Home » Posts tagged 'wikileaks' (Page 12)

Tag Archives: wikileaks

Olduvai
Click on image to purchase

Olduvai III: Catacylsm
Click on image to purchase

Post categories

Post Archives by Category

The U.S. Intelligence Community’s Emphasis on Offensive Capabilities is Dangerous, Idiotic and Authoritarian

The U.S. Intelligence Community’s Emphasis on Offensive Capabilities is Dangerous, Idiotic and Authoritarian

Earlier today, Edward Snowden posted the following tweet calling attention to a very important article published at Reuters.


Huge: USG confirms cyber offense funded at 9x rate of defense. Wonder why we can’t stop foreign hacks? This is why. http://www.reuters.com/article/us-usa-cyber-defense-idUSKBN17013U 

Reuters reports:

When WikiLeaks founder Julian Assange disclosed earlier this month that his anti-secrecy group had obtained CIA tools for hacking into technology products made by U.S. companies, security engineers at Cisco Systems swung into action.

That a major U.S. company had to rely on WikiLeaks to learn about security problems well-known to U.S. intelligence agencies underscores concerns expressed by dozens of current and former U.S. intelligence and security officials about the government’s approach to cybersecurity.

That policy overwhelmingly emphasizes offensive cyber-security capabilities over defensive measures, these people told Reuters, even as an increasing number of U.S. organizations have been hit by hacks attributed to foreign governments.

…click on the above link to read the rest of the article…

WikiLeaks Reveals “Marble”: Proof CIA Disguises Their Hacks As Russian, Chinese, Arabic…

WikiLeaks Reveals “Marble”: Proof CIA Disguises Their Hacks As Russian, Chinese, Arabic…

WikiLeaks’ latest Vault 7 release contains a batch of documents, named ‘Marble’, which detail CIA hacking tactics and how they can misdirect forensic investigators from attributing viruses, trojans and hacking attacks to their agency by inserted code fragments in foreign languages.  The tool was in use as recently as 2016.  Per the WikiLeaks release:

“The source code shows that Marble has test examples not just in English but also in Chinese, Russian, Korean, Arabic and Farsi. This would permit a forensic attribution double game, for example by pretending that the spoken language of the malware creator was not American English, but Chinese, but then showing attempts to conceal the use of Chinese, drawing forensic investigators even more strongly to the wrong conclusion, — but there are other possibilities, such as hiding fake error messages.”


RELEASE: CIA Vault 7 part 3 “Marble” https://wikileaks.org/vault7/?marble#Marble%20Framework 

We’ve Created A Monster – Ron Paul Says It’s “Fantastic” That WikiLeaks Exposed The CIA

We’ve Created A Monster – Ron Paul Says It’s “Fantastic” That WikiLeaks Exposed The CIA

Ron Paul, the prominent libertarian communicator and three-time US presidential candidate, declared this week in a Fox Business interview that it is “fantastic” that WikiLeaks revealed on Tuesday thousands of US Central Intelligence Agency (CIA) documents and files. 

Speaking with host Kennedy, Paul further says that the information exposed “indicates that liberty is in big trouble” and states his concern about there having been insufficient media coverage of the information and outlines the potential dangers related to technology…

Paul’s discussion raises the very crucial question “do we live in a police state?” As AntiWar’s Justin Raimondo warnsthe latest wikileaks revelations tell us the answer is ‘Yes’.

WikiLeaks and Julian Assange would have gone down in history as the greatest enemies of government oppression of all kinds in any case, but their latest release – a comprehensive exposé of the US intelligence community’s cyberwar tools and techniques – is truly the capstone of their career. And given that this release – dubbed “Vault 7” – amounts to just one percent of the documents they intend to publish, one can only look forward to the coming days with a mixture of joyful anticipation and ominous fear.

Fear because the power of the Deep State is even more forbidding – and seemingly invincible – than anyone knew. Joyful anticipation because, for the first time, it is dawning on the most unlikely people that we are, for all intents and purposes, living in a police state. I was struck by this while watching Sean Hannity’s show last [Wednesday] night – yes, Fox is my go-to news channel – and listening to both Hannity and his guests, including the ultra-conservative Laura Ingraham, inveigh against the “Deep State.”

…click on the above link to read the rest of the article…

Fresh Doubts about Russian ‘Hacking’

Fresh Doubts about Russian ‘Hacking’


WikiLeaks’ disclosure of documents revealing CIA cyber-spying capabilities underscores why much more skepticism should have been applied to the U.S. intelligence community’s allegations about Russia “hacking” last year’s American presidential election. It turns out that the CIA maintains a library of foreign malware that could be used to pin the blame for a “hack” on another intelligence service.

