns1.csd.disa.mil 3067s (00:51:07)
mail.mil IN NS sdns3.csd.disa.mil 3067s (00:51:07)
mail.mil IN RRSIG
type covered: NS (2)
algorithm: RSA/SHA-256 (8)
labels: 2
original ttl: 3600 (01:00:00)
signature expiration: 2016-04-17 13:30:56Z
signature inception: 2016-03-18 13:30:56Z
key tag: 24126
signer’s name: mail.mil
signature:
(1024 bits)

5A8EFBCB010E4BC0328B837362416C3F
BBF79B08D8AEB9A7F50C3B4B8EC69279
CBD1D03DAC4FA23D9B1BEFBDCA51AF17
D45E1421581D47BAA4B9C8ABCC53D489
7586CA272FC22FF5845EB003C7852039
489E95760EA301516DA77AB1CA055C51
69B2FB2E4D77CA1FACAC04B992766767
9904E8CFC2B63649CA96871C55C0A1BF

3597s (00:59:57)
mail.mil IN RRSIG
type covered: NS (2)
algorithm: RSA/SHA-256 (8)
labels: 2
original ttl: 3600 (01:00:00)
signature expiration: 2016-04-17 13:30:56Z
signature inception: 2016-03-18 13:30:56Z
key tag: 64491
signer’s name: mail.mil
signature:
(1024 bits)

1E41E68C167786F0B98ED05441176A9D
090835D2BC483294CFA1F870DDD1089E
49FF03D8C90CA2C4079928CED9CBE72F
B95E69C60814A8068A01C8C3DBD6FB89
BBCAC6B91DDD1C333A7A0C208E261EB2
840710393E2310B0D2932A50970CC399
B006A337511E6704D77D0BDFA081CFD2
CEA63D4A6CE22DC553B69DDA84182B91

3597s (00:59:57)
0.250.112.156.in-addr.arpa IN PTR pri-jeemsg.eemsg.mail.mil 133s (00:02:13)
112.156.in-addr.arpa IN NS ns3.csd.disa.mil 2585s (00:43:05)
112.156.in-addr.arpa IN NS ns.cybercom.mil 2585s (00:43:05)
112.156.in-addr.arpa IN NS ns1.csd.disa.mil 2585s (00:43:05)
112.156.in-addr.arpa IN NS ns.jtfgno.mil 2585s (00:43:05)
112.156.in-addr.arpa IN NS ns2.csd.disa.mil 2585s (00:43:05)
Traceroute

Tracing route to pri-jeemsg.eemsg.mail.mil [156.112.250.0]…
hop rtt rtt rtt ip address fully qualified domain name
1 0 0 0 208.101.16.73 49.10.65d0.ip4.static.sl-reverse.com
2 0 0 0 66.228.118.157 ae11.dar02.sr01.dal01.networklayer.com
3 0 0 0 173.192.18.212 ae6.bbr02.eq01.dal03.networklayer.com
4 0 0 0 157.238.224.229 ae-11.r01.dllstx04.us.bb.gin.ntt.net
5 0 0 0 129.250.3.232 ae-5.r08.dllstx09.us.bb.gin.ntt.net
6 0 0 0 129.250.66.78 ae-0.centurylink.dllstx09.us.bb.gin.ntt.net
7 * * *
8 9 9 9 63.158.243.46 63-158-243-46.dia.static.qwest.net
9 * * *
10 * * *
11 * * *
12 * * *

Trace aborted

— end —
Address lookup
canonical name ns2.csd.disa.mil.
aliases
addresses 131.77.60.235
Domain Whois record

Queried with “csd.disa.mil”…

Query error: NoWhoisServerForDomain
Network Whois record

Queried whois.arin.net with “n 131.77.60.235″…

NetRange: 131.77.0.0 – 131.77.255.255
CIDR: 131.77.0.0/16
NetName: DECC-OGDEN
NetHandle: NET-131-77-0-0-1
Parent: NET131 (NET-131-0-0-0-0)
NetType: Direct Assignment
OriginAS:
Organization: DoD Network Information Center (DNIC)
RegDate: 1988-10-25
Updated: 2009-12-17
Ref: https://whois.arin.net/rest/net/NET-131-77-0-0-1
OrgName: DoD Network Information Center
OrgId: DNIC
Address: 3990 E. Broad Street
City: Columbus
StateProv: OH
PostalCode: 43218
Country: US
RegDate:
Updated: 2011-08-17
Ref: https://whois.arin.net/rest/org/DNIC
OrgTechHandle: REGIS10-ARIN
OrgTechName: Registration
OrgTechPhone: +1-844-347-2457
OrgTechEmail: disa.columbus.ns.mbx.arin-registrations@mail.mil
OrgTechRef: https://whois.arin.net/rest/poc/REGIS10-ARIN

OrgAbuseHandle: REGIS10-ARIN
OrgAbuseName: Registration
OrgAbusePhone: +1-844-347-2457
OrgAbuseEmail: disa.columbus.ns.mbx.arin-registrations@mail.mil
OrgAbuseRef: https://whois.arin.net/rest/poc/REGIS10-ARIN

OrgTechHandle: MIL-HSTMST-ARIN
OrgTechName: Network DoD
OrgTechPhone: +1-844-347-2457
OrgTechEmail: disa.columbus.ns.mbx.hostmaster-dod-nic@mail.mil
OrgTechRef: https://whois.arin.net/rest/poc/MIL-HSTMST-ARIN

DNS records
name class type data time to live
ns2.csd.disa.mil IN MX
preference: 10
exchange: ns2.csd.disa.mil
2093s (00:34:53)
ns2.csd.disa.mil IN A 131.77.60.235 4190s (01:09:50)
csd.disa.mil IN MX
preference: 10
exchange: montimail.csd.disa.mil
4311s (01:11:51)
csd.disa.mil IN MX
preference: 10
exchange: satximail.csd.disa.mil
4311s (01:11:51)
csd.disa.mil IN SOA
server: ns1.csd.disa.mil
email: root@csd.disa.mil
serial: 2016040101
refresh: 28800
retry: 900
expire: 2592000
minimum ttl: 3600
745s (00:12:25)
csd.disa.mil IN NS ns.jtfgno.mil 4173s (01:09:33)
csd.disa.mil IN NS ns.cybercom.mil 4173s (01:09:33)
csd.disa.mil IN NS ns1.csd.disa.mil 4173s (01:09:33)
235.60.77.131.in-addr.arpa IN PTR ns.cybercom.mil 1852s (00:30:52)
77.131.in-addr.arpa IN NS ns.cybercom.mil 2141s (00:35:41)
77.131.in-addr.arpa IN NS ns1.csd.disa.mil 2141s (00:35:41)
77.131.in-addr.arpa IN NS ns.jtfgno.mil 2141s (00:35:41)
Traceroute

Tracing route to ns2.csd.disa.mil [131.77.60.235]…
hop rtt rtt rtt ip address fully qualified domain name
1 0 0 0 208.101.16.73 49.10.65d0.ip4.static.sl-reverse.com
2 0 0 0 66.228.118.157 ae11.dar02.sr01.dal01.networklayer.com
3 0 0 0 173.192.18.252 ae14.bbr01.eq01.dal03.networklayer.com
4 0 0 0 157.238.224.225 ae-6.r07.dllstx09.us.bb.gin.ntt.net
5 0 0 0 129.250.3.106 ae-2.r08.dllstx09.us.bb.gin.ntt.net
6 0 0 0 129.250.66.78 ae-0.centurylink.dllstx09.us.bb.gin.ntt.net
7 * * *
8 9 9 9 63.158.243.46 63-158-243-46.dia.static.qwest.net
9 * * *
10 * * *
11 * * *
12 * * *

Trace aborted

— end —
URL for this output | return to CentralOps.net, a service of Hexillion
Address lookup
canonical name satximail.csd.disa.mil.
aliases
addresses 164.235.72.30
Domain Whois record

Queried with “satximail.csd.disa.mil”…

Query error: NoWhoisServerForDomain
Network Whois record

Queried whois.arin.net with “n 164.235.72.30″…

NetRange: 164.227.0.0 – 164.255.255.255
CIDR: 164.228.0.0/14, 164.227.0.0/16, 164.240.0.0/12, 164.232.0.0/13
NetName: DNIC-SUPERBLK1
NetHandle: NET-164-227-0-0-2
Parent: NET164 (NET-164-0-0-0-0)
NetType: Direct Assignment
OriginAS:
Organization: DoD Network Information Center (DNIC)
RegDate: 2004-04-29
Updated: 2011-06-21
Ref: https://whois.arin.net/rest/net/NET-164-227-0-0-2

OrgName: DoD Network Information Center
OrgId: DNIC
Address: 3990 E. Broad Street
City: Columbus
StateProv: OH
PostalCode: 43218
Country: US
RegDate:
Updated: 2011-08-17
Ref: https://whois.arin.net/rest/org/DNIC
OrgTechHandle: MIL-HSTMST-ARIN
OrgTechName: Network DoD
OrgTechPhone: +1-614-692-6337
OrgTechEmail: disa.columbus.ns.mbx.hostmaster-dod-nic@mail.mil
OrgTechRef: https://whois.arin.net/rest/poc/MIL-HSTMST-ARIN

OrgTechHandle: REGIS10-ARIN
OrgTechName: Registration
OrgTechPhone: +1-844-347-2457
OrgTechEmail: disa.columbus.ns.mbx.arin-registrations@mail.mil
OrgTechRef: https://whois.arin.net/rest/poc/REGIS10-ARIN

OrgAbuseHandle: REGIS10-ARIN
OrgAbuseName: Registration
OrgAbusePhone: +1-844-347-2457
OrgAbuseEmail: disa.columbus.ns.mbx.arin-registrations@mail.mil
OrgAbuseRef: https://whois.arin.net/rest/poc/REGIS10-ARIN

DNS records
name class type data time to live
satximail.csd.disa.mil IN A 164.235.72.30 5211s (01:26:51)
csd.disa.mil IN MX
preference: 10
exchange: montimail.csd.disa.mil
4311s (01:11:51)
csd.disa.mil IN MX
preference: 10
exchange: satximail.csd.disa.mil
4311s (01:11:51)
csd.disa.mil IN SOA
server: ns1.csd.disa.mil
email: root@csd.disa.mil
serial: 2016040101
refresh: 28800
retry: 900
expire: 2592000
minimum ttl: 3600
396s (00:06:36)
csd.disa.mil IN NS ns.jtfgno.mil 4173s (01:09:33)
csd.disa.mil IN NS ns.cybercom.mil 4173s (01:09:33)
csd.disa.mil IN NS ns1.csd.disa.mil 4173s (01:09:33)
30.72.235.164.in-addr.arpa IN PTR satximail.csd.disa.mil 3114s (00:51:54)
235.164.in-addr.arpa IN NS ns.jtfgno.mil 663s (00:11:03)
235.164.in-addr.arpa IN NS ns1.csd.disa.mil 663s (00:11:03)
235.164.in-addr.arpa IN NS ns3.csd.disa.mil 663s (00:11:03)
235.164.in-addr.arpa IN NS ns.cybercom.mil 663s (00:11:03)
235.164.in-addr.arpa IN NS ns2.csd.disa.mil 663s (00:11:03)
Traceroute

Tracing route to satximail.csd.disa.mil [164.235.72.30]…
hop rtt rtt rtt ip address fully qualified domain name
1 0 0 0 208.101.16.73 49.10.65d0.ip4.static.sl-reverse.com
2 0 0 0 66.228.118.153 ae11.dar01.sr01.dal01.networklayer.com
3 0 0 0 173.192.18.254 ae14.bbr02.eq01.dal03.networklayer.com
4 1 0 0 157.238.224.229 ae-11.r01.dllstx04.us.bb.gin.ntt.net
5 1 1 0 129.250.3.232 ae-5.r08.dllstx09.us.bb.gin.ntt.net
6 2 1 1 129.250.66.78 ae-0.centurylink.dllstx09.us.bb.gin.ntt.net
7 * * *
8 9 9 9 63.158.243.46 63-158-243-46.dia.static.qwest.net
9 * * *
10 * * *
11 * * *
12 * * *

Trace aborted

— end —
Address lookup
canonical name montimail.csd.disa.mil.
aliases
addresses 164.235.104.30
Domain Whois record

Queried with “montimail.csd.disa.mil”…

Query error: NoWhoisServerForDomain
Network Whois record

Queried whois.arin.net with “n 164.235.104.30″…

NetRange: 164.227.0.0 – 164.255.255.255
CIDR: 164.232.0.0/13, 164.228.0.0/14, 164.240.0.0/12, 164.227.0.0/16
NetName: DNIC-SUPERBLK1
NetHandle: NET-164-227-0-0-2
Parent: NET164 (NET-164-0-0-0-0)
NetType: Direct Assignment
OriginAS:
Organization: DoD Network Information Center (DNIC)
RegDate: 2004-04-29
Updated: 2011-06-21
Ref: https://whois.arin.net/rest/net/NET-164-227-0-0-2
OrgName: DoD Network Information Center
OrgId: DNIC
Address: 3990 E. Broad Street
City: Columbus
StateProv: OH
PostalCode: 43218
Country: US
RegDate:
Updated: 2011-08-17
Ref: https://whois.arin.net/rest/org/DNIC
OrgTechHandle: MIL-HSTMST-ARIN
OrgTechName: Network DoD
OrgTechPhone: +1-614-692-6337
OrgTechEmail: disa.columbus.ns.mbx.hostmaster-dod-nic@mail.mil
OrgTechRef: https://whois.arin.net/rest/poc/MIL-HSTMST-ARIN

OrgAbuseHandle: REGIS10-ARIN
OrgAbuseName: Registration
OrgAbusePhone: +1-844-347-2457
OrgAbuseEmail: disa.columbus.ns.mbx.arin-registrations@mail.mil
OrgAbuseRef: https://whois.arin.net/rest/poc/REGIS10-ARIN

OrgTechHandle: REGIS10-ARIN
OrgTechName: Registration
OrgTechPhone: +1-844-347-2457
OrgTechEmail: disa.columbus.ns.mbx.arin-registrations@mail.mil
OrgTechRef: https://whois.arin.net/rest/poc/REGIS10-ARIN

DNS records
name class type data time to live
montimail.csd.disa.mil IN A 164.235.104.30 197s (00:03:17)
csd.disa.mil IN MX
preference: 10
exchange: montimail.csd.disa.mil
4311s (01:11:51)
csd.disa.mil IN MX
preference: 10
exchange: satximail.csd.disa.mil
4311s (01:11:51)
csd.disa.mil IN SOA
server: ns1.csd.disa.mil
email: root@csd.disa.mil
serial: 2016040101
refresh: 28800
retry: 900
expire: 2592000
minimum ttl: 3600
120s (00:02:00)
csd.disa.mil IN NS ns.jtfgno.mil 4173s (01:09:33)
csd.disa.mil IN NS ns.cybercom.mil 4173s (01:09:33)
csd.disa.mil IN NS ns1.csd.disa.mil 4173s (01:09:33)
30.104.235.164.in-addr.arpa IN PTR montimail.csd.disa.mil 1159s (00:19:19)
235.164.in-addr.arpa IN NS ns.jtfgno.mil 387s (00:06:27)
235.164.in-addr.arpa IN NS ns1.csd.disa.mil 663s (00:11:03)
235.164.in-addr.arpa IN NS ns3.csd.disa.mil 663s (00:11:03)
235.164.in-addr.arpa IN NS ns.cybercom.mil 663s (00:11:03)
235.164.in-addr.arpa IN NS ns2.csd.disa.mil 663s (00:11:03)
Traceroute

Tracing route to montimail.csd.disa.mil [164.235.104.30]…
hop rtt rtt rtt ip address fully qualified domain name
1 3 0 0 208.101.16.73 49.10.65d0.ip4.static.sl-reverse.com
2 0 1 1 66.228.118.153 ae11.dar01.sr01.dal01.networklayer.com
3 0 0 0 173.192.18.254 ae14.bbr02.eq01.dal03.networklayer.com
4 0 0 1 157.238.224.229 ae-11.r01.dllstx04.us.bb.gin.ntt.net
5 1 0 0 129.250.3.232 ae-5.r08.dllstx09.us.bb.gin.ntt.net
6 0 0 0 129.250.66.78 ae-0.centurylink.dllstx09.us.bb.gin.ntt.net
7 * * *
8 26 26 26 67.133.228.2
9 * * *
10 * * *
11 * * *
12 * * *

Trace aborted

— end —
Address lookup
canonical name ns.jtfgno.mil.
aliases
addresses 214.3.125.231
Domain Whois record

Queried with “jtfgno.mil”…

Query error: NoWhoisServerForDomain
Network Whois record

Queried whois.arin.net with “n 214.3.125.231″…

NetRange: 214.0.0.0 – 214.255.255.255
CIDR: 214.0.0.0/8
NetName: DNIC-NET-214
NetHandle: NET-214-0-0-0-1
Parent: ()
NetType: Direct Assignment
OriginAS:
Organization: DoD Network Information Center (DNIC)
RegDate: 1998-03-27
Updated: 2011-06-21
Ref: https://whois.arin.net/rest/net/NET-214-0-0-0-1

OrgName: DoD Network Information Center
OrgId: DNIC
Address: 3990 E. Broad Street
City: Columbus
StateProv: OH
PostalCode: 43218
Country: US
RegDate:
Updated: 2011-08-17
Ref: https://whois.arin.net/rest/org/DNIC
OrgTechHandle: MIL-HSTMST-ARIN
OrgTechName: Network DoD
OrgTechPhone: +1-614-692-6337
OrgTechEmail: disa.columbus.ns.mbx.hostmaster-dod-nic@mail.mil
OrgTechRef: https://whois.arin.net/rest/poc/MIL-HSTMST-ARIN

OrgAbuseHandle: REGIS10-ARIN
OrgAbuseName: Registration
OrgAbusePhone: +1-844-347-2457
OrgAbuseEmail: disa.columbus.ns.mbx.arin-registrations@mail.mil
OrgAbuseRef: https://whois.arin.net/rest/poc/REGIS10-ARIN

OrgTechHandle: REGIS10-ARIN
OrgTechName: Registration
OrgTechPhone: +1-844-347-2457
OrgTechEmail: disa.columbus.ns.mbx.arin-registrations@mail.mil
OrgTechRef: https://whois.arin.net/rest/poc/REGIS10-ARIN

