Home » Liberty » CIA Dirty Cyber Tricks?

Olduvai
Click on image to purchase

Olduvai III: Catacylsm
Click on image to purchase

Post categories

Olduvai
Click on image to purchase

Olduvai II: Exodus
Click on image to purchase

Olduvai
Click on image to purchase

Olduvai II: Exodus
Click on image to purchase

Olduvai
Click on image to purchase

Olduvai II: Exodus
Click on image to purchase

Olduvai
Click on image to purchase

Olduvai II: Exodus
Click on image to purchase

Olduvai
Click on image to purchase

Olduvai II: Exodus
Click on image to purchase

Olduvai III: Cataclysm
Click on image to purchase

CIA Dirty Cyber Tricks?

CIA DIRTY CYBER TRICKS?

The Central Intelligence Agency now can mimic foreign intelligence agencies’ hack attacks by leaving electronic “fingerprints” creating the false impression of a foreign intrusion into computer networks, according to claims accompanying a new WikiLeaks document dump.

In other words, there may not be hard evidence that CIA operatives, say, used cyberspace to create a modern-day Reichstag fire to undermine the Trump administration, but it may be the case that the CIA has the technological capabilities to do such a thing, if it were so inclined.

VIDEORaw: Sen. Majority Leader Meets Trump’s CIA Pick
This assertion that the CIA can hack computer networks and leave behind convincing evidence that somebody else did it, comes with the release by WikiLeaks of a huge collection of documents – 8,761 items in all – collectively dubbed the “Vault 7” leaks that purport to describe espionage techniques used by the CIA. The Vault 7 collection is said to have come from a former U.S. government hacker or contractor associated with “an isolated, high-security network” within the CIA’s Center for Cyber Intelligence in Langley, Va. The files made public don’t include the actual cyber weapons themselves which WikiLeaks says it will not release for the time being.

This documentary agglomeration covers “the entire hacking capacity of the CIA,” Julian Assange’s WikiLeaks claimed in a press release, and it is only the first in a series of what he calls the “Year Zero” leaks.

The Year Zero label has a decidedly sinister quality to it and may offer clues into what WikiLeaks hopes to accomplish with these new leaks, apparently the most significant and damaging to the U.S. intelligence community since former NSA contractor Edward Snowden handed over thousands of classified U.S. documents to journalists in 2013.

…click on the above link to read the rest of the article…

Olduvai II: Exodus
Click on image to purchase

Olduvai
Click on image to purchase

Olduvai II: Exodus
Click on image to purchase

Olduvai III: Cataclysm
Click on image to purchase