DNS records

DNS query for ns.jtfgno.mil failed: TimedOut

DNS query for jtfgno.mil failed: TimedOut
name class type data time to live
ns.jtfgno.mil IN A 214.3.125.231 3532s (00:58:52)
ns.jtfgno.mil IN RRSIG
type covered: A (1)
algorithm: RSA/SHA-256 (8)
labels: 3
original ttl: 86400 (1.00:00:00)
signature expiration: 2016-04-22 13:47:00Z
signature inception: 2016-03-23 13:47:00Z
key tag: 28416
signer’s name: jtfgno.mil
signature:
(1024 bits)

15C061D443428227E33A9A4240B811BA
C1AE7CDBE4012885431A52E02B09AC9B
0407A4D0124B6C8BC5CFFA68F5630AFF
3AC62B9505CC7AD002ABAC3FE8B8CE52
40DBE64E28F2E60C7408918CBEF09A5D
C84AE61588D27B15D4FA6F1212E6F8CB
DD71D986689E00E921D4F4DCBE8ED050
93A7471A6FFA6AFC11BB7BB1AD79C557

3532s (00:58:52)
jtfgno.mil IN SOA
server: ns1.csd.disa.mil
email: disa.meade.esd.list.es312-ccc-hostmaster@mail.mil
serial: 2015070921
refresh: 3600
retry: 900
expire: 2592000
minimum ttl: 3600
15962s (04:26:02)
jtfgno.mil IN RRSIG
type covered: SOA (6)
algorithm: RSA/SHA-256 (8)
labels: 2
original ttl: 86400 (1.00:00:00)
signature expiration: 2016-04-22 13:47:00Z
signature inception: 2016-03-23 13:47:00Z
key tag: 28416
signer’s name: jtfgno.mil
signature:
(1024 bits)

5F7CF9F9239B527F8146C7F49D35A972
27400A00912F4AB5F9EAF37DE98DD291
AFEB78BF2CFDFE67A6AEAAE827500B8E
B26EE78884913928B77508DFF028AE05
C1B86521B3D95CE25775EEEF9E9F5BE1
911235387BA44ECC30091C685078AFE4
BE8A7ABD7A3F6A46929801E5FA7802E4
D171088643C0D652980DD298B45D4449

15962s (04:26:02)
jtfgno.mil IN MX
preference: 5
exchange: sw1.jtfgno.mil
6700s (01:51:40)
jtfgno.mil IN RRSIG
type covered: MX (15)
algorithm: RSA/SHA-256 (8)
labels: 2
original ttl: 86400 (1.00:00:00)
signature expiration: 2016-04-22 13:47:00Z
signature inception: 2016-03-23 13:47:00Z
key tag: 28416
signer’s name: jtfgno.mil
signature:
(1024 bits)

7E35040F838CA0D803B69567D5277471
DA30611321051033E5F749531CA38C38
7027BEF78F0C98645873A2F8DE0E1B99
BA2DDF56BFD7CB2F8587D807E413C7F6
B13ABA88D538565465A34FBB7F7DF0BF
1DA21C1FF61801A3A01A44DA12F41434
6FA46D358345620EB91A0CCA8F33A829
06A9C1F2E9443562AEBD7DC7F45B8460

6700s (01:51:40)
jtfgno.mil IN DNSKEY
flags: ZoneKey (256)
protocol: 3
algorithm: RSA/SHA-256 (8)
public key:
(1056 bits)

030100019D6EB7A7F655F075B8BE21A8
5D31A0E938CFEC3473584F65A9B74729
C8A9D95486F21079A0CEDEB4A5EC3A8A
96EBCB99B1AB05A90816FB1B1FE1F370
31252F3D766AE9A0A48D73B7169BDE63
60B63DF6C0A6B42E83299DE5B1604D13
F419AE04B0D81411890B253DF278B74D
A2B5C707ED7B35BEEC47E43BA524F85E
2DD5C889

3819s (01:03:39)
jtfgno.mil IN DNSKEY
flags: SecureEntryPoint, ZoneKey (257)
protocol: 3
algorithm: RSA/SHA-256 (8)
public key:
(2080 bits)

03010001CCB20ED07865C74814E160B9
09BD9CAF37937351B895354F040E7F57
3200C2CB42C750B1FEA39616E45FC10D
3C7CBB7EA4E1630C40183F1011CEE701
AE65205F8FF71F03600DADC33085DB1B
F938D004992E8E9473C1D95AFA4A8F8E
CF68C35F18EDDE7ADE1CB4C2A713090B
1606726D350DFAA60D4C02C42F3C6CE5
486F8B90C8BB615D3E751C6F272FB749
ECECCCF8F8F4D617EE74776C4123E98A
5192554E2754E8033E7D4D51C09F6922
879068B6CC6F8699E4AEC56D629ECB60
C8FF570275E57953962B0F7B5BA71F8B
969AE360152D5726907EF90C30264417
E48C7DDE345F65D7079FA4EF84A8F346
BFB089284B219247EACBB4C619B0BF57
7C5AFFE1

3819s (01:03:39)
jtfgno.mil IN RRSIG
type covered: DNSKEY (48)
algorithm: RSA/SHA-256 (8)
labels: 2
original ttl: 86400 (1.00:00:00)
signature expiration: 2016-04-22 13:47:00Z
signature inception: 2016-03-23 13:47:00Z
key tag: 19972
signer’s name: jtfgno.mil
signature:
(2048 bits)

5D51B7DE033897D71CEEAEB0CEA1AD22
B5B07CE2C845BBDFD2E415FE69F054C6
B9B9D177376818BC8A8E2734B41DC83A
749E4DC89C636BB3985E162ED7F690BF
80B05F3F90BC3435A94741D3F3CB8B62
92D37B71C9E46CA2FF228DEF5426DAE5
3D9E139C6DE91D67A437030787D0A079
E274B33E3B6664EFDFC167454B3019CD
A0DE033E53C44E743D6E16F9C71D0AD2
717E377B223EDA71D5BF3FF305CDEBF2
04F015C7D607085D6C0B97D3FE986873
48FAFA618356B3D9997646A95BAEB6E5
E3864C91C5F992E2170BBB43239CE461
6F59813D97C2E276787F2C8F1879E445
CEAC8F012F8D886135949C9F3CC76E9D
DE73147C620831A19290157E4E229D57

3819s (01:03:39)
jtfgno.mil IN RRSIG
type covered: DNSKEY (48)
algorithm: RSA/SHA-256 (8)
labels: 2
original ttl: 86400 (1.00:00:00)
signature expiration: 2016-04-22 13:47:00Z
signature inception: 2016-03-23 13:47:00Z
key tag: 28416
signer’s name: jtfgno.mil
signature:
(1024 bits)

07E2603583735E6A92C679F361AB5959
EE7F687EDFDA97977454D783A5125C76
7555100D7BB435F26343B77D0887EDF2
E9F98D5F59FDA7994F884C0F50F4C747
23798707A8B9503B3A4F7E321933AC79
E220A7C9A378EC6561C806E34AC35478
25DB8951769DEEC70FE93FACAAF8866B
FAD23843E18F1560848E383019C12AA6

3819s (01:03:39)
jtfgno.mil IN NS utindo02.csd.disa.mil 25613s (07:06:53)
jtfgno.mil IN NS ns.cybercom.mil 25613s (07:06:53)
jtfgno.mil IN NS ns1.csd.disa.mil 25613s (07:06:53)
jtfgno.mil IN NS ns.jtfgno.mil 25613s (07:06:53)
jtfgno.mil IN RRSIG
type covered: NS (2)
algorithm: RSA/SHA-256 (8)
labels: 2
original ttl: 86400 (1.00:00:00)
signature expiration: 2016-04-22 13:47:00Z
signature inception: 2016-03-23 13:47:00Z
key tag: 28416
signer’s name: jtfgno.mil
signature:
(1024 bits)

11F7FCA32751D47C88DF10A0DAFB6E8C
6C2BBCC8CA09B17196D9F99DD1DDE325
63F7DA6B52A08E3FBBECA7EC6EBB6064
71C8421994D9C2E10FC19A256A6FBFCC
3906CA036BEEB29BE6576562A7A50011
512539E82A3E026C1A7399045EB262D5
EB2549344B7DEE30A0DC24F701622D84
E4A1530BB79BBADDC515AEA8802611B4

25613s (07:06:53)
231.125.3.214.in-addr.arpa IN PTR ns.jtfgno.mil 103s (00:01:43)
125.3.214.in-addr.arpa IN NS ns3.csd.disa.mil 101s (00:01:41)
125.3.214.in-addr.arpa IN NS ns2.csd.disa.mil 102s (00:01:42)
125.3.214.in-addr.arpa IN NS ns.jtfgno.mil 102s (00:01:42)
125.3.214.in-addr.arpa IN NS ns.cybercom.mil 102s (00:01:42)
125.3.214.in-addr.arpa IN NS ns1.csd.disa.mil 102s (00:01:42)
Traceroute

Tracing route to ns.jtfgno.mil [214.3.125.231]…
hop rtt rtt rtt ip address fully qualified domain name
1 0 1 1 208.101.16.73 49.10.65d0.ip4.static.sl-reverse.com
2 0 0 0 66.228.118.157 ae11.dar02.sr01.dal01.networklayer.com
3 23 1 1 173.192.18.252 ae14.bbr01.eq01.dal03.networklayer.com
4 0 0 0 157.238.224.225 ae-6.r07.dllstx09.us.bb.gin.ntt.net
5 0 0 1 129.250.3.106 ae-2.r08.dllstx09.us.bb.gin.ntt.net
6 0 0 0 129.250.66.78 ae-0.centurylink.dllstx09.us.bb.gin.ntt.net
7 * * *
8 39 39 39 208.46.37.38
9 * * *
10 * * *
11 * * *
12 * * *

Trace aborted

— end —
Address lookup
canonical name ns1.csd.disa.mil.
aliases
addresses 152.229.110.235
Domain Whois record

Queried with “csd.disa.mil”…

Query error: NoWhoisServerForDomain
Network Whois record

Queried whois.arin.net with “n 152.229.110.235″…

NetRange: 152.229.0.0 – 152.229.255.255
CIDR: 152.229.0.0/16
NetName: DISA-CSD-15-1
NetHandle: NET-152-229-0-0-1
Parent: NET152 (NET-152-0-0-0-0)
NetType: Direct Assignment
OriginAS:
Organization: DoD Network Information Center (DNIC)
RegDate: 1991-09-04
Updated: 2009-04-15
Ref: https://whois.arin.net/rest/net/NET-152-229-0-0-1
OrgName: DoD Network Information Center
OrgId: DNIC
Address: 3990 E. Broad Street
City: Columbus
StateProv: OH
PostalCode: 43218
Country: US
RegDate:
Updated: 2011-08-17
Ref: https://whois.arin.net/rest/org/DNIC
OrgTechHandle: REGIS10-ARIN
OrgTechName: Registration
OrgTechPhone: +1-844-347-2457
OrgTechEmail: disa.columbus.ns.mbx.arin-registrations@mail.mil
OrgTechRef: https://whois.arin.net/rest/poc/REGIS10-ARIN

OrgAbuseHandle: REGIS10-ARIN
OrgAbuseName: Registration
OrgAbusePhone: +1-844-347-2457
OrgAbuseEmail: disa.columbus.ns.mbx.arin-registrations@mail.mil
OrgAbuseRef: https://whois.arin.net/rest/poc/REGIS10-ARIN

OrgTechHandle: MIL-HSTMST-ARIN
OrgTechName: Network DoD
OrgTechPhone: +1-614-692-6337
OrgTechEmail: disa.columbus.ns.mbx.hostmaster-dod-nic@mail.mil
OrgTechRef: https://whois.arin.net/rest/poc/MIL-HSTMST-ARIN

DNS records
name class type data time to live
ns1.csd.disa.mil IN A 152.229.110.235 2940s (00:49:00)
csd.disa.mil IN MX
preference: 10
exchange: montimail.csd.disa.mil
3173s (00:52:53)
csd.disa.mil IN MX
preference: 10
exchange: satximail.csd.disa.mil
3173s (00:52:53)
csd.disa.mil IN SOA
server: ns1.csd.disa.mil
email: root@csd.disa.mil
serial: 2016040600
refresh: 28800
retry: 900
expire: 2592000
minimum ttl: 3600
6413s (01:46:53)
csd.disa.mil IN NS ns.jtfgno.mil 3163s (00:52:43)
csd.disa.mil IN NS ns1.csd.disa.mil 3163s (00:52:43)
csd.disa.mil IN NS ns.cybercom.mil 3163s (00:52:43)
235.110.229.152.in-addr.arpa IN PTR ns1.csd.disa.mil 1704s (00:28:24)
229.152.in-addr.arpa IN SOA
server: ns1.csd.disa.mil
email: cccac@csd.disa.mil
serial: 2016040100
refresh: 1200
retry: 600
expire: 2592000
minimum ttl: 1200
50420s (14:00:20)
229.152.in-addr.arpa IN NS ns3.csd.disa.mil 431s (00:07:11)
229.152.in-addr.arpa IN NS ns2.csd.disa.mil 432s (00:07:12)
229.152.in-addr.arpa IN NS ns.jtfgno.mil 432s (00:07:12)
229.152.in-addr.arpa IN NS ns1.csd.disa.mil 432s (00:07:12)
229.152.in-addr.arpa IN NS ns.cybercom.mil 432s (00:07:12)
Traceroute

Tracing route to ns1.csd.disa.mil [152.229.110.235]…
hop rtt rtt rtt ip address fully qualified domain name
1 0 0 0 208.101.16.73 49.10.65d0.ip4.static.sl-reverse.com
2 0 0 0 66.228.118.157 ae11.dar02.sr01.dal01.networklayer.com
3 0 0 1 173.192.18.252 ae14.bbr01.eq01.dal03.networklayer.com
4 1 0 0 157.238.224.225 ae-6.r07.dllstx09.us.bb.gin.ntt.net
5 0 0 1 129.250.3.106 ae-2.r08.dllstx09.us.bb.gin.ntt.net
6 0 0 0 129.250.66.78 ae-0.centurylink.dllstx09.us.bb.gin.ntt.net
7 * * *
8 9 9 9 63.158.243.46 63-158-243-46.dia.static.qwest.net
9 * * *
10 * * *
11 * * *
12 * * *

Trace aborted

— end —
Address lookup
canonical name ns.cybercom.mil.
aliases
addresses 131.77.60.235
Domain Whois record

Queried with “cybercom.mil”…

Query error: NoWhoisServerForDomain
Network Whois record

Queried whois.arin.net with “n 131.77.60.235″…

NetRange: 131.77.0.0 – 131.77.255.255
CIDR: 131.77.0.0/16
NetName: DECC-OGDEN
NetHandle: NET-131-77-0-0-1
Parent: NET131 (NET-131-0-0-0-0)
NetType: Direct Assignment
OriginAS:
Organization: DoD Network Information Center (DNIC)
RegDate: 1988-10-25
Updated: 2009-12-17
Ref: https://whois.arin.net/rest/net/NET-131-77-0-0-1
OrgName: DoD Network Information Center
OrgId: DNIC
Address: 3990 E. Broad Street
City: Columbus
StateProv: OH
PostalCode: 43218
Country: US
RegDate:
Updated: 2011-08-17
Ref: https://whois.arin.net/rest/org/DNIC
OrgTechHandle: REGIS10-ARIN
OrgTechName: Registration
OrgTechPhone: +1-844-347-2457
OrgTechEmail: disa.columbus.ns.mbx.arin-registrations@mail.mil
OrgTechRef: https://whois.arin.net/rest/poc/REGIS10-ARIN

OrgAbuseHandle: REGIS10-ARIN
OrgAbuseName: Registration
OrgAbusePhone: +1-844-347-2457
OrgAbuseEmail: disa.columbus.ns.mbx.arin-registrations@mail.mil
OrgAbuseRef: https://whois.arin.net/rest/poc/REGIS10-ARIN

OrgTechHandle: MIL-HSTMST-ARIN
OrgTechName: Network DoD
OrgTechPhone: +1-844-347-2457
OrgTechEmail: disa.columbus.ns.mbx.hostmaster-dod-nic@mail.mil
OrgTechRef: https://whois.arin.net/rest/poc/MIL-HSTMST-ARIN

DNS records

DNS query for cybercom.mil failed: TimedOut
name class type data time to live
ns.cybercom.mil IN RRSIG
type covered: A (1)
algorithm: RSA/SHA-256 (8)
labels: 3
original ttl: 86400 (1.00:00:00)
signature expiration: 2016-05-05 04:30:02Z
signature inception: 2016-04-05 04:30:02Z
key tag: 32310
signer’s name: cybercom.mil
signature:
(1024 bits)

26640A925D8B2A4447F7466B9B7D847A
A1570C21B50122D0973A98198196F405
FB7C8F5081454E9A7F0A5781AE700DDE
6D541945A1422736F097EFE975E5432A
33B3C6C7B46F75998F4E2F7578BB6DFF
C0A1F1FE4C9FC982F8FB51E865C2FC4E
473AC1E898E310AA062D83256459E9EF
061D96A158B98DA2BF788BFF1120AF48

2586s (00:43:06)
ns.cybercom.mil IN A 131.77.60.235 2586s (00:43:06)
cybercom.mil IN SOA
server: ns1.csd.disa.mil
email: disa.meade.esd.list.es312-ccc-hostmaster@mail.mil
serial: 2016022502
refresh: 28800
retry: 1800
expire: 259200
minimum ttl: 3600
55553s (15:25:53)
cybercom.mil IN RRSIG
type covered: SOA (6)
algorithm: RSA/SHA-256 (8)
labels: 2
original ttl: 86400 (1.00:00:00)
signature expiration: 2016-05-05 04:30:02Z
signature inception: 2016-04-05 04:30:02Z
key tag: 32310
signer’s name: cybercom.mil
signature:
(1024 bits)

A3035EAC067A0F2831DAAC9038B99321
8851B46F7965CC3829B2764AC5EB1BD8
3B8E59911524C7BC58440C75AA7127EC
C0BFB545E368352661C883D3759BC8AB
43D518092B4ADE4DA0AA1B385BB8953A
DF4FC6ECF9E5FD4CEFADB3977883DFD4
F5E6F75298AE38A88CF6844C31D1BFA4
197A9F2BCA22C3A9ED1DDFFE0866274A

55553s (15:25:53)
cybercom.mil IN NS ns.jtfgno.mil 28912s (08:01:52)
cybercom.mil IN NS ns1.csd.disa.mil 28912s (08:01:52)
cybercom.mil IN NS utindo02.csd.disa.mil 28912s (08:01:52)
cybercom.mil IN NS ns.cybercom.mil 28912s (08:01:52)
cybercom.mil IN RRSIG
type covered: NS (2)
algorithm: RSA/SHA-256 (8)
labels: 2
original ttl: 86400 (1.00:00:00)
signature expiration: 2016-05-05 04:30:02Z
signature inception: 2016-04-05 04:30:02Z
key tag: 32310
signer’s name: cybercom.mil
signature:
(1024 bits)

A35CA902AC2424DAEA94AEF945CE3BCD
A7064469A0B338DA80F6E6247826AEF2
8E3811A683152BE2AF269F9A4DA864C8
ACE6F641D9851A9EB0B44BE31E81ED8C
660516100E5AD617A03CC7D0A725F4B1
2BF553422FE772A62DCCE93FBFC8A8AE
FD94C8FCFC2DE0E35B2E80B39E2D6E87
416FB3850F931181971964D5D3A6DF9A

28912s (08:01:52)
cybercom.mil IN MX
preference: 10
exchange: emvm-gh1-uea08.nsa.gov
8251s (02:17:31)
cybercom.mil IN MX
preference: 10
exchange: emvm-gh1-uea09.nsa.gov
8251s (02:17:31)
cybercom.mil IN RRSIG
type covered: MX (15)
algorithm: RSA/SHA-256 (8)
labels: 2
original ttl: 86400 (1.00:00:00)
signature expiration: 2016-05-05 04:30:02Z
signature inception: 2016-04-05 04:30:02Z
key tag: 32310
signer’s name: cybercom.mil
signature:
(1024 bits)

1A7FBF375DD178B8B319E954837B53CB
786D7D8378D299B0A5BEAC30AFF03531
11169C5C9A29E7B69313D5267592999E
8F6E9EE6E5DC9CDCCB95340FDEA967C2
B6B2D43B4A96AC67CD07164DC78B0B95
4E6F6A2C2C86AF74172369411DCB6F4B
5595E2138AB9657750BBDD509F3A0500
55A93F7E01A889C78A84A8DB260CAE6F

8251s (02:17:31)
cybercom.mil IN DNSKEY
flags: ZoneKey (256)
protocol: 3
algorithm: RSA/SHA-256 (8)
public key:
(1056 bits)

03010001AB0E08985388CF804A67E79E
B92BFD95F1937E33AE159642B7E8CE2E
0E443E894B859D03B3D44A5718166E08
FB10C0828283C1E0EBEDB267BC68DA0E
30484210B18BDB70450BAA04C87F6AFF
B365EBFE3DDEE626491FE2A4963095C9
CBBF080FDD8857E1D90907616CD4F603
D80D0DD482507396CC3114DACAA51346
CCBC9E11

2257s (00:37:37)
cybercom.mil IN DNSKEY
flags: SecureEntryPoint, ZoneKey (257)
protocol: 3
algorithm: RSA/SHA-256 (8)
public key:
(2080 bits)

03010001C66D768178FBC584EC3CDDCB
CF2D37C14B3D8686347A734109C4EF85
3304B8F07BA27B59757E23D3A2EA04AE
D31C25E06C67286B151EDFDAEF1B5059
CEBD97ECA49C8F6CC1F4059AF0557BC7
0704BADEE52F0EBF4FFDC285264D4CF1
AA39F9DA163B3352F14BF6AD1D8A5BD0
BCE285AC29914916BE036CE12852530E
7927D82DADF0A733FA840C07703DA3DE
66D46B07F3EA2E569CC95278304C9857
796CF09B01ABA6D005DF5737309AD539
48194B5A396C3B654749C357FA6AC422
E7251F5BBF96295F6BF6845F0178F353
07241E0A6DB61840D2FF441580CF6638
85898954AD8FC3F3B91541BEA8CCFBF6
D6D1E18A7ACBAC2729BA4B58F2740667
45781165

2257s (00:37:37)
cybercom.mil IN RRSIG
type covered: DNSKEY (48)
algorithm: RSA/SHA-256 (8)
labels: 2
original ttl: 86400 (1.00:00:00)
signature expiration: 2016-05-05 04:30:02Z
signature inception: 2016-04-05 04:30:02Z
key tag: 22192
signer’s name: cybercom.mil
signature:
(2048 bits)

9B175C7B9233EB4E89C1CFF0ED40937D
6D375A707F7BB76BCDAE68883EE7E8C8
C72684C4723EF104093C6650EC9472B9
B5B0A7FDD9ED63803AF4D4B48A35F20D
92CD131C2A88E1E4B7E060CF7EA51B17
A8964568DB266A814C5EE4C479940041
6861DBA7B02534BEC9AF649D79BBF0EB
3367578F59C8833D0103978A66B17BC7
05E576E745CB7319D34487B360378834
E8DAD57F88D512A20EEBCC7EE83681C4
6E547F5CF19F1F5652FB197AC8339432
D285FAAB37E00D74FF1F4E512313E23A
16FDD5E4087B515F7BF7200F7C952BD5
BD1952E7A1778B61D2685DF2C8F12A43
83047BC63F2A4A08E73673AC996A7B13
3E7E1B99E7174CD58C543CEC153DE940

2257s (00:37:37)
cybercom.mil IN RRSIG
type covered: DNSKEY (48)
algorithm: RSA/SHA-256 (8)
labels: 2
original ttl: 86400 (1.00:00:00)
signature expiration: 2016-05-05 04:30:02Z
signature inception: 2016-04-05 04:30:02Z
key tag: 32310
signer’s name: cybercom.mil
signature:
(1024 bits)

4692026D79E5521AF536246C36DD4A8D
475B4202215BC06414D09BC0E119A064
DCF92F84447B611A68C07F9DC2377372
BD4B5AAFD1111B1BF68506D46DD19102
D05ABA53559EE14354934AEACE847460
5CCBFC9AB5B414650C5524EDBF924FE8
18A24AC996D37D7E9474712D55D22643
C528E688630B710148008EB789CA87B8

2257s (00:37:37)
235.60.77.131.in-addr.arpa IN PTR ns.cybercom.mil 915s (00:15:15)
77.131.in-addr.arpa IN NS ns1.csd.disa.mil 1150s (00:19:10)
77.131.in-addr.arpa IN NS ns.cybercom.mil 1150s (00:19:10)
77.131.in-addr.arpa IN NS ns.jtfgno.mil 1150s (00:19:10)
Traceroute

Tracing route to ns.cybercom.mil [131.77.60.235]…
hop rtt rtt rtt ip address fully qualified domain name
1 0 0 0 208.101.16.73 49.10.65d0.ip4.static.sl-reverse.com
2 0 0 0 66.228.118.157 ae11.dar02.sr01.dal01.networklayer.com
3 0 0 0 173.192.18.252 ae14.bbr01.eq01.dal03.networklayer.com
4 2 0 0 157.238.224.225 ae-6.r07.dllstx09.us.bb.gin.ntt.net
5 0 0 1 129.250.3.106 ae-2.r08.dllstx09.us.bb.gin.ntt.net
6 * 0 0 129.250.66.78 ae-0.centurylink.dllstx09.us.bb.gin.ntt.net
7 * * *
8 9 9 9 63.158.243.46 63-158-243-46.dia.static.qwest.net
9 * * *
10 * * *
11 * * *
12 * * *

Trace aborted

— end —
Address lookup
canonical name ns3.csd.disa.mil.
aliases
addresses 214.3.125.231
Domain Whois record

Queried with “csd.disa.mil”…

Query error: NoWhoisServerForDomain
Network Whois record

Queried whois.arin.net with “n 214.3.125.231″…

NetRange: 214.0.0.0 – 214.255.255.255
CIDR: 214.0.0.0/8
NetName: DNIC-NET-214
NetHandle: NET-214-0-0-0-1
Parent: ()
NetType: Direct Assignment
OriginAS:
Organization: DoD Network Information Center (DNIC)
RegDate: 1998-03-27
Updated: 2011-06-21
Ref: https://whois.arin.net/rest/net/NET-214-0-0-0-1

OrgName: DoD Network Information Center
OrgId: DNIC
Address: 3990 E. Broad Street
City: Columbus
StateProv: OH
PostalCode: 43218
Country: US
RegDate:
Updated: 2011-08-17
Ref: https://whois.arin.net/rest/org/DNIC
OrgTechHandle: MIL-HSTMST-ARIN
OrgTechName: Network DoD
OrgTechPhone: +1-614-692-6337
OrgTechEmail: disa.columbus.ns.mbx.hostmaster-dod-nic@mail.mil
OrgTechRef: https://whois.arin.net/rest/poc/MIL-HSTMST-ARIN

OrgAbuseHandle: REGIS10-ARIN
OrgAbuseName: Registration
OrgAbusePhone: +1-844-347-2457
OrgAbuseEmail: disa.columbus.ns.mbx.arin-registrations@mail.mil
OrgAbuseRef: https://whois.arin.net/rest/poc/REGIS10-ARIN

OrgTechHandle: REGIS10-ARIN
OrgTechName: Registration
OrgTechPhone: +1-844-347-2457
OrgTechEmail: disa.columbus.ns.mbx.arin-registrations@mail.mil
OrgTechRef: https://whois.arin.net/rest/poc/REGIS10-ARIN

DNS records
name class type data time to live
ns3.csd.disa.mil IN A 214.3.125.231 2075s (00:34:35)
csd.disa.mil IN MX
preference: 10
exchange: montimail.csd.disa.mil
2372s (00:39:32)
csd.disa.mil IN MX
preference: 10
exchange: satximail.csd.disa.mil
2372s (00:39:32)
csd.disa.mil IN SOA
server: ns1.csd.disa.mil
email: root@csd.disa.mil
serial: 2016040600
refresh: 28800
retry: 900
expire: 2592000
minimum ttl: 3600
5612s (01:33:32)
csd.disa.mil IN NS ns.cybercom.mil 2362s (00:39:22)
csd.disa.mil IN NS ns1.csd.disa.mil 2362s (00:39:22)
csd.disa.mil IN NS ns.jtfgno.mil 2362s (00:39:22)
231.125.3.214.in-addr.arpa IN PTR ns.jtfgno.mil 998s (00:16:38)
125.3.214.in-addr.arpa IN NS ns3.csd.disa.mil 998s (00:16:38)
125.3.214.in-addr.arpa IN NS ns2.csd.disa.mil 998s (00:16:38)
125.3.214.in-addr.arpa IN NS ns1.csd.disa.mil 998s (00:16:38)
125.3.214.in-addr.arpa IN NS ns.cybercom.mil 998s (00:16:38)
125.3.214.in-addr.arpa IN NS ns.jtfgno.mil 998s (00:16:38)
Traceroute

Tracing route to ns3.csd.disa.mil [214.3.125.231]…
hop rtt rtt rtt ip address fully qualified domain name
1 1 0 0 208.101.16.73 49.10.65d0.ip4.static.sl-reverse.com
2 0 0 0 66.228.118.157 ae11.dar02.sr01.dal01.networklayer.com
3 1 5 2 173.192.18.252 ae14.bbr01.eq01.dal03.networklayer.com
4 0 0 0 157.238.224.225 ae-6.r07.dllstx09.us.bb.gin.ntt.net
5 0 0 1 129.250.3.106 ae-2.r08.dllstx09.us.bb.gin.ntt.net
6 0 0 0 129.250.66.78 ae-0.centurylink.dllstx09.us.bb.gin.ntt.net
7 * * *
8 39 39 39 208.46.37.38
9 * * *
10 * * *
11 * * *
12 * * *

Trace aborted

— end —
Address lookup
canonical name emvm-gh1-uea08.nsa.gov.
aliases
addresses 8.44.101.8
Domain Whois record

Queried whois.nic.gov with “nsa.gov”…

% DOTGOV WHOIS Server ready
Domain Name: NSA.GOV
Status: ACTIVE

>>> Last update of whois database: 2016-04-06T17:41:30Z <<<
Please be advised that this whois server only contains information pertaining
to the .GOV domain. For information for other domains please use the whois
server at RS.INTERNIC.NET.

Network Whois record

Queried whois.arin.net with “n 8.44.101.8″…

NetRange: 8.0.0.0 – 8.255.255.255
CIDR: 8.0.0.0/8
NetName: LVLT-ORG-8-8
NetHandle: NET-8-0-0-0-1
Parent: ()
NetType: Direct Allocation
OriginAS:
Organization: Level 3 Communications, Inc. (LVLT)
RegDate: 1992-12-01
Updated: 2012-02-24
Ref: https://whois.arin.net/rest/net/NET-8-0-0-0-1

OrgName: Level 3 Communications, Inc.
OrgId: LVLT
Address: 1025 Eldorado Blvd.
City: Broomfield
StateProv: CO
PostalCode: 80021
Country: US
RegDate: 1998-05-22
Updated: 2012-01-30
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Ref: https://whois.arin.net/rest/org/LVLT
OrgTechHandle: IPADD5-ARIN
OrgTechName: ipaddressing
OrgTechPhone: +1-877-453-8353
OrgTechEmail: ipaddressing@level3.com
OrgTechRef: https://whois.arin.net/rest/poc/IPADD5-ARIN

OrgAbuseHandle: APL8-ARIN
OrgAbuseName: Abuse POC LVLT
OrgAbusePhone: +1-877-453-8353
OrgAbuseEmail: security@level3.com
OrgAbuseRef: https://whois.arin.net/rest/poc/APL8-ARIN

OrgNOCHandle: NOCSU27-ARIN
OrgNOCName: NOC Support
OrgNOCPhone: +1-877-453-8353
OrgNOCEmail: noc.coreip@level3.com
OrgNOCRef: https://whois.arin.net/rest/poc/NOCSU27-ARIN

DNS records
name class type data time to live
emvm-gh1-uea08.nsa.gov IN A 8.44.101.8 28800s (08:00:00)
nsa.gov IN MX
preference: 20
exchange: emvm-gh1-uea09.nsa.gov
3600s (01:00:00)
nsa.gov IN MX
preference: 20
exchange: emvm-gh1-uea08.nsa.gov
3600s (01:00:00)
nsa.gov IN NS dsdn-gh1-uea06.nsa.gov 28800s (08:00:00)
nsa.gov IN NS dsdn-gh1-uea05.nsa.gov 28800s (08:00:00)
nsa.gov IN SOA
server: dsdn-gh1-uea05.nsa.gov
email: please_set_email@absolutely.nowhere
serial: 2011061572
refresh: 10800
retry: 3600
expire: 2419200
minimum ttl: 900
28800s (08:00:00)
nsa.gov IN TXT MS=ms94088313 3600s (01:00:00)
nsa.gov IN A 23.196.119.211 28800s (08:00:00)
8.101.44.8.in-addr.arpa IN PTR smtp.nsa.gov 28800s (08:00:00)
8.101.44.8.in-addr.arpa IN PTR emvm-gh1-uea08.nsa.gov 28800s (08:00:00)
101.44.8.in-addr.arpa IN SOA
server: dsdn-gh1-uea.gov
email: please_set_email@absolutely.nowhere
serial: 14
refresh: 10800
retry: 3600
expire: 2419200
minimum ttl: 900
28800s (08:00:00)
101.44.8.in-addr.arpa IN NS dsdn-gh1-uea05.nsa.gov 28800s (08:00:00)
101.44.8.in-addr.arpa IN NS dsdn-gh1-uea06.nsa.gov 28800s (08:00:00)
Traceroute

Tracing route to emvm-gh1-uea08.nsa.gov [8.44.101.8]…
hop rtt rtt rtt ip address fully qualified domain name
1 0 0 0 208.101.16.73 49.10.65d0.ip4.static.sl-reverse.com
2 0 0 0 66.228.118.157 ae11.dar02.sr01.dal01.networklayer.com
3 0 0 0 173.192.18.212 ae6.bbr02.eq01.dal03.networklayer.com
4 0 0 0 4.35.184.45 ae57.edge6.dallas3.level3.net
5 35 36 35 4.69.204.173 ae-1-11.bear1.baltimore1.level3.net
6 35 35 35 4.34.4.74
7 * * *
8 * * *
9 * * *
10 * * *

Trace aborted

— end —
Address lookup
canonical name a23-196-119-211.deploy.static.akamaitechnologies.com.
aliases
addresses 23.196.119.211
Domain Whois record

Queried whois.internic.net with “dom akamaitechnologies.com”…

Domain Name: AKAMAITECHNOLOGIES.COM
Registrar: TUCOWS DOMAINS INC.
Sponsoring Registrar IANA ID: 69
Whois Server: whois.tucows.com
Referral URL: http://www.tucowsdomains.com
Name Server: AX0.AKAMAISTREAM.NET
Name Server: AX1.AKAMAISTREAM.NET
Name Server: AX2.AKAMAISTREAM.NET
Name Server: AX3.AKAMAISTREAM.NET
Name Server: NS2-32.AKAMAISTREAM.NET
Name Server: NS3-32.AKAMAISTREAM.NET
Name Server: NS6-32.AKAMAISTREAM.NET
Name Server: P5.AKAMAISTREAM.NET
Name Server: P6.AKAMAISTREAM.NET
Name Server: P7.AKAMAISTREAM.NET
Name Server: P8.AKAMAISTREAM.NET
Status: clientTransferProhibited https://www.icann.org/epp#clientTransferProhibited
Status: clientUpdateProhibited https://www.icann.org/epp#clientUpdateProhibited
Status: serverDeleteProhibited https://www.icann.org/epp#serverDeleteProhibited
Status: serverTransferProhibited https://www.icann.org/epp#serverTransferProhibited
Status: serverUpdateProhibited https://www.icann.org/epp#serverUpdateProhibited
Updated Date: 24-sep-2013
Creation Date: 18-aug-1998
Expiration Date: 17-aug-2017

>>> Last update of whois database: Wed, 06 Apr 2016 17:32:23 GMT <<<

For more information on Whois status codes, please visit https://icann.org/epp

Queried whois.tucows.com with “akamaitechnologies.com”…

Domain Name: AKAMAITECHNOLOGIES.COM
Registry Domain ID: 2914642_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.tucows.com
Registrar URL: http://tucowsdomains.com
Updated Date: 2013-06-17T15:30:42Z
Creation Date: 1998-08-18T04:00:00Z
Registrar Registration Expiration Date: 2017-08-17T04:00:00Z
Registrar: TUCOWS, INC.
Registrar IANA ID: 69
Registrar Abuse Contact Email: domainabuse@tucows.com
Registrar Abuse Contact Phone: +1.4165350123
Reseller: Akamai Technologies
Domain Status: clientTransferProhibited
Domain Status: clientUpdateProhibited
Domain Status: serverDeleteProhibited
Domain Status: serverTransferProhibited
Domain Status: serverUpdateProhibited
Registry Registrant ID:
Registrant Name: Hostmaster Billing
Registrant Organization: Akamai Technologies, inc.
Registrant Street: 8 Cambridge Center
Registrant City: Cambridge
Registrant State/Province: MA
Registrant Postal Code: 02142
Registrant Country: US
Registrant Phone: +1.6174443000
Registrant Phone Ext:
Registrant Fax: +1.6174443001
Registrant Fax Ext:
Registrant Email: hostmaster-billing@akamai.com
Registry Admin ID:
Admin Name: Hostmaster Billing
Admin Organization: Akamai Technologies, inc.
Admin Street: 8 Cambridge Center
Admin City: Cambridge
Admin State/Province: MA
Admin Postal Code: 02142
Admin Country: US
Admin Phone: +1.6174443000
Admin Phone Ext:
Admin Fax: +1.6174443001
Admin Fax Ext:
Admin Email: hostmaster-billing@akamai.com
Registry Tech ID:
Tech Name: Hostmaster Billing
Tech Organization: Akamai Technologies, inc.
Tech Street: 8 Cambridge Center
Tech City: Cambridge
Tech State/Province: MA
Tech Postal Code: 02142
Tech Country: US
Tech Phone: +1.6174443000
Tech Phone Ext:
Tech Fax: +1.6174443001
Tech Fax Ext:
Tech Email: hostmaster-billing@akamai.com
Name Server: P6.AKAMAISTREAM.NET
Name Server: P7.AKAMAISTREAM.NET
Name Server: P8.AKAMAISTREAM.NET
Name Server: AX0.AKAMAISTREAM.NET
Name Server: NS6-32.AKAMAISTREAM.NET
Name Server: AX2.AKAMAISTREAM.NET
Name Server: AX3.AKAMAISTREAM.NET
Name Server: NS2-32.AKAMAISTREAM.NET
Name Server: NS3-32.AKAMAISTREAM.NET
Name Server: P5.AKAMAISTREAM.NET
Name Server: AX1.AKAMAISTREAM.NET
DNSSEC: unsigned
URL of the ICANN WHOIS Data Problem Reporting System: http://wdprs.internic.net/
>>> Last update of WHOIS database: 2013-06-17T15:30:42Z <<<

Network Whois record

Queried whois.arin.net with “n 23.196.119.211″…

NetRange: 23.192.0.0 – 23.223.255.255
CIDR: 23.192.0.0/11
NetName: AKAMAI
NetHandle: NET-23-192-0-0-1
Parent: NET23 (NET-23-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Akamai Technologies, Inc. (AKAMAI)
RegDate: 2013-07-12
Updated: 2013-08-09
Ref: https://whois.arin.net/rest/net/NET-23-192-0-0-1
OrgName: Akamai Technologies, Inc.
OrgId: AKAMAI
Address: 8 Cambridge Center
City: Cambridge
StateProv: MA
PostalCode: 02142
Country: US
RegDate: 1999-01-21
Updated: 2016-03-10
Ref: https://whois.arin.net/rest/org/AKAMAI
OrgTechHandle: SJS98-ARIN
OrgTechName: Schecter, Steven Jay
OrgTechPhone: +1-617-274-7134
OrgTechEmail: ip-admin@akamai.com
OrgTechRef: https://whois.arin.net/rest/poc/SJS98-ARIN

OrgTechHandle: ZIPKI-ARIN
OrgTechName: Zipkin, Justin
OrgTechPhone: +1-617-444-9713
OrgTechEmail: ip-admin@akamai.com
OrgTechRef: https://whois.arin.net/rest/poc/ZIPKI-ARIN

OrgTechHandle: MHA379-ARIN
OrgTechName: Hannigan, Martin
OrgTechPhone: +1-617-444-2535
OrgTechEmail: ip-admin@akamai.com
OrgTechRef: https://whois.arin.net/rest/poc/MHA379-ARIN

OrgAbuseHandle: MHA379-ARIN
OrgAbuseName: Hannigan, Martin
OrgAbusePhone: +1-617-444-2535
OrgAbuseEmail: ip-admin@akamai.com
OrgAbuseRef: https://whois.arin.net/rest/poc/MHA379-ARIN

DNS records
name class type data time to live
a23-196-119-211.deploy.static.akamaitechnologies.com IN A 23.196.119.211 1800s (00:30:00)
akamaitechnologies.com IN NS ns6-32.akamaistream.net 21600s (06:00:00)
akamaitechnologies.com IN NS ns3-32.akamaistream.net 21600s (06:00:00)
akamaitechnologies.com IN NS ns2-32.akamaistream.net 21600s (06:00:00)
akamaitechnologies.com IN NS ax0.akamaistream.net 21600s (06:00:00)
akamaitechnologies.com IN NS ax1.akamaistream.net 21600s (06:00:00)
akamaitechnologies.com IN NS ax2.akamaistream.net 21600s (06:00:00)
akamaitechnologies.com IN NS ax3.akamaistream.net 21600s (06:00:00)
akamaitechnologies.com IN NS p5.akamaistream.net 21600s (06:00:00)
akamaitechnologies.com IN NS p6.akamaistream.net 21600s (06:00:00)
akamaitechnologies.com IN NS p7.akamaistream.net 21600s (06:00:00)
akamaitechnologies.com IN NS p8.akamaistream.net 21600s (06:00:00)
akamaitechnologies.com IN SOA
server: internal.akamaistream.net
email: hostmaster@akamai.com
serial: 1459965037
refresh: 90000
retry: 90000
expire: 90000
minimum ttl: 180
21600s (06:00:00)
akamaitechnologies.com IN TXT This
is
not
the
nameserver
you
are
looking
for. 21600s (06:00:00)
211.119.196.23.in-addr.arpa IN PTR a23-196-119-211.deploy.static.akamaitechnologies.com 300s (00:05:00)
Traceroute

Tracing route to a23-196-119-211.deploy.static.akamaitechnologies.com [23.196.119.211]…
hop rtt rtt rtt ip address fully qualified domain name
1 0 0 0 208.101.16.73 49.10.65d0.ip4.static.sl-reverse.com
2 0 0 0 66.228.118.157 ae11.dar02.sr01.dal01.networklayer.com
3 0 0 0 173.192.18.252 ae14.bbr01.eq01.dal03.networklayer.com
4 1 0 0 75.149.228.33 be-111-pe03.1950stemmons.tx.ibone.comcast.net
5 3 2 2 68.86.86.129 hu-0-4-0-3-cr02.dallas.tx.ibone.comcast.net
6 20 21 21 68.86.85.21 be-11424-cr02.56marietta.ga.ibone.comcast.net
7 35 33 33 68.86.85.9 be-10114-cr02.ashburn.va.ibone.comcast.net
8 33 33 33 68.86.82.210 he-0-10-0-0-pe04.ashburn.va.ibone.comcast.net
9 32 32 32 173.167.56.158 as20940-1-c.ashburn.va.ibone.comcast.net
10 33 33 33 23.196.119.211 a23-196-119-211.deploy.static.akamaitechnologies.com

Trace complete

— end —
Address lookup
canonical name smtp.nsa.gov.
aliases
addresses 8.44.101.9
8.44.101.8
Domain Whois record

Queried whois.nic.gov with “nsa.gov”…

% DOTGOV WHOIS Server ready
Domain Name: NSA.GOV
Status: ACTIVE

>>> Last update of whois database: 2016-04-06T17:41:30Z <<<
Please be advised that this whois server only contains information pertaining
to the .GOV domain. For information for other domains please use the whois
server at RS.INTERNIC.NET.

Network Whois record

Queried whois.arin.net with “n 8.44.101.9″…

NetRange: 8.0.0.0 – 8.255.255.255
CIDR: 8.0.0.0/8
NetName: LVLT-ORG-8-8
NetHandle: NET-8-0-0-0-1
Parent: ()
NetType: Direct Allocation
OriginAS:
Organization: Level 3 Communications, Inc. (LVLT)
RegDate: 1992-12-01
Updated: 2012-02-24
Ref: https://whois.arin.net/rest/net/NET-8-0-0-0-1

OrgName: Level 3 Communications, Inc.
OrgId: LVLT
Address: 1025 Eldorado Blvd.
City: Broomfield
StateProv: CO
PostalCode: 80021
Country: US
RegDate: 1998-05-22
Updated: 2012-01-30
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Ref: https://whois.arin.net/rest/org/LVLT
OrgTechHandle: IPADD5-ARIN
OrgTechName: ipaddressing
OrgTechPhone: +1-877-453-8353
OrgTechEmail: ipaddressing@level3.com
OrgTechRef: https://whois.arin.net/rest/poc/IPADD5-ARIN

OrgAbuseHandle: APL8-ARIN
OrgAbuseName: Abuse POC LVLT
OrgAbusePhone: +1-877-453-8353
OrgAbuseEmail: security@level3.com
OrgAbuseRef: https://whois.arin.net/rest/poc/APL8-ARIN

OrgNOCHandle: NOCSU27-ARIN
OrgNOCName: NOC Support
OrgNOCPhone: +1-877-453-8353
OrgNOCEmail: noc.coreip@level3.com
OrgNOCRef: https://whois.arin.net/rest/poc/NOCSU27-ARIN

DNS records
name class type data time to live
smtp.nsa.gov IN A 8.44.101.8 28800s (08:00:00)
smtp.nsa.gov IN A 8.44.101.9 28800s (08:00:00)
nsa.gov IN MX
preference: 20
exchange: emvm-gh1-uea09.nsa.gov
3600s (01:00:00)
nsa.gov IN MX
preference: 20
exchange: emvm-gh1-uea08.nsa.gov
3600s (01:00:00)
nsa.gov IN NS dsdn-gh1-uea05.nsa.gov 28800s (08:00:00)
nsa.gov IN NS dsdn-gh1-uea06.nsa.gov 28800s (08:00:00)
nsa.gov IN SOA
server: dsdn-gh1-uea05.nsa.gov
email: please_set_email@absolutely.nowhere
serial: 2011061572
refresh: 10800
retry: 3600
expire: 2419200
minimum ttl: 900
28800s (08:00:00)
nsa.gov IN TXT MS=ms94088313 3600s (01:00:00)
nsa.gov IN A 23.196.119.211 28800s (08:00:00)
9.101.44.8.in-addr.arpa IN PTR emvm-gh1-uea09.nsa.gov 28800s (08:00:00)
9.101.44.8.in-addr.arpa IN PTR smtp.nsa.gov 28800s (08:00:00)
101.44.8.in-addr.arpa IN SOA
server: dsdn-gh1-uea.gov
email: please_set_email@absolutely.nowhere
serial: 14
refresh: 10800
retry: 3600
expire: 2419200
minimum ttl: 900
28800s (08:00:00)
101.44.8.in-addr.arpa IN NS dsdn-gh1-uea05.nsa.gov 28800s (08:00:00)
101.44.8.in-addr.arpa IN NS dsdn-gh1-uea06.nsa.gov 28800s (08:00:00)
Traceroute

Tracing route to smtp.nsa.gov [8.44.101.9]…
hop rtt rtt rtt ip address fully qualified domain name
1 0 0 0 208.101.16.73 49.10.65d0.ip4.static.sl-reverse.com
2 0 0 0 66.228.118.153 ae11.dar01.sr01.dal01.networklayer.com
3 0 0 0 173.192.18.210 ae6.bbr01.eq01.dal03.networklayer.com
4 14 27 13 4.59.32.37
5 35 35 35 4.69.204.173 ae-1-11.bear1.baltimore1.level3.net
6 35 35 35 4.34.4.74
7 * * *
8 * * *
9 * * *
10 * * *

Trace aborted

— end —
Address lookup
canonical name dsdn-gh1-uea06.nsa.gov.
aliases
addresses 8.44.101.6
Domain Whois record

Queried whois.nic.gov with “nsa.gov”…

% DOTGOV WHOIS Server ready
Domain Name: NSA.GOV
Status: ACTIVE

>>> Last update of whois database: 2016-04-06T17:41:30Z <<<
Please be advised that this whois server only contains information pertaining
to the .GOV domain. For information for other domains please use the whois
server at RS.INTERNIC.NET.

Network Whois record

Queried whois.arin.net with “n 8.44.101.6″…

NetRange: 8.0.0.0 – 8.255.255.255
CIDR: 8.0.0.0/8
NetName: LVLT-ORG-8-8
NetHandle: NET-8-0-0-0-1
Parent: ()
NetType: Direct Allocation
OriginAS:
Organization: Level 3 Communications, Inc. (LVLT)
RegDate: 1992-12-01
Updated: 2012-02-24
Ref: https://whois.arin.net/rest/net/NET-8-0-0-0-1

OrgName: Level 3 Communications, Inc.
OrgId: LVLT
Address: 1025 Eldorado Blvd.
City: Broomfield
StateProv: CO
PostalCode: 80021
Country: US
RegDate: 1998-05-22
Updated: 2012-01-30
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Ref: https://whois.arin.net/rest/org/LVLT
OrgTechHandle: IPADD5-ARIN
OrgTechName: ipaddressing
OrgTechPhone: +1-877-453-8353
OrgTechEmail: ipaddressing@level3.com
OrgTechRef: https://whois.arin.net/rest/poc/IPADD5-ARIN

OrgAbuseHandle: APL8-ARIN
OrgAbuseName: Abuse POC LVLT
OrgAbusePhone: +1-877-453-8353
OrgAbuseEmail: security@level3.com
OrgAbuseRef: https://whois.arin.net/rest/poc/APL8-ARIN

OrgNOCHandle: NOCSU27-ARIN
OrgNOCName: NOC Support
OrgNOCPhone: +1-877-453-8353
OrgNOCEmail: noc.coreip@level3.com
OrgNOCRef: https://whois.arin.net/rest/poc/NOCSU27-ARIN

DNS records
name class type data time to live
dsdn-gh1-uea06.nsa.gov IN A 8.44.101.6 28800s (08:00:00)
nsa.gov IN MX
preference: 20
exchange: emvm-gh1-uea08.nsa.gov
3600s (01:00:00)
nsa.gov IN MX
preference: 20
exchange: emvm-gh1-uea09.nsa.gov
3600s (01:00:00)
nsa.gov IN NS dsdn-gh1-uea05.nsa.gov 28800s (08:00:00)
nsa.gov IN NS dsdn-gh1-uea06.nsa.gov 28800s (08:00:00)
nsa.gov IN SOA
server: dsdn-gh1-uea05.nsa.gov
email: please_set_email@absolutely.nowhere
serial: 2011061572
refresh: 10800
retry: 3600
expire: 2419200
minimum ttl: 900
28800s (08:00:00)
nsa.gov IN TXT MS=ms94088313 3600s (01:00:00)
nsa.gov IN A 23.196.119.211 28800s (08:00:00)
6.101.44.8.in-addr.arpa IN PTR dsdn-gh1-uea06.nsa.gov 28800s (08:00:00)
101.44.8.in-addr.arpa IN SOA
server: dsdn-gh1-uea.gov
email: please_set_email@absolutely.nowhere
serial: 14
refresh: 10800
retry: 3600
expire: 2419200
minimum ttl: 900
28800s (08:00:00)
101.44.8.in-addr.arpa IN NS dsdn-gh1-uea05.nsa.gov 28800s (08:00:00)
101.44.8.in-addr.arpa IN NS dsdn-gh1-uea06.nsa.gov 28800s (08:00:00)
Traceroute

Tracing route to dsdn-gh1-uea06.nsa.gov [8.44.101.6]…
hop rtt rtt rtt ip address fully qualified domain name
1 0 0 0 208.101.16.73 49.10.65d0.ip4.static.sl-reverse.com
2 0 0 0 66.228.118.157 ae11.dar02.sr01.dal01.networklayer.com
3 0 0 0 173.192.18.212 ae6.bbr02.eq01.dal03.networklayer.com
4 0 0 0 4.35.184.45 ae57.edge6.dallas3.level3.net
5 35 35 35 4.69.204.173 ae-1-11.bear1.baltimore1.level3.net
6 34 34 34 4.34.4.74
7 * * *
8 * * *
9 * * *
10 * * *

Trace aborted

— end —
Address lookup
canonical name dsdn-gh1-uea05.nsa.gov.
aliases
addresses 8.44.101.5
Domain Whois record

Queried whois.nic.gov with “nsa.gov”…

% DOTGOV WHOIS Server ready
Domain Name: NSA.GOV
Status: ACTIVE

>>> Last update of whois database: 2016-04-06T17:41:30Z <<<
Please be advised that this whois server only contains information pertaining
to the .GOV domain. For information for other domains please use the whois
server at RS.INTERNIC.NET.

Network Whois record

Queried whois.arin.net with “n 8.44.101.5″…

NetRange: 8.0.0.0 – 8.255.255.255
CIDR: 8.0.0.0/8
NetName: LVLT-ORG-8-8
NetHandle: NET-8-0-0-0-1
Parent: ()
NetType: Direct Allocation
OriginAS:
Organization: Level 3 Communications, Inc. (LVLT)
RegDate: 1992-12-01
Updated: 2012-02-24
Ref: https://whois.arin.net/rest/net/NET-8-0-0-0-1

OrgName: Level 3 Communications, Inc.
OrgId: LVLT
Address: 1025 Eldorado Blvd.
City: Broomfield
StateProv: CO
PostalCode: 80021
Country: US
RegDate: 1998-05-22
Updated: 2012-01-30
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Ref: https://whois.arin.net/rest/org/LVLT
OrgTechHandle: IPADD5-ARIN
OrgTechName: ipaddressing
OrgTechPhone: +1-877-453-8353
OrgTechEmail: ipaddressing@level3.com
OrgTechRef: https://whois.arin.net/rest/poc/IPADD5-ARIN

OrgAbuseHandle: APL8-ARIN
OrgAbuseName: Abuse POC LVLT
OrgAbusePhone: +1-877-453-8353
OrgAbuseEmail: security@level3.com
OrgAbuseRef: https://whois.arin.net/rest/poc/APL8-ARIN

OrgNOCHandle: NOCSU27-ARIN
OrgNOCName: NOC Support
OrgNOCPhone: +1-877-453-8353
OrgNOCEmail: noc.coreip@level3.com
OrgNOCRef: https://whois.arin.net/rest/poc/NOCSU27-ARIN

DNS records
name class type data time to live
dsdn-gh1-uea05.nsa.gov IN A 8.44.101.5 28800s (08:00:00)
nsa.gov IN MX
preference: 20
exchange: emvm-gh1-uea08.nsa.gov
3600s (01:00:00)
nsa.gov IN MX
preference: 20
exchange: emvm-gh1-uea09.nsa.gov
3600s (01:00:00)
nsa.gov IN NS dsdn-gh1-uea06.nsa.gov 28800s (08:00:00)
nsa.gov IN NS dsdn-gh1-uea05.nsa.gov 28800s (08:00:00)
nsa.gov IN SOA
server: dsdn-gh1-uea05.nsa.gov
email: please_set_email@absolutely.nowhere
serial: 2011061572
refresh: 10800
retry: 3600
expire: 2419200
minimum ttl: 900
28800s (08:00:00)
nsa.gov IN TXT MS=ms94088313 3600s (01:00:00)
nsa.gov IN A 23.196.119.211 28800s (08:00:00)
5.101.44.8.in-addr.arpa IN PTR dsdn-gh1-uea05.nsa.gov 28800s (08:00:00)
101.44.8.in-addr.arpa IN SOA
server: dsdn-gh1-uea.gov
email: please_set_email@absolutely.nowhere
serial: 14
refresh: 10800
retry: 3600
expire: 2419200
minimum ttl: 900
28800s (08:00:00)
101.44.8.in-addr.arpa IN NS dsdn-gh1-uea05.nsa.gov 28800s (08:00:00)
101.44.8.in-addr.arpa IN NS dsdn-gh1-uea06.nsa.gov 28800s (08:00:00)
Traceroute

Tracing route to dsdn-gh1-uea05.nsa.gov [8.44.101.5]…
hop rtt rtt rtt ip address fully qualified domain name
1 0 0 0 208.101.16.73 49.10.65d0.ip4.static.sl-reverse.com
2 0 0 0 66.228.118.157 ae11.dar02.sr01.dal01.networklayer.com
3 0 0 0 173.192.18.212 ae6.bbr02.eq01.dal03.networklayer.com
4 0 0 0 4.35.184.45 ae57.edge6.dallas3.level3.net
5 35 35 35 4.69.204.173 ae-1-11.bear1.baltimore1.level3.net
6 34 34 34 4.34.4.74
7 * * *
8 * * *
9 * * *
10 * * *

Trace aborted

— end –
Address lookup
canonical name emvm-gh1-uea08.nsa.gov.
aliases
addresses 8.44.101.8
Domain Whois record

Queried whois.nic.gov with “nsa.gov”…

% DOTGOV WHOIS Server ready
Domain Name: NSA.GOV
Status: ACTIVE

>>> Last update of whois database: 2016-04-06T17:41:30Z <<<
Please be advised that this whois server only contains information pertaining
to the .GOV domain. For information for other domains please use the whois
server at RS.INTERNIC.NET.

Network Whois record

Queried whois.arin.net with “n 8.44.101.8″…

NetRange: 8.0.0.0 – 8.255.255.255
CIDR: 8.0.0.0/8
NetName: LVLT-ORG-8-8
NetHandle: NET-8-0-0-0-1
Parent: ()
NetType: Direct Allocation
OriginAS:
Organization: Level 3 Communications, Inc. (LVLT)
RegDate: 1992-12-01
Updated: 2012-02-24
Ref: https://whois.arin.net/rest/net/NET-8-0-0-0-1

OrgName: Level 3 Communications, Inc.
OrgId: LVLT
Address: 1025 Eldorado Blvd.
City: Broomfield
StateProv: CO
PostalCode: 80021
Country: US
RegDate: 1998-05-22
Updated: 2012-01-30
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Ref: https://whois.arin.net/rest/org/LVLT
OrgTechHandle: IPADD5-ARIN
OrgTechName: ipaddressing
OrgTechPhone: +1-877-453-8353
OrgTechEmail: ipaddressing@level3.com
OrgTechRef: https://whois.arin.net/rest/poc/IPADD5-ARIN

OrgAbuseHandle: APL8-ARIN
OrgAbuseName: Abuse POC LVLT
OrgAbusePhone: +1-877-453-8353
OrgAbuseEmail: security@level3.com
OrgAbuseRef: https://whois.arin.net/rest/poc/APL8-ARIN

OrgNOCHandle: NOCSU27-ARIN
OrgNOCName: NOC Support
OrgNOCPhone: +1-877-453-8353
OrgNOCEmail: noc.coreip@level3.com
OrgNOCRef: https://whois.arin.net/rest/poc/NOCSU27-ARIN

DNS records
name class type data time to live
emvm-gh1-uea08.nsa.gov IN A 8.44.101.8 28800s (08:00:00)
nsa.gov IN MX
preference: 20
exchange: emvm-gh1-uea09.nsa.gov
3600s (01:00:00)
nsa.gov IN MX
preference: 20
exchange: emvm-gh1-uea08.nsa.gov
3600s (01:00:00)
nsa.gov IN NS dsdn-gh1-uea05.nsa.gov 28800s (08:00:00)
nsa.gov IN NS dsdn-gh1-uea06.nsa.gov 28800s (08:00:00)
nsa.gov IN SOA
server: dsdn-gh1-uea05.nsa.gov
email: please_set_email@absolutely.nowhere
serial: 2011061572
refresh: 10800
retry: 3600
expire: 2419200
minimum ttl: 900
28800s (08:00:00)
nsa.gov IN TXT MS=ms94088313 3600s (01:00:00)
nsa.gov IN A 23.196.119.211 28800s (08:00:00)
8.101.44.8.in-addr.arpa IN PTR smtp.nsa.gov 28800s (08:00:00)
8.101.44.8.in-addr.arpa IN PTR emvm-gh1-uea08.nsa.gov 28800s (08:00:00)
101.44.8.in-addr.arpa IN SOA
server: dsdn-gh1-uea.gov
email: please_set_email@absolutely.nowhere
serial: 14
refresh: 10800
retry: 3600
expire: 2419200
minimum ttl: 900
28800s (08:00:00)
101.44.8.in-addr.arpa IN NS dsdn-gh1-uea06.nsa.gov 28800s (08:00:00)
101.44.8.in-addr.arpa IN NS dsdn-gh1-uea05.nsa.gov 28800s (08:00:00)
Traceroute

Tracing route to emvm-gh1-uea08.nsa.gov [8.44.101.8]…
hop rtt rtt rtt ip address fully qualified domain name
1 0 0 0 208.101.16.73 49.10.65d0.ip4.static.sl-reverse.com
2 0 0 0 66.228.118.157 ae11.dar02.sr01.dal01.networklayer.com
3 0 0 0 173.192.18.212 ae6.bbr02.eq01.dal03.networklayer.com
4 0 0 0 4.35.184.45 ae57.edge6.dallas3.level3.net
5 * * *
6 35 35 35 4.34.4.74
7 * * *
8 * * *
9 * * *
10 * * *

Trace aborted

— end –
Address lookup
canonical name sw1.jtfgno.mil.
aliases
addresses 214.3.124.4
Domain Whois record

Queried with “sw1.jtfgno.mil”…

Query error: NoWhoisServerForDomain
Network Whois record

Queried whois.arin.net with “n 214.3.124.4″…

NetRange: 214.0.0.0 – 214.255.255.255
CIDR: 214.0.0.0/8
NetName: DNIC-NET-214
NetHandle: NET-214-0-0-0-1
Parent: ()
NetType: Direct Assignment
OriginAS:
Organization: DoD Network Information Center (DNIC)
RegDate: 1998-03-27
Updated: 2011-06-21
Ref: https://whois.arin.net/rest/net/NET-214-0-0-0-1

OrgName: DoD Network Information Center
OrgId: DNIC
Address: 3990 E. Broad Street
City: Columbus
StateProv: OH
PostalCode: 43218
Country: US
RegDate:
Updated: 2011-08-17
Ref: https://whois.arin.net/rest/org/DNIC
OrgTechHandle: REGIS10-ARIN
OrgTechName: Registration
OrgTechPhone: +1-844-347-2457
OrgTechEmail: disa.columbus.ns.mbx.arin-registrations@mail.mil
OrgTechRef: https://whois.arin.net/rest/poc/REGIS10-ARIN

OrgAbuseHandle: REGIS10-ARIN
OrgAbuseName: Registration
OrgAbusePhone: +1-844-347-2457
OrgAbuseEmail: disa.columbus.ns.mbx.arin-registrations@mail.mil
OrgAbuseRef: https://whois.arin.net/rest/poc/REGIS10-ARIN

OrgTechHandle: MIL-HSTMST-ARIN
OrgTechName: Network DoD
OrgTechPhone: +1-844-347-2457
OrgTechEmail: disa.columbus.ns.mbx.hostmaster-dod-nic@mail.mil
OrgTechRef: https://whois.arin.net/rest/poc/MIL-HSTMST-ARIN

DNS records
name class type data time to live
sw1.jtfgno.mil IN RRSIG
type covered: A (1)
algorithm: RSA/SHA-256 (8)
labels: 3
original ttl: 86400 (1.00:00:00)
signature expiration: 2016-04-22 13:47:00Z
signature inception: 2016-03-23 13:47:00Z
key tag: 28416
signer’s name: jtfgno.mil
signature:
(1024 bits)

3DD2B84F16014787B2A5AC132C083743
EC8B189722DB88C1D13A1287C88406B5
4922773BFEC1DBC5C9E08AD1B21D13A8
83FFAE37A9961A84E5B2BBA019972885
D254BB80810B5C585B6810A05E256DFB
EEEF6E8080702DA1793760474910C0CB
E4090E8B0F0859AC023CE0B2F71B7FEF
654479FA6E35624E30C25B410DEA3ABB

86399s (23:59:59)
sw1.jtfgno.mil IN A 214.3.124.4 86400s (1.00:00:00)
jtfgno.mil IN RRSIG
type covered: DNSKEY (48)
algorithm: RSA/SHA-256 (8)
labels: 2
original ttl: 86400 (1.00:00:00)
signature expiration: 2016-04-22 13:47:00Z
signature inception: 2016-03-23 13:47:00Z
key tag: 19972
signer’s name: jtfgno.mil
signature:
(2048 bits)

5D51B7DE033897D71CEEAEB0CEA1AD22
B5B07CE2C845BBDFD2E415FE69F054C6
B9B9D177376818BC8A8E2734B41DC83A
749E4DC89C636BB3985E162ED7F690BF
80B05F3F90BC3435A94741D3F3CB8B62
92D37B71C9E46CA2FF228DEF5426DAE5
3D9E139C6DE91D67A437030787D0A079
E274B33E3B6664EFDFC167454B3019CD
A0DE033E53C44E743D6E16F9C71D0AD2
717E377B223EDA71D5BF3FF305CDEBF2
04F015C7D607085D6C0B97D3FE986873
48FAFA618356B3D9997646A95BAEB6E5
E3864C91C5F992E2170BBB43239CE461
6F59813D97C2E276787F2C8F1879E445
CEAC8F012F8D886135949C9F3CC76E9D
DE73147C620831A19290157E4E229D57

85732s (23:48:52)
jtfgno.mil IN RRSIG
type covered: DNSKEY (48)
algorithm: RSA/SHA-256 (8)
labels: 2
original ttl: 86400 (1.00:00:00)
signature expiration: 2016-04-22 13:47:00Z
signature inception: 2016-03-23 13:47:00Z
key tag: 28416
signer’s name: jtfgno.mil
signature:
(1024 bits)

07E2603583735E6A92C679F361AB5959
EE7F687EDFDA97977454D783A5125C76
7555100D7BB435F26343B77D0887EDF2
E9F98D5F59FDA7994F884C0F50F4C747
23798707A8B9503B3A4F7E321933AC79
E220A7C9A378EC6561C806E34AC35478
25DB8951769DEEC70FE93FACAAF8866B
FAD23843E18F1560848E383019C12AA6

85732s (23:48:52)
jtfgno.mil IN DNSKEY
flags: SecureEntryPoint, ZoneKey (257)
protocol: 3
algorithm: RSA/SHA-256 (8)
public key:
(2080 bits)

03010001CCB20ED07865C74814E160B9
09BD9CAF37937351B895354F040E7F57
3200C2CB42C750B1FEA39616E45FC10D
3C7CBB7EA4E1630C40183F1011CEE701
AE65205F8FF71F03600DADC33085DB1B
F938D004992E8E9473C1D95AFA4A8F8E
CF68C35F18EDDE7ADE1CB4C2A713090B
1606726D350DFAA60D4C02C42F3C6CE5
486F8B90C8BB615D3E751C6F272FB749
ECECCCF8F8F4D617EE74776C4123E98A
5192554E2754E8033E7D4D51C09F6922
879068B6CC6F8699E4AEC56D629ECB60
C8FF570275E57953962B0F7B5BA71F8B
969AE360152D5726907EF90C30264417
E48C7DDE345F65D7079FA4EF84A8F346
BFB089284B219247EACBB4C619B0BF57
7C5AFFE1

85732s (23:48:52)
jtfgno.mil IN DNSKEY
flags: ZoneKey (256)
protocol: 3
algorithm: RSA/SHA-256 (8)
public key:
(1056 bits)

030100019D6EB7A7F655F075B8BE21A8
5D31A0E938CFEC3473584F65A9B74729
C8A9D95486F21079A0CEDEB4A5EC3A8A
96EBCB99B1AB05A90816FB1B1FE1F370
31252F3D766AE9A0A48D73B7169BDE63
60B63DF6C0A6B42E83299DE5B1604D13
F419AE04B0D81411890B253DF278B74D
A2B5C707ED7B35BEEC47E43BA524F85E
2DD5C889

85732s (23:48:52)
jtfgno.mil IN RRSIG
type covered: NS (2)
algorithm: RSA/SHA-256 (8)
labels: 2
original ttl: 86400 (1.00:00:00)
signature expiration: 2016-04-22 13:47:00Z
signature inception: 2016-03-23 13:47:00Z
key tag: 28416
signer’s name: jtfgno.mil
signature:
(1024 bits)

11F7FCA32751D47C88DF10A0DAFB6E8C
6C2BBCC8CA09B17196D9F99DD1DDE325
63F7DA6B52A08E3FBBECA7EC6EBB6064
71C8421994D9C2E10FC19A256A6FBFCC
3906CA036BEEB29BE6576562A7A50011
512539E82A3E026C1A7399045EB262D5
EB2549344B7DEE30A0DC24F701622D84
E4A1530BB79BBADDC515AEA8802611B4

85701s (23:48:21)
jtfgno.mil IN NS ns.jtfgno.mil 20874s (05:47:54)
jtfgno.mil IN NS ns.cybercom.mil 20874s (05:47:54)
jtfgno.mil IN NS utindo02.csd.disa.mil 20874s (05:47:54)
jtfgno.mil IN NS ns1.csd.disa.mil 20874s (05:47:54)
4.124.3.214.in-addr.arpa IN PTR sw1.jtfgno.mil 3600s (01:00:00)
124.3.214.in-addr.arpa IN NS ns.jtfgno.mil 3600s (01:00:00)
124.3.214.in-addr.arpa IN NS ns.cybercom.mil 3600s (01:00:00)
124.3.214.in-addr.arpa IN NS ns1.csd.disa.mil 3600s (01:00:00)
124.3.214.in-addr.arpa IN SOA
server: guv10m01.mont.disa.mil
email: mon-cccac@csd.disa.mil
serial: 2015072000
refresh: 3600
retry: 1800
expire: 2592000
minimum ttl: 3600
3600s (01:00:00)
Traceroute

Tracing route to sw1.jtfgno.mil [214.3.124.4]…
hop rtt rtt rtt ip address fully qualified domain name
1 1 0 0 208.101.16.73 49.10.65d0.ip4.static.sl-reverse.com
2 0 0 0 66.228.118.157 ae11.dar02.sr01.dal01.networklayer.com
3 0 0 0 173.192.18.212 ae6.bbr02.eq01.dal03.networklayer.com
4 0 0 0 157.238.224.229 ae-11.r01.dllstx04.us.bb.gin.ntt.net
5 0 0 0 129.250.3.232 ae-5.r08.dllstx09.us.bb.gin.ntt.net
6 0 0 0 129.250.66.78 ae-0.centurylink.dllstx09.us.bb.gin.ntt.net
7 * * *
8 49 39 41 208.46.37.38
9 * * *
10 * * *
11 * * *
12 * * *

Trace aborted

— end —
Address lookup
canonical name utindo02.csd.disa.mil.
aliases
addresses 152.229.110.236
Domain Whois record

Queried with “utindo02.csd.disa.mil”…

Query error: NoWhoisServerForDomain
Network Whois record

Queried whois.arin.net with “n 152.229.110.236″…

NetRange: 152.229.0.0 – 152.229.255.255
CIDR: 152.229.0.0/16
NetName: DISA-CSD-15-1
NetHandle: NET-152-229-0-0-1
Parent: NET152 (NET-152-0-0-0-0)
NetType: Direct Assignment
OriginAS:
Organization: DoD Network Information Center (DNIC)
RegDate: 1991-09-04
Updated: 2009-04-15
Ref: https://whois.arin.net/rest/net/NET-152-229-0-0-1
OrgName: DoD Network Information Center
OrgId: DNIC
Address: 3990 E. Broad Street
City: Columbus
StateProv: OH
PostalCode: 43218
Country: US
RegDate:
Updated: 2011-08-17
Ref: https://whois.arin.net/rest/org/DNIC
OrgTechHandle: REGIS10-ARIN
OrgTechName: Registration
OrgTechPhone: +1-844-347-2457
OrgTechEmail: disa.columbus.ns.mbx.arin-registrations@mail.mil
OrgTechRef: https://whois.arin.net/rest/poc/REGIS10-ARIN

OrgAbuseHandle: REGIS10-ARIN
OrgAbuseName: Registration
OrgAbusePhone: +1-844-347-2457
OrgAbuseEmail: disa.columbus.ns.mbx.arin-registrations@mail.mil
OrgAbuseRef: https://whois.arin.net/rest/poc/REGIS10-ARIN

OrgTechHandle: MIL-HSTMST-ARIN
OrgTechName: Network DoD
OrgTechPhone: +1-614-692-6337
OrgTechEmail: disa.columbus.ns.mbx.hostmaster-dod-nic@mail.mil
OrgTechRef: https://whois.arin.net/rest/poc/MIL-HSTMST-ARIN

DNS records
name class type data time to live
utindo02.csd.disa.mil IN A 152.229.110.236 5580s (01:33:00)
csd.disa.mil IN MX
preference: 10
exchange: satximail.csd.disa.mil
5846s (01:37:26)
csd.disa.mil IN MX
preference: 10
exchange: montimail.csd.disa.mil
5846s (01:37:26)
csd.disa.mil IN NS ns.jtfgno.mil 5846s (01:37:26)
csd.disa.mil IN NS ns1.csd.disa.mil 5846s (01:37:26)
csd.disa.mil IN NS ns.cybercom.mil 5846s (01:37:26)
236.110.229.152.in-addr.arpa IN PTR utindo02.okc.disa.mil 474s (00:07:54)
229.152.in-addr.arpa IN NS ns3.csd.disa.mil 746s (00:12:26)
229.152.in-addr.arpa IN NS ns.jtfgno.mil 746s (00:12:26)
229.152.in-addr.arpa IN NS ns2.csd.disa.mil 746s (00:12:26)
229.152.in-addr.arpa IN NS ns1.csd.disa.mil 746s (00:12:26)
229.152.in-addr.arpa IN NS ns.cybercom.mil 746s (00:12:26)
Traceroute

Tracing route to utindo02.csd.disa.mil [152.229.110.236]…
hop rtt rtt rtt ip address fully qualified domain name
1 0 0 0 208.101.16.73 49.10.65d0.ip4.static.sl-reverse.com
2 1 0 0 66.228.118.157 ae11.dar02.sr01.dal01.networklayer.com
3 0 0 0 173.192.18.252 ae14.bbr01.eq01.dal03.networklayer.com
4 0 0 0 157.238.224.225 ae-6.r07.dllstx09.us.bb.gin.ntt.net
5 0 0 0 129.250.3.106 ae-2.r08.dllstx09.us.bb.gin.ntt.net
6 0 0 0 129.250.66.78 ae-0.centurylink.dllstx09.us.bb.gin.ntt.net
7 * * *
8 9 9 9 63.158.243.46 63-158-243-46.dia.static.qwest.net
9 * * *
10 * * *
11 * * *
12 * * *

Trace aborted

— end —
@@@@@@@@@@@@@@@@@@@
mailnde.nga.mil
214.28.226.110
208.46.37.38
mailarn.nga.mil
164.214.251.1
164.214.0.0 – 164.214.255.255
CIDR: 164.214.0.0/16
208.46.37.38
pri-jeemsg.eemsg.mail.mil
156.112.250.0
156.112.250.3
156.112.250.4
156.112.250.2

156.112.250.1
156.112.0.0 – 156.112.255.255
CIDR: 156.112.0.0/16
63.158.243.46
NSA Ogeden Utah
ns2.csd.disa.mil
131.77.60.235
131.77.0.0 – 131.77.255.255
CIDR: 131.77.0.0/16
63.158.243.46 63-158-243-46.dia.static.qwest.netmontimail.csd.disa.mil
satximail.csd.disa.mil
164.235.72.30
164.227.0.0 – 164.255.255.255
CIDR: 164.228.0.0/14, 164.227.0.0/16, 164.240.0.0/12, 164.232.0.0/13
montimail.csd.disa.mil
164.235.104.30
164.227.0.0 – 164.255.255.255
CIDR: 164.232.0.0/13, 164.228.0.0/14, 164.240.0.0/12, 164.227.0.0/16

164.235.104.30
67.133.228.2
Joint Task Force Group Fusion Centers
ns.jtfgno.mil
214.3.125.231
214.0.0.0 – 214.255.255.255
CIDR: 214.0.0.0/8
208.46.37.38
ns1.csd.disa.mil
152.229.110.235
152.229.0.0 – 152.229.255.255
CIDR: 152.229.0.0/16
63.158.243.46
DECC-OGDEN UTAH
ns.cybercom.mil
131.77.60.235
131.77.0.0 – 131.77.255.255
CIDR: 131.77.0.0/16
63.158.243.46
ns3.csd.disa.mil

214.3.125.231
214.0.0.0 – 214.255.255.255
CIDR: 214.0.0.0/8

214.3.125.231
208.46.37.38
emvm-gh1-uea08.nsa.gov

8.44.101.8
8.0.0.0 – 8.255.255.255
CIDR: 8.0.0.0/8
23.196.119.211
4 0 0 0 4.35.184.45 ae57.edge6.dallas3.level3.net
5 35 36 35 4.69.204.173 ae-1-11.bear1.baltimore1.level3.net
6 35 35 35 4.34.4.74

23.196.119.211
23.192.0.0 – 23.223.255.255
CIDR: 23.192.0.0/11
internal.akamaistream.net
23.196.119.211
dsdn-gh1-uea.gov
smtp.nsa.gov
8.44.101.9
8.44.101.8
8.0.0.0 – 8.255.255.255
CIDR: 8.0.0.0/8emvm-gh1-uea09.nsa.gov

dsdn-gh1-uea06.nsa.gov
8.44.101.6
8.0.0.0 – 8.255.255.255
CIDR: 8.0.0.0/8
23.196.119.211
4.35.184.45 ae57.edge6.dallas3.level3.net
5 35 35 35 4.69.204.173 ae-1-11.bear1.baltimore1.level3.net
6 34 34 34 4.34.4.74
dsdn-gh1-uea05.nsa.gov
8.44.101.5
emvm-gh1-uea08.nsa.gov
8.44.101.8
sw1.jtfgno.mil
214.3.124.4
214.0.0.0 – 214.255.255.255
CIDR: 214.0.0.0/8
214.3.124.4
208.46.37.38
disa.meade.esd.list.es312-ccc-hostmaster@mail.mil
sdns1.csd.disa.mil
sdns2.csd.disa.mil
sdns3.csd.disa.mil
jtfgno.mil
utindo02.csd.disa.mil
152.229.110.236
152.229.0.0 – 152.229.255.255
CIDR: 152.229.0.0/16

Additional Mail servers

Name Server: AX1.AKAMAISTREAM.NET
Name Server: AX2.AKAMAISTREAM.NET
Name Server: AX3.AKAMAISTREAM.NET
Name Server: NS2-32.AKAMAISTREAM.NET
Name Server: NS3-32.AKAMAISTREAM.NET
Name Server: NS6-32.AKAMAISTREAM.NET
Name Server: P5.AKAMAISTREAM.NET
Name Server: P6.AKAMAISTREAM.NET
Name Server: P7.AKAMAISTREAM.NET
Name Server: P8.AKAMAISTREAM.NET

 




Call on Congress to End Mass Surveillance

NSA

NSA

Call on Congress to End Mass Surveillance

https://sendto.mozilla.org/page/content/surveillance-interstitial
https://call.mozilla.org




“NSA, GCHQ using smartphone apps to siphon users’ data”

NSA_GCHQ_using_smarphone_apps_to_siphon_users_data

By Stew Webb

The NSA now can control you through your television, computer, cell phone and telephone line.

They are able to monitor your likes and dislikes and your conversations to get into your minds and make you an assassin if they desire.

The new Utah NSA base is connected to an Alien base from Bluff Dale, Utah to Richfield, Utah run by private contractors who answer to George HW Bush and the Illuminati-Zionists.

“Illuminati: The bloodlines families of the west including the Bush’s, Millman’s and Mizel’s definitely have interaction with beings that I would also call djinn, but who they call demons, or daemon.
The USA and the UK top power brokers behind the scene interact with these beings during very unpleasant rituals and ceremonies. I noted that the countries slotted for invasion and takeover, were always countries who’s central economies were not ‘hooked’ in directly to the global economy. To me, THAT was the determining factor about who was going to be liberated or invaded by those controlling the USA”.
-From US Intel to Stew Webb Federal Whistleblower

“Stew you’re the only person to go after the pinnacle of the Zionist Organized Crime Leonard Millman, your-ex-in-law and Larry Mizel, Millman’s Buffer.”—Gordon Duff Editor Veterans Today May 16, 2013

Published on Jan 27, 2014 Press TV

Newly leaked classified documents have revealed more about the spying activities of the US National Security Agency and its British counterpart, the GCHQ. The latest revelations by whistleblower Edward Snowden show that the NSA and GCHQ have relied on data scooped up from the so-called leaky smartphone applications. according to a document published by The New York Times and The Guardian, the two intelligence agencies have been using applications such as Angry Birds games and Google Maps to collect swaths of personal data about users’ age, daily whereabouts, address books, and much more. It also exposed the fact that the mobile app initiative between the two spy agencies has been up and running since 2007. Previous reports have revealed the extent of the US and British governments’ mobile data collection, which has a global reach.

http://youtu.be/XWWPtyYVAe8

Related articles:

Snowden Revelations nothing new Whistleblowers who reported spying (Veterans Today)

Snowden Revelations nothing new Whistleblowers who reported spying (StewWebb.com)

On Veterans Today:

“NSA, GCHQ using smartphone apps to siphon users’ data”

Stew Webb Federal Whistleblower-Activist

Stew Webb Columnist Veterans Today

Stew Webb working 24/7 for you Donations always welcome

Recall Petitions.com Stew Webb Founder Recall Your Congress and Senate

The Recall Sword Used Against Those that Violate the U.S. Constitution! The Colorado Recalls – Can You Hear Us Now?

American Defense Party




Six Eyes

… by  Preston James

The Snowden disclosures have resulted in a worldwide concern over privacy abuses by intelligence agencies by the public.

Even more concerned are the intel agencies themselves over what they consider huge, perhaps unrepairable breeches in their future ability to gather intelligence using previously unknown secret technologies.

Who gets to decide who can speak...and who cannot?

Who gets to decide who can speak…and who cannot?

A second major intel disclosure originating from Snowden is far more important but has been largely ignored by American Intel Agencies, The US Congress and current American Administration. The second important disclosure by Snowden is the fact that all NSA raw intelligence is immediately and spontaneously transmitted to Israel to their own Intel proprietary contractors, who also just happen to be major intel contractors responsible for running almost all American cell phone billing and Congressional internet and communications too.

Of course, Veterans Today Editors and Authors have been claiming this for quite a while, and have repeatedly warned about use of various organizations like AIPAC, ADL, B’nai B’rith, SPLC and the like as agents of Israeli foreign espionage inside America. Of course all these claims will now more easily gain traction because of Snowden’s disclosures. However if folks dig a bit they will find that Tomas Drake, William Binney, Mark Novitsky and others disclosed this long ago but almost no-one was listening.(1)(2)(3)

 

How interesting that NSA Officials, Senate Intel Committee members and the Major mass media are not screaming this from the rooftops and demanding all intel sharing with Israel be immediately stopped in all forms.

 

In a recent article, Gordon Duff clarified how legitimate businesses vying for contracts can be undermined by use of stolen bidding information gathered by these Israel spy fronts.(4)

 

For many years the American System of International Spying has been referred to as the Five Eyes System, comprised of an intel sharing arrangement between the United States of America, Canada, England, Australia and New Zealand.(5)  This is actually quite incorrect.

 

This System should actually be referred to as the Six Eyes System because Israel is included at complete parity but even more, much, much more. It has manipulated itself into the system controller.  How is this possible? Simply because the NSA transmits ALL raw data they gain from all means digitally directly to Israeli to private Defense Contractors who are actually serving as Israel Intel proprietaries. This makes them the primary players in the system and gives them predominance over all other intel agencies in the system, including American Intel.

 

goyim-born-to-serve-israelThis of course constitutes major successful espionage against America and has seriously harmed actual American National Security, while placing Israel in the “driver’s seat” of World Intel.

 

This allows Israel intel assets plenty of information to blackmail US Supreme Court Justices, Congress-persons, or high USG Officials who want to remain in the closet.

 

It also allows vast private business intellectual property to be stolen, sold and used to make huge and illegitimate profits not otherwise possible.  It provides numerous private foreign companies and nations all sorts of secret classified technology to the highest bidder and numerous trade secrets for gaining competitive business advantages. This has happened many times in the past such as with Israel defense proprietaries selling American weapons technology and nuclear ICBM secrets to the Chinese.

 

Let us call this massive infiltration and hijacking of American Intel by Israeli intel proprietaries for what it is. It is nothing less than major espionage against many American inventors, entrepreneurs, American Corporations and partnerships and all Americans.  But it is also major RICO crime as well as TREASON.  And who are the perps here? It is the American-Israeli dual citizens and their NeoCon assets in high USG positions or associated Policy Boards or Think-Tanks who have sold out America for their loyalty to Israel.

 

It is a disgusting reality that many legitimate American businesses who struggle everyday to obtain success have been seriously damages and even put out of business.  This has been done to them when their trade secrets and bidding proposals are stolen by NSA, directly transmitted to Israel proprietaries where they are stolen and then given to fraudulent competitors.

 

These fraudulent Israeli Intel fronts masquerading at legitimate defense contractors have become hugely profitable and expanded in scope even to the point of being monopolies in certain businesses.

 

The Controlled major Mass Media (CMMM) is owned and/or controlled by zionist assets and truly serves as a USG propaganda dispenser.  Don’t ever expect any real truth to be reported by the CMMM. It occasionally mentions peripheral facts but always adds a bad payload on to them to deliver misinformation, psyops or mind-kontrol.

So the only way mass concern can be elicited in the American Mass Mind is through the Alternative Media on the Internet and communication to others by word of mouth.  Now is the time to start speaking up to friends and associates about this reality that American Intel has been completely penetrated and hijacked by Israeli contractors who bamboozled and bought off disloyal, compromised American Congress-persons, and DOD and Pentagon Officials.

This fact must be brought to everyone’s attention and  US Congress-persons must be publicly shamed for their Treasonous betrayal to America.

 

_________________________________

 

criticizeIf these Congress-persons believe that they are innocent of Treason and have been tricked by Israeli Intel disguised as legitimate defense contractors, well then, they can act quickly to make it right.

 

And this would mean quickly classifying all organizations such as AIPAC, ADL, B’nai B’rith, SPLC and the like as agents of foreign espionage.

 

It would also require with anyone linked to Israeli Intel proprietaries of the NSA as ILLEGAL. And then, it would be appropriate to start major prosecutions against any American-Israeli dual citizen, NeoCons, asset or Sayanim involved for Espionage, Treason, and violations of intellectual property as well as Criminal Rico.

 

Obviously this Israeli foreign espionage inside America and the COMPLETE HIJACKING of the NSA, and all other American Intel is the gravest offense ever committed against America.  It is only equaled by their leading part in the 9/11 attacks(6). Obviously the Israeli access to all NSA Intel gave zionists a complete upper hand in managing and running the 9/11 attacks.

 

It also provided the means to compromise and blackmail all American intel and USG officials who were not on board into compliance.

 

YouTube – Veterans Today –

 

It is now up to all good Americans to make their fellow Americans aware of this and get this stopped as soon as possible. And as many Europeans are just learning, this same International Intel System hijacked by Israeli intel assets is also directly and deeply




New NSA Revelations

NSA

by Stephen Lendman

NSA is one of 16 known US spy agencies. They’re all up to no good. They violate core rule of law principles.

They do whatever they want. They operate out-of-control. They’re powers unto themselves. NSA reflects Big Brother writ large.

It operate globally. It’s the world’s biggest spy agency. It watches everyone. Advanced technology lets it go where no previous counterpart went before.

Privacy no longer exists. Congress ignores its lawlessness. Oversight is absent. NSA takes full advantage.

Two Washington Post articles revealed more. They’re based on documents Edward Snowden provided. Expect lots more disclosures ahead.

On October 14, WaPo headlined “NSA collects millions of e-mail address books globally.” Many belong to Americans.

“The collection program (hasn’t) been disclosed before.” Intercepts include email address books and so-called buddy lists.

They’re from online instant messaging and/or cell phone text displays. They’re lists people want to keep track of.

They show who’s online or off, on but away from their computer, people with their phones on or off, and who’s currently using them.

NSA collects contact lists in large numbers. They amount to a sizable portion of email/instant messaging accounts.

Data analysis lets NSA “search for hidden connections.” It permits mapping relationships “within a much smaller universe of foreign intelligence targets,” said WaPo

In one day last year, “NSA’s Special Source Operations branch collected 444,743 e-mail address books from Yahoo, 105,068 from Hotmail, 82,857 from Facebook, 33,697 from Gmail and 22,881 from unspecified other providers.”

These figures are typical. They repeat daily. They add up. They “correspond to a rate of more than 250 million a year.” .

NSA has access to about 500,000 buddy lists as well as huge numbers of web-based email accounts.

A previous article called NSA spying worse than you think. Rules followed are its own.

It can monitor virtually everyone everywhere electronically. Doing so is unconnected to terrorism or other national security concerns.

Big Brother has lots of other Brothers watching. They’re making a list. They’re checking it twice. They know who’s naughty or nice.

They read your emails. They know what web sites you visit. They know your medical and financial history.

They know the company you keep. They watch every move you make. They know what you do, where and when.

They know when you’re sleeping. They know when you’re awake. They know when you’re bad or good. They know secretly. They know intrusively.

They know because they can go where no previous spy agencies went before. They exceed their capabilities.

Perhaps one day they’ll be able to anticipate things before they happen. Maybe they’ll be able to read minds.

“(S)ecret arrangements with foreign governments or allied intelligence services” controlling online traffic permits collecting buddy lists and emails, said WaPo.

Millions of Americans are affected. NSA won’t say how many. Perhaps its tens of millions. NSA can target virtually everyone everywhere.

DNI spokesman Shawn Turner lied saying it’s “focused on discovering and developing intelligence about valid foreign intelligence targets like terrorists, human traffickers and drug smugglers.”

“We are not interested in personal information about ordinary Americans.”

False! It targets you, me, our neighbors, families and friends.

NSA collects virtually all telecommunication records. They gotten under a separate program. Director Keith Alexander defends the practice.

He lied calling it an essential counterterrorism/foreign intelligence tool, saying:

“You need a haystack to find the needle.” He finds virtually none. So-called terror plots exposed were fake. Domestic ones virtually don’t exist. What’s claimed is fabricated.

It’s done for political advantage. It generates fear. It justifies lawless NSA operations.

Online call lists provide “far richer sources of data than call records alone,” said WaPo.

Address books include email addresses, phone numbers, street locations, as well as business and personal information.

Combined they let NSA “draw detailed maps of a person’s life.” Doing so creates false impressions.

NSA isn’t authorized to collect bulk contact lists. According to senior intelligence officials, doing so from US facilities is illegal.

NSA does what it wants anyway. It accesses information globally. When obtained from overseas, it assumes “you’re not a US person,” it claims.

Global sweeps target everyone. Americans are as vulnerable as foreigners. So-called “checks and balances built into (its) tools” don’t exist or aren’t used.

NSA claims authorization under the Patriot Act’s Section 215. It oversteps. It’s unconstitutional.

It permits warrantless searches without probable cause. It violates First Amendment rights.

It does so by mandating secrecy. It prohibits targeted subjects from telling others what’s happening to them. It compromises free expression, assembly and association.

It does so by authorizing the FBI to investigate anyone based on what they say, write, or do with regard to groups they belong to or associate with.

It violates Fourth and Fifth Amendment protections by not telling targeted subjects their privacy was compromised.

It subverts fundamental freedoms for contrived, exaggerated, or nonexistent security reasons. Doing so turns constitutional rights on their head.

Separately WaPo headlined “Documents reveal NSA’s extensive involvement in targeted killing program.”

NSA claims it “focuse(s) on discovering and developing intelligence about valid foreign intelligence targets.”

It does so, it says, to “protect the nation and its interests from threats such as terrorism and the proliferation of weapons of mass destruction.”

Drone warfare makes more enemies than friends. Most deaths are innocent men, women and children. Few are so-called high-value targets.

In search for them, NSA “draped a surveillance blanket over dozens of square miles of northwest Pakistan,” said WaPo.

Anything electronic can be tracked. NSA’s secret Counterterrorism Mission Aligned Cell (CT MAC) is involved in doing it.

It focuses on hard-to-find terrorism targets. Considerable time and effort goes into doing it.

NSA’s Alexander claims his mission is “noble.” He lied again saying:

“Our job is to defend this nation and to protect our civil liberties and privacy.”

He’s way over-the-top out-of-control. He defends imperial lawlessness. He destroys civil liberties and privacy in the process.

Records indicate NSA “depends heavily on highly targeted network penetrations to gather information that wouldn’t otherwise be trapped in surveillance nets that it has set at key Internet gateways,” said WaPo.

It assigned senior analysts to the CIA’s Counterterrorism Center. Others work alongside CIA counterparts. They do so at almost all major US embassy and overseas military bases.

According to a former US intelligence official:

It “you wanted huge coverage of the FATA (Federally Administered Tribal Areas), NSA had 10 times the manpower, 20 times the budget, and 100 times the brainpower.”

He compared NSA with CIA’s Information Operations Center (IOC).

“NSA relies on increasingly sophisticated versions of online attacks that are well-known among security experts.”

“Many rely on software implants developed by the agency’s Tailored Access Operations division with code-names such as UNITEDRAKE and VALIDATOR.”

Other methods are used. NSA obtains vast amounts of information. Its Tailored Access Operations division extends way beyond Pakistan.

It targets Yemen, African and other locations. Murder, Inc. is official Obama administration policy. US citizens are as vulnerable as foreigners.

Death squads operate in 120 or more countries. CIA agents are everywhere. They’re licensed to kill. NSA secretly tracks suspects.

Summary judgment means no arrests. No Miranda rights. No due process. No trial. Just death by diktat.

Obama appointed himself judge, jury and executioner. He decides who lives or dies. CIA chief John Brennan helps him choose.

With or without evidence, anyone called Al Qaeda or accused of terrorist connections gets marked for death.

NSA’s job is find them. CIA’s job is kill them. Only eliminating America’s enemies matter. Whether real or imagined makes no difference.

Everyone is fair game. Right or wrong is someone else’s problem. Advancing America’s imperium alone matters.

A Final Comment

Click on link below to read rest of report:

http://www.veteranstoday.com/2013/10/20/new-nsa-revelations/

Whistleblowers US Intel Breaking News
http://www.stewwebb.com
Stew Webb Veterans Today
http://www.veteranstoday.com/author/swebb/
The match is HOT and NOW is the time to strike!
http://www.stewwebb.com/2013/09/15/the-match-is-hot-and-now-is-the-time-to-strike/
Stew Webb Founder
Recall Your Congress and Senate
http://www.recallpetitions.com
The Recall Sword Used Against Those that Violate the U.S. Constitution!
The Colorado Recalls – Can You Hear Us Now?
http://www.veteranstoday.com/2013/09/12/the-recall-sword-used-against-those-that-violate-the-u-s-constitution/

 




Carnegie Mellon University Beats the NSA

Carnegie_Mellon_Beats_the_NSA

…by Jonas E. Alexis

While the NSA has been snooping on Americans and much of the Western world, and while Google says that it will include your face in its advertisements next month,[1] Carnegie Mellon University has been producing what seems to be an alternative to those Zionist night prowlers.

“Carnegie Mellon University researchers claim they have created a smart-phone messaging app with security that not even the National Security Agency can break.

“The app is called SafeSlinger, and is free on the iTunes store, and Google play store for Android phones.

“In a press release from CMU’s CyLab, programmer Michael W. Farb said, ‘the most important feature is that SafeSlinger provides secure messaging and file transfer without trusting the phone company or any device other than my own smart-phone.’”[2]

If the project happens to be a success, it will certainly mean that the NSA and other Zionist outlets and technological devices, though powerful and ubiquitous, can be challenged. SaefeSlinger intends to restore balance where balance ought to be:

“Users regularly experience a crisis of confidence on the Internet. Is that email truly originating from the claimed individual? Is that Facebook invitation indeed from that person or is it a fake page set up by an impersonator? These doubts are usually resolved through a leap of faith, expressing the desperation of users.”[3]

When all the NSA lies are finally crumbling, most specifically the colossal lie that the NSA actually thwarted numerous terrorist plots,[4] an alternative certainly was needed, and Carnegie Mellon University, at least in this case, begins to implant the idea that an alternative to the NSA is not only possible but plausible.

If CMU can challenge the NSA within a short amount of time, surely other universities and institutions can get involved.

Where are the intellectual children of the West? The West certainly can use those fearless men at this critical time, particularly when the court itself has already given the NSA the go-ahead to continue to spy on Americans,[5] and particularly when Skype is currently under investigation for passing data to government agencies.[6]

SHUTDOWN THE NSA? I’M WITH YOU ON THAT ONE!

NSA stoogesThe West has not abandoned reason completely, and even when the Zionist mob still wants to invade Syria, the vast majority of people in the West do not want an invasion.[7] (The neoconservatives, in order to propound more lies, summon the idea that Syria’s chemical weapons were a threat to America.[8] America!)

NSA director Keith Alexander has recently intoned, “Shutdown Snowden? I’m with you on that one.”[9]

The intellectual children of the West should provide a parody of this statement: “Shutdown the neo-Bolshevik/Zionist/neoconservative/Mephistophelian machine? We are all with you on that one. Shutdown ‘born-again neocon’ Obama’s covert war on the Constitution?[10] We are all with you on that one.”

Certainly all Americans need to wake up. Senator Ron Wyden of Oregon recently declared that the NSA has “damaged the U.S. economy so badly that Americans ‘should be in the streets with pitchforks.”[11]  For the next three years, the NSA industry could cost about $35 billion.[12] All that money will come from the tax payers, not from the oligarchs and corporate greed like Goldman Sachs.

Wyden continues to say that “If a foreign enemy was doing this much to the economy,” people would be upset to the point that they will demand that the NSA be shut down.[13]

9/11 AND THE NSA

The Brennan Center for Justice at New York University School of Law has recently put out a study declaring that 9/11 was the linchpin for the government to snoop on virtually every American.[14]

If men of the West would actually concentrate on that study and move on to bravely reveal that Israeli spies were actually accomplices in the 9/11 attack,[15] the Zionist business would be in big trouble.  We know for example that the NSA is largely an Israeli cell. In other words, the 9/11 attack gave the Israelis a political platform to snoop on all Americans.

Moreover, if men of the West can just stop the media propaganda for just one year and get to work, the Zionist machine would be out of business in just a few months.

Because the Zionist empire is based on colossal lies and fabrications, it doesn’t take a genius to deconstruct it and politically expose it to the entire world. All it takes now is a fearless politician (more precisely a president) who will care less about the consequences of exposing the Zionist empire.

Obama has already nominated Janet Yellen as chairman of the Board of Governors of the Federal Reserve. Who is she? Well, you guessed it: she has become part of the long line of Jewish bloodline that has come to dominate the Federal Reserve; she has become part of what Patrick Willis would have called “the specter of the dreadful few.”[16] She has replaced Ben Shalom Bernanke. Neoconservative magazines such as Commentaryhave already given her great accolades.[17]

THINGS FALL APART BECAUSE MEN ARE COWARD

Let me just say in passing that men of the West simply have no choice but to get involved in this ideological war. If they think that they will be spared when the Zionist machine controls everything, they need to think again. Perhaps a few lines from The Lord of the Rings will help here:

TREEBEARD: The ents cannot hold back this war. We must weather such things as we have always done.

MERRY: How can that be your decision?

TREEBEARD: This is not our war.

MERRY: But you’re part of this world! Aren’t you? You must help. You must do something.

TREEBEARD: You are young and brave, master Merry. But your part in this tale is over. Go back to your home.

PIPPIN: Maybe Treebeard’s right. We don’t belong here, Merry. It’s too big for us. What can we do in the end? We’ve got the Shire. Maybe we should go home.

MERRY: The fires of Isengard will spread. And the woods of Tuckborough and Buckland will burn. And… and all that was once green and good in this world will be gone. There won’t be a Shire, Pippin.

The Zionist fires have already been spreading all across America, the Middle East, and much of the Western world. If good and decent men just stand there and watch as if the fires will not affect them, they are again underestimating the ideological strength of Zionism. They do not realize that Zionism wants to seal their doom and unleash the hounds of hell across much of the world, if you’ll pardon the language.

Slowly but surely there seems to be a small voice throughout the West that indicates that the power of Benjamin Netanyahu is slowly waning, despite the fact that he continues to use the same old lies.

The Jewish Daily Forward has recently declared that “Benjamin Netanyahu’s warning on Iran falls flat.”[18] The New York Times has said that Netanyahu took “a lonely stance denouncing Iran.”[19] Iran, indeed, continues to be a crook in the Zionist’s throat because Iran demands rational dialogue.[20]

In other words, the world is slowly waking up from their “dogmatic slumber,” to use Emmanuel Kant’s words. When Netanyahu is saying meow, we can ignore him because he has political lies but not political teeth.

KING BIBI VS. THE IRANIAN PEOPLE

jerryNetanyahu got caught with his pants down when he said that if Iranians were really free, they would be wearing blue jeans and listening to Western music.[21] The New York Times itselfresponded by saying, “The problem is that Iranians do wear jeans and manage to listen to whatever music they want to listen to, just like people almost anywhere, except maybe in North Korea.”[22]

One Iranian responded, “Netanyahu, here are my #Jeans and #Western music.”[23] Another Iranian later tweeted, “Netanyahu, three days ago I bought a pair of jeans.”[24]

But let us suppose that Netanyahu is true. Let us follow his logic to its own “logical” conclusion. According to his argument, Rabbis in Israel aren’t free because they do not wear blue jeans and listen to Western music.

But let us leave that aside for the moment and examine what Netanyahu seems to have suggested here.

As we have obliquely noted in the last article, the current music industry is largely Jewish and Masonic.[25]People like Jay-Z and his “all the single ladies” wife are covert members of the illuminati club, which is largely Crowleyan in tradition,[26] which is Masonic in nature,[27] and which is Jewish or Qabalistic in ideology.[28]

Aleister Crowley himself was a member of the Ordo Templi Orientis (O.T.O.), which “drew heavily on fraternal lodge practice, borrowing fraternal (especially Masonic) methods as a basic vocabulary of ceremonial working.”[29]

Crowley ended up influencing L. Ron Hubbard,[30] who established The Church of Scientology, and the Church of Scientology ends ups having a lasting effect on celebrities of various stripes: Tom Cruise, Juliette Lewis, John Travolta, Priscilla Presley, Kirstie Alley, Erika Christensen, Jennifer Elfman, and countless others.[31]

By Western music, Netanyahu surely does not mean the classical Western tradition, which includes people like Bach, Handel, Hayden, Tchaikovsky, Rachmaninoff, Beethoven, Schubert, Dvorak, Liszt, etc.

Those men developed highly intellectual and highly orderly music, which in turn produced a culture that was conducive to the moral order. Even prior to the birth of Christ, music was used in Asian countries such as China as a vehicle to produce harmony and cultural docility and civility.[32]

Rihanna

Rihanna

An appeal to both the intellect and reason has always been a central theme in developing classical music. As Bach himself put it, “The end of all music should be the glory of God and the refreshment of the human spirit.”

Moreover, classical composers were largely Christian or were working within a Christian framework or culture. Take for example Richard Wagner, who previously produced disorganized and confusing music such as Tristan and Isolde.

But as soon as this “cranky and desperate decadent suddenly fell helpless and broken on his knees before the Christian cross,” to use Friedrich Nietzsche’s words,[33] Wagner’s music began to take a radical turn, and Wagner began to produce something radically different. This was the breaking point between Nietzsche and Wagner, and Nietzsche eventually hated Wagner for prostrating before the cross.[34]

Moreover, surely Netanyahu is not oblivious to the fact that Iran has also produced classical composers such as Ali Rahbari, Aminollha Hossein, Anoushiravan Rohani, Behzad Ranjbaran, Fereidoun Farzaneh, Hormoz Farhat, among others.

dionysosIn a nutshell, what Netanyahu indirectly ends up saying is that Iranians will be free if they start listening to Rihanna, Miley Cyrus, Lady Gaga, Madonna, KISS, Black Sabbath, Jimi Hendrix, Led Zeppelin, The Beatles, Jay-Z, Beyonce, Kanye West, Mariah Carey—people who have already given their allegiance to the Masonic and Crowleyan ideology that has come to dominate much of the music industry.

Netanyahu is not that stupid. Surely he knows the ideological consequences when a culture indulges itself in nihilistic, subversive and dysfunctional music. And surely he knows very well that music has been used as a form of subversion in the twentieth century.[35] It was Jewish revolutionary Vladimir Lenin who declared that “One quick way to destroy a society is through its music.”[36]

It was Jewish revolutionaries such as Jerry Rubin who ended up playing an influential role in the counter-culture revolution. It was Rubin himself who penned the book Do It!: Scenarios of the Revolution, which became a sort of Bible for many. Rubin, co-founder of the Yippie movement and who called kids to leave their homes and burned down schools, declared in psychoanalytic terms:

“The new left sprang from Elvis’ gyrating pelvis…Hard animal rock energy beat surged hot through us, the driving rhythm arousing repressed passions…Affluent culture, by producing a car and a car radio for every middle-class home, gave Elvis a base for recruiting.

“While a car radio in the front seat rocked…young kids in the back seat were (having sex) to the hard rock beat. The back seat produced the sexual revolution, and the car radio was the medium for subversion.”[37]

Rubin probably knew what happened in the Soviet Union. By the 1920s, the Marxists-Leninists in Russia knew pretty well that the arts, particularly music, could be used as a form of subversion.[38] Jewish scholar Theodore Levin himself notes that

“Soviet policies aimed to recast popular culture and peasant culture no less than the fine arts, and these policies were implemented not only throughout the vast territory of Russia itself, but in every republic and region of the Soviet empire.”[39]

It was Scottish writer Andrew Fletcher (1655-1716) who wrote that

“If a man were permitted to make all the ballads, he need not care who should make the laws of a nation. And we find that most of the ancient legislators thought they could not well reform the manners of any city without the help of a lyrick, and sometimes of a dramatick poet.”[40]

By mentioning “city,” Fletcher probably had ancient Greece in mind, where Plato and Aristotle talk about the same issue. Plato himself said in Laws that

“Through foolishness they deceived themselves into thinking that there was no right or wrong in music — that it was to be judged good or bad by the pleasure it gave . As it was, the criterion was not music but a spirit of law-breaking.”

Plato also suggested that the improper music has the potential to create dissonance, which “corrupted everything…”[41]

The study between the relationship of music and the state continues. Neuroscientist Richard Pellegrino noted back in 1999:

“Many songs that ring up large sales not only produce endorphin highs but relate so well to listeners’ emotional lives that people create strong and long-lasting associations between those songs and other events and people in their lives. The songs become anchors. They trigger a flood of emotions and images: some from experience, some from daydreams.

“These images have the ability to instantaneously produce very powerful changes in emotional states… Take it from a brain guy. In 20 years of research, I still cannot affect a person’s state of mind the way that one single song can.”[42]

In a nutshell, Netanyahu, like his Jewish predecessors who sought to destroy cultural harmony in places like Russia, would like to subvert the Iranian culture. Once the culture is seduced by Jewish ideology, then Iranians, like many Americans, would be blind to recognize the actual enemy.

AMERICA UNDER SIEGE

FeinsteinZionism has already tried to take away the rights of every citizen to bear arms, a right that is ingrained in the Constitution.  Fear has certainly got the best of men of the West. It is fear that keeps the West from reporting the crimes committed by the Jewish state. For example, on October 8th,

“Masked Jewish settlers burst into a school Wednesday, vandalizing cars and torching olive trees during a rampage that forced schoolchildren to remain locked in classrooms to keep safe… The settlers smashed the windshields of several cars outside, and then lit a fire that burned through a nearby olive grove…”[43]

How is that possible without a universal outcry? Well, “Israelis believe Jews should be privileged, [and] non-Jews should not decide major issues.”[44] Moreover, “One-third of Israeli support wartime concentration camps for Palestinian citizens.”[45]

After all, didn’t Ovadia Yosef declare that “all these evil people [Palestinians] should perish from this world”?[46]  

In response to the passing of Yosef, New York mayoral candidate Bill de Blasio twitted, “Millions of people around the world lost a leader today in Rabbi Chacham Ovadia Yosef. His wisdom, charity and sensitivity were legendary.”[47]

De Blasio could not tell us what those “wisdom, charity and sensitivity” actually were. Maybe he was referring to the following wisdom from the mouth of the great Rabbi himself:

“Goyim (gentiles, non-Jews) were born only to serve us [Jews]. Without that, they have no place in the world – only to serve the People of Israel. Why are gentiles needed? They will work, they will plow, they will reap. We will sit like an effendi and eat. That is why gentiles were created.”[48]

This is not hate, but if you stop to ban circumcision in Europe, that is hate and anti-Semitic.[49] Recently, Lair Lapid told Charlie Rose that “about 3 million Palestinians is problematic to the Jewish identity of Israel, and I want to live in a Jewish state…”[50]

The Arabs, Lapid continued, is an existential threat in Israel, “And we have to make sure that everyone will be participants in the Israeli game… So yes the internal threats are more threatening to me than the external.”

Instead of chastising Yosef for his obvious bigotry, Benjamin Netanyahu sent a message to England declaring that Iran must stop calling for the destruction of Israel![51]

Yosef’s thesis only makes sense within the framework of Talmudic reasoning. But if George Bernard Shaw is right, that indifference is the essence of inhumanity,[52] then the Zionist movement cannot go unchallenged and unchecked.

Unless the Zionists are dethroned from their political power, they will continue to create chaos in much of the world. Consider for example the rebels/terrorists. Human Rights Watch has recently detailed the many atrocities produced by those rebels. Those atrocities include “executions, indiscriminate shootings, and hostage,” and the killing of civilians, which led to carnage against Alawite villagers.[53] The rebels slaughtered at least 190 civilians in that region last August.[54]

But what is an Israeli double agent such as Isabel kershner of the New York Times to do? Here’s the title of her recent article: “Israeli Man Fatally Bludgeoned in West Bank.”[55] The Jerusalem Post reported the same thing.[56]

One Israeli man will certainly make it to the New York Times, but 190 civilians cannot. If one Israeli man dies, the Western world has to know that. But if 6,000 civilians lost their lives in Iraq in the past 10 months alone,[57] the public just needs to be blinded by watching Lady Gaga being literally prostituted on stage.

WHOM DO YOU SERVE?

Click on link below to read full report:

http://www.veteranstoday.com/2013/10/13/carnegie-mellon-university-beats-the-nsa/

Whistleblowers US Intel Breaking News
http://www.stewwebb.com
Stew Webb Veterans Today
http://www.veteranstoday.com/author/swebb/
The match is HOT and NOW is the time to strike!
http://www.stewwebb.com/2013/09/15/the-match-is-hot-and-now-is-the-time-to-strike/
Stew Webb Founder
Recall Your Congress and Senate
http://www.recallpetitions.com
The Recall Sword Used Against Those that Violate the U.S. Constitution!
The Colorado Recalls – Can You Hear Us Now?
http://www.veteranstoday.com/2013/09/12/the-recall-sword-used-against-those-that-violate-the-u-s-constitution/




US Al Qaeda Founders/Controllers Exposed

US Ties to Al Qaeda Official

Former al-Qaeda ringleader Osama bin Laden
Reputed former al-Qaeda ringleader Osama bin Laden

By Gordon Duff and Press TV

Al-Qaeda was established under the authority of President Reagan on March 27, 1985, with National Security Directive 166. This established a broad cover organization that could engage in arms and financial transactions otherwise prohibited by US law.”

High-level sources inside America’s intelligence community are totally flabbergasted by recent administration policies, particularly regarding Syria. The consensus is that the Obama administration is operating “totally blind” and doesn’t care.

Top policy advisors opposed to the new Russian-Iranian alliance, on advice from Israel, are shifting America’s position in Syria’s now “three-sided” foreign-backed insurgency.

Israeli Ambassador to Washington Michael Oren, acting as de facto White House spokesman, explains why the Obama administration has now abandoned its support of moderate forces for those of al-Qaeda.

From the Jerusalem Post:

“’Tehran-Damascus-Beirut arc is the greatest danger,’ says outgoing Israeli envoy to US Michael Oren.

’Bad guys’ backed by Iran are worse for Israel than ‘bad guys’ who are not supported by the Islamic Republic … the initial message about the Syrian issue was that we always wanted [President] Bashar Assad to go, we always preferred the bad guys who weren’t backed by Iran to the bad guys who were backed by Iran,’ he said.

This was the case, he said, even if the other ‘bad guys’ were affiliated to al-Qaida.”

The fact is al-Qaeda militants are actively wiping out moderate rebel factions fighting the Assad regime, now clearly with Israeli backing. That means another “arc” exists: Tel Aviv, al-Qaeda and the globalist cabal of neocons, Zionists and financial criminals.

Assisting them every step of the way is the controlled corporate media and the governments they have bought and blackmailed.

Wikipedia claims al-Qaeda was founded by Osama bin Laden while in Peshawar, Pakistan during the late 1980s. This is an outrageous fiction.

Al-Qaeda was established under the authority of President Reagan on March 27, 1985, with National Security Directive 166. This established a broad cover organization that could engage in arms and financial transactions otherwise prohibited by US law.

It was never intended as a vehicle for false-flag terrorism. That would come later. It was a cover operation meant to allow clandestine operations that required a high degree of deniability.

Al-Qaeda is an organization totally under the control of the intelligence agencies of the US, Israel, Britain and France. The real foundation of al-Qaeda and its oversight, its very real hierarchy, is outlined below.

A similar organization had been formed to deal with the danger of Soviet expansionism in Europe. It was called “Gladio.” Eventually, Gladio became a very real terror organization, operating in Europe for over a decade.

Chosen to head that what we now call “Al Qaeda” was Osama bin Laden or “Colonel Tim Osman,” as he was known.

Bin Laden worked directly with White House national security advisors and the Central Intelligence Agency. From his headquarters in Islamabad and Peshawar, bin Laden coordinated American activities in Afghanistan and across the Islamic world.

In August 1989, bin Laden met with White House intelligence advisor Lee Wanta and CIA station Chief Jimmie Chee to arrange the repatriation of the last 116 Stinger missiles in inventory in Pakistan.

Details and transcripts of that meeting are available, a meeting held in English.

In early 1990, bin Laden, suffering from advanced kidney disease, was flown to an American facility in the Persian Gulf.

From there, bin Laden flew to Los Angeles, landing in the Ontario airport, met by Albert Hakim, representing President Bush (41), Ollie North (free on appeal bond), Admiral William Dickie, attorney Glenn Peglau and General Jack Singlaub, one of the founders of the CIA.

Hakim was the personal representative of President Bush and in overall charge of the project. “Bud” McFarlane, an Iran-Contra figure pardoned by President Bush in 1992, was also a part of the group.

Bin Laden then left Los Angeles for Washington DC. There he stayed in the Mayflower Hotel. Meetings were held at the Metropolitan Club in Washington. Attorney Glenn Peglau stayed at the Metropolitan.

While there, Peglau’s room was broken into and “items” removed.

At no point is there record, classified or public, that this “working group” was ever dissolved nor is there any record that Osama bin Laden’s status as a security operative working for the US government ever ended.

In 2001, Osama bin Laden’s last public statement denied any involvement in the 9/11 attacks. There are no classified documents tying bin Laden to 9/11 or citing him to be a “rogue CIA operative.”

The CIA’s “bin Laden Unit” and the “hunt for bin Laden” are as fictional as “Zero Dark 30,” the Oscar winning fairy tale outlining the alleged murder of one of America’s most important intelligence assets, a man who died in 2001.

Today, Ambassador Michael Oren, in his last public statement, has admitted Israel’s full and continued relationship with al-Qaeda and the White House working group that helped found that organization so many years ago.

The paragraphs above contain more classified intelligence of a higher level than ever before released.

“False Flag”

With the acceptance of the “false flag” mantra by the powerful Tea Party wing of the opposition party, tapping in on broad public distrust of decades of government lies, the Obama administration has chosen unilateralism, not just as a global policy, but at home as well.

Now that the genie is out of the bottle and “false flag terrorism” is recognized as something other than “conspiracy theory,” the door is open for broad reassessment of a number of nagging issues, particularly 9/11, but much more as well, including the well-orchestrated financial disaster that has destroyed the economic well-being of millions of American families.

Advisors have told Obama he needs something to unite Americans and distract them from an awakening that will destroy all confidence in American leaders, rigged elections, phony terror wars and a scam economy.

Yesterday’s inexplicable incident at the Navy Yard in Washington, 13 dead, no motive, vanished suspects and conflicting accounts, will only add to the loss of credibility.

Military Backlash

They are making America the “laughing stock” of the world, something top military leaders are frightened by. “America is burning down its credibility, humiliating allies.”

This week, while talking with a senior army intelligence officer, I was told the following:

“We reviewed the CIA report they gave Congress and the president. It was pure “amateur hour.”

What else can you expect from a pack of drug dealers?

This is right out of the Bush era, using NSA intercepts to create traffic analysis patterns and simply inventing a hypothesis to fit a policy.

We have long known that “traffic analysis” intelligence is worthless, Israel is the world’s expert at creating phony radio traffic and they are in this up to their eyeballs.”

What Obama’s team is doing has been done before, filtering out any information that doesn’t fit and spinning the rest to support what is clearly America’s “last gasp” in the Middle East.

The reports contained no mention of six rebels indicted in Turkey for buying ten tons of chemicals to make sarin gas and no mention of earlier arrests with sarin-filled canisters.

Whatever Washington is telling the public, a public totally opposed to a war in Syria, it is now dedicated to regime change, the policy Israel announced today.

Intelligence meltdown

It is quite possible that the last well-informed American was former Vice President Dick Cheney. His years in Washington gave him direct access to real information. Cheney knew who the fools and liars were, President Obama and his top advisors certainly don’t.

The problem with Cheney wasn’t that he was stupid, far from that, it was his agenda, a life dedicated to serving totalitarian powers, a life dedicated to chaos and conquest.

It has become increasingly clear that Cheney was president, not Bush. History has shown Bush to be little more than a rich boy on an ego trip, an untreated alcoholic and addict, dangerously impetuous, with no grasp of policy, no intellectual capacity and the attention span of a gnat.

His role as a 21st century Napoleonesque figurehead will be his enduring legacy.

Now, America’s “ship of state” seems headed back in that same direction, all evidence of course correction erased while America plans for a Syrian invasion, building another “coalition of the willing.” Has President Obama chosen to take his own “road to Waterloo?”

Syria

Those close to the president have advised him to do everything possible to undermine talks with Russia over Syria. The agenda is clear. Syria is to have a regime change, even at risk of World War.

Obama’s advisors tell him Putin will back down as Russia’s program to rebuild its military into a credible conventional deterrent in the Middle East is a decade from realization.

Obama is being told this is the time for a confrontation with Russia and Syria is his opportunity; otherwise, America’s influence in the region is over. What he is not being told and what his intelligence reports have had carefully excised from them is the regional reality that General Martin Dempsey, the Chairman of the Joint Chiefs of Staff, had been trying to convey for months.

America has been manipulated into taking on a position in Syria that will lead to a full-scale civil war, one that will make the hundred thousand casualties of the last two years seem insignificant in comparison.

The original goal was Balkanization with Turkey seizing Northern Syria, Israel expanding to the suburbs of Damascus and al-Qaeda setting up a jihadist state extending into Iraq as a base for taking down the Baghdad government.

In the process, the Christian population of Syria and Iraq/Kurdistan will be slaughtered.

Lebanon would be isolated and destroyed as well with Israel exacting revenge on Hezbollah for their humiliation in 2000 and 2006.

Sea of Lies

Click on link below to read full report:

http://www.veteranstoday.com/2013/09/20/us-al-qaeda-founderscontrollers-exposed/

Stew Webb Federal Whistleblower-Activist
http://www.stewwebb.com
Stew Webb Columnist Veterans Today
http://www.veteranstoday.com/author/swebb/
Stew Webb working 24/7 for you
Donations always welcome
The match is HOT and NOW is the time to strike!
http://www.stewwebb.com/2013/09/15/the-match-is-hot-and-now-is-the-time-to-strike/
http://www.stewwebb.com
Stew Webb Founder
Recall Your Congress and Senate
http://www.recallpetitions.com
The Recall Sword Used Against Those that Violate the U.S. Constitution!
The Colorado Recalls – Can You Hear Us Now?
http://www.veteranstoday.com/2013/09/12/the-recall-sword-used-against-those-that-violate-the-u-s-constitution/

 




Whos Dat? If you think you can hide in a crowd, think again!

Whos Dat? If you think you can hide in a crowd, think again!

National_Seccurity_Agency

 

 

 

 

 

 

 

 

 

 

 

This picture was taken with a 70,000 x 30,000 pixel camera (2100 MegaPixels.) These cameras are not sold to the public and are being installed in strategic locations. It can identify a face in a multitude of people. Place the cursor in the mass of people and double-click a couple times (or ‘finger-spread’ on a device.) Scary sharp. Click on the image below and scroll in to see the Scary Part. They Know, It includes Face Recognition! This camera is not yet available in

http://www.gigapixel.com/mobile/?id=79995

http://www.wikiarmy.com/index.php/8-news/15-whos-dat-if-you-think-you-can-hide-in-a-crowd-think-again

US Intel breaking news:
http://www.stewwebb.com
Stew Webb Veterans Today
http://www.veteranstoday.com/author/swebb
Stew Webb YouTube Channel
http://www.youtube.com/stewwebb1
Stew Webb Founder:
You did not Vote them in but you can remove them!
http://www.recallpetitions.com
Now you can leak it
http://www.wikiarmy.com
Whistleblowers depend upon you for survival
Donations are much appreciated thank you
http://www.stewwebb.com

 




The NSA spying in the USA: OK or NAY, You Decide!

The NSA spying in the USA: OK or NAY, You Decide!

The_NSA_Spying

THE HISTORY BEHIND THE 4TH AMENDMENT

 

In modern society, it is easy to forget where many of our freedoms come from.  It is also dangerous to turn a blind eye to history.  Civilizations, military commanders, and leaders of nations have ignored history with devastating results.

Because the 4th Amendment is so vitally important to America, it deserves a look into the history behind its inception into the Constitution. The 4th Amendment to the United States Constitution was added as part of the Bill of Rights on December 15, 1791. It deals with protecting people from the searching of their homes and private property without properly executed search warrants. The 4th Amendment specifically provides:

“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.”

 

The Founders believed that freedom from government intrusion into one’s home was a natural right (one granted from God) and fundamental to liberty.  The idea that citizens should be protected from unreasonable searches and seizures goes back far into English history.  In 1604, Sir Edward Coke first identified this right.  He said that “The house of everyone is to him as his castle and fortress, as well for his defense against injury and violence as for his repose.”

During the Colonial era, the King of England looked at the American colonies as simply a financial investment.  Britain passed numerous revenue collection bills aimed at generating as much money from the colonists as possible.  Obviously, the colonists resented this act by the King and began smuggling operations in order to circumvent the custom taxes imposed by the British Crown.

In response, King George began the use of the conveniently worded “writs of assistance.”  These were legal search warrants that were extremely broad and general in scope.  British agents could obtain a writ of assistance to search any property they believed might contain contraband goods.  They could actually enter someone’s property or home with no notice and without any reason.  Agents could interrogate anyone about their use of customed goods and force cooperation of any person.  These types of searches and seizures became an egregious affront to the people of the colonies.

These actions by the British Crown would be one the precipitating factors leading to the American Revolution and the eventual forming of our Constitution.

When the 4th Amendment became part of the Constitution, it was originally only applied to the federal government.  Later, it was applied to the states through the Due Process Clause of the 14th Amendment.

Looking back at the reasoning behind liberties in cultures helps to preserve freedoms.  It is only when we become disinterested or even indifferent to our Founders that we take a dangerous path toward civilizational decline.  We cannot forget why Americans enjoy legal rights like the 4thAmendment.

Super Spook:

http://www.wikiarmy.com/index.php/8-news/12-the-nsa-and-your-rights

Whistleblowers US Intel Breaking News

Now on Computers, Mobile and Tablets

http://www.stewwebb.com

http://www.veteranstoday.com/author/swebb

Stew Webb Founder:

You did not Vote them in but you can remove them!

http://www.recallpetitions.com

Now you can leak it

http://www.wikiarmy.com

July 2013 Fund Raiser

https://fundrazr.com/campaigns/fXc61

Also contribute through

http://www.stewwebb.com

 








Obama-admits-US-trains-ISIS-july-2015-stewwebb

HildaBeast-StewWebb
Stew Webb Whistle blower Grand Jury Demand against Hillary Clinton "Still Active" Where is the Justice Department, having Lesbo Demonic Sex with Hillary Clinton?

Stew Webb Radio Network

stewwebbradionetwork-com-2015-09-24
Stew Webb 32 Years a Federal Whistleblower
Stew Webb served in the United States Marine Corps and was Honorable Discharge. Stew was a General Contractor-Home Builder until 3 car crashes in one year and is now disabled. Stew turned Federal Whistleblower-Activist of 31 years and has been a guest on over 3,000 Radio and TV Programs since September 18, 1991 and now has his own Radio and TV Network http://www.stewwebbradionetwork.com Stew was responsible for the Congressional Investigations and hearings that lead to the Appointment of Independent Prosecutor Arlin Adams in the 1989 HUD Hearings, the Silverado Savings and Loan Hearings, the Denver International Airport Frauds hearings, the MDC Holdings, Inc. (MDC-NYSE) Illegal Political Campaign Money Laundering Colorado’s biggest case aka Keating 5 hearings and the information provided that lead to the 2008 Illegal Bank Bailout.
Stew was held as a Political Prisoner from 1992-1993 to silence his exposure by Leonard Millman his former in law with illegal charges of threatening harassing telephone calls charges which were dismissed with prejudice. Leonard Millman, George HW Bush, George W Bush, Jeb Bush, Neil Bush, Bill Clinton, Hillary Clinton, Larry Mizel, Phil Winn, Norman Brownstein, John McCain and Mitt Romney to name a few are all partners in what is known as the Bush-Millman-Clinton Organized Crime Syndicate. Leonard Millman (Deceased 2004) was member of the "Illuminati Council of 13".

You can Mute the Audio

AudioNow

StewWebb-RadioNetwork-Store
Stew Webb Radio Network Store

Stew Webb Breaking News

Breaking News

Contributions are much appreciated

The below picture of the attempted murder of Stew Webb October 25, 2010 by two of Hillary Clinton's Assassins. There were two more crashed and attempts one year later.
Contributions are much appreciated Thank You.-- Stew Webb





Archives

U.S. President Donald Trump


Donald J. Trump's Website

Donald Trump Full Speeches

Donald Trump Presidential Announcement Full Speech 6/16/15

TEXT TRUMP TO 88022 TO GET EXCLUSIVE UPDATES
***By participating, you consent to receiving automated text messages from the campaign. Standard messaging rates apply.***

To donate, go here: https://secure.donaldjtrump.com/donate/
Contributions are not tax deductible for federal income tax purposes.

P.S. If you would like to purchase official campaign gear, click here.

#NoHildaBeast #NoHildadike #NoHillaryClintonChildRapist

Gun_Dog
Spot Dog is on the loose he loves to eat Illuminati, Zionist, Satanists and Lying Media Political Whores.
flagususmcflag france_flag


Stew Webb Whistle blower Grand Jury Demand Still Active against Hillary Clinton aka "HildaBeast". Where is the Justice Department having Lesbo Demonic Sex with Hillary Clinton?
Obama-admits-US-trains-ISIS-july-2015-stewwebb
Hillary Clinton aka "HildaBeast"
 

Is this what we want for a President?Is this what we want for a President?
Posted by Donald J. Trump on Wednesday, March 16, 2016

 
Hillary Clinton above Barking Like A Female Dog now Spot Dog wants to have hot sex with Hildabeast and HikdaDikes Lesbo Lover Huma Abedine we told the Spot dog his private part will fall off because HildaBeast is a Walking STD
Gun_Dog

Hillary-Clinton-Child-Rapist
Hillary Clinton Child Rapist
Hillarys-America
Hillary's America The Movie

Buggles - Video killed the radio star
george_bush_dance