WikiLeaks founder Julian Assange at a media conference in Copenhagen, Denmark. (Photo credit: New Media Days / Peter Erichsen)

That revelation emerged from documents that WikiLeaks published on Tuesday from a CIA archive that WikiLeaks said had apparently been passed around within a community of former U.S. government hackers and contractors before one of them gave WikiLeaks some of the material.

The documents revealed that the CIA can capture the content of encrypted Internet and cell-phone messages by grabbing the material in the fraction of a second before the words are put through encryption.

Another program called “Weeping Angel” can hack Samsung “smart” TVs with built-in Internet connections, allowing the CIA and British intelligence to covertly use the TVs as listening devices even when they appear to be turned off.

Besides the 1984-ish aspects of these reported capabilities – Orwell’s dystopia also envisioned TVs being used to spy on people in their homes – the WikiLeaks’ disclosures add a new layer of mystery to whether the Russians were behind the “hacks” of the Democratic Party or whether Moscow was framed.

…click on the above link to read the rest of the article…

 

Wikileaks Blows the Doors off of Silicon Valley

Wikileaks

Wikileaks has published Vault 7 which contained thousands of documents. Wikileaks now says the CIA has hacked into Apple and Android smartphones, Windows computers and Samsung smart TVs. Looking over all the documents, they seem to now describe how the CIA can spy by exploiting security flaws to access text and voice messages EVEN before they’re encrypted. The question is really when will this stop? There are some who say they have nothing to hide. Everyone does because tax evasion is a CRIMINAL ACT. That means not paying taxes on anything or overstating deductions is at least justification for a warrant if they really played by the rules. But there are no rules. There is no supervision. They simply want to be able to check on anyone, anywhere, at anytime, just to see if there is something interesting.

CIA Dirty Cyber Tricks?

CIA DIRTY CYBER TRICKS?

The Central Intelligence Agency now can mimic foreign intelligence agencies’ hack attacks by leaving electronic “fingerprints” creating the false impression of a foreign intrusion into computer networks, according to claims accompanying a new WikiLeaks document dump.

In other words, there may not be hard evidence that CIA operatives, say, used cyberspace to create a modern-day Reichstag fire to undermine the Trump administration, but it may be the case that the CIA has the technological capabilities to do such a thing, if it were so inclined.

VIDEORaw: Sen. Majority Leader Meets Trump’s CIA Pick
This assertion that the CIA can hack computer networks and leave behind convincing evidence that somebody else did it, comes with the release by WikiLeaks of a huge collection of documents – 8,761 items in all – collectively dubbed the “Vault 7” leaks that purport to describe espionage techniques used by the CIA. The Vault 7 collection is said to have come from a former U.S. government hacker or contractor associated with “an isolated, high-security network” within the CIA’s Center for Cyber Intelligence in Langley, Va. The files made public don’t include the actual cyber weapons themselves which WikiLeaks says it will not release for the time being.

This documentary agglomeration covers “the entire hacking capacity of the CIA,” Julian Assange’s WikiLeaks claimed in a press release, and it is only the first in a series of what he calls the “Year Zero” leaks.

The Year Zero label has a decidedly sinister quality to it and may offer clues into what WikiLeaks hopes to accomplish with these new leaks, apparently the most significant and damaging to the U.S. intelligence community since former NSA contractor Edward Snowden handed over thousands of classified U.S. documents to journalists in 2013.

…click on the above link to read the rest of the article…

Germany’s Chief Prosecutor To Start Probe Into Wikileaks-Exposed Frankfurt Cyber-Spy Hub

Germany’s Chief Prosecutor To Start Probe Into Wikileaks-Exposed Frankfurt Cyber-Spy Hub

The Germans are once again angry at the Americans over spying. Just a few years after Obama’s infamous apology for hacking Merkel’s phone, Germany’s chief federal prosecutor announced plans to carefully examine documents from Wikileaks (related to a secret CIA cyber-spy hub in Frankfurt), and will launch an investigation if it sees concrete indications of wrongdoing.

As VOA News reports, a spokesman for the German Foreign Ministry on Wednesday said Berlin was in close touch with Washington about the documents, which Wikileaks said showed that the CIA used the U.S. consulate in Frankfurt as a major remote hacking base.

“We will initiate an investigation if we see evidence of concrete criminal acts or specific perpetrators,” a spokesman for the federal prosecutor’s office told Reuters. 

“We’re looking at it very carefully.”

He said Germany needed to verify the authenticity of the documents, which, as DW.com reports, purportedly revealed that a top secret CIA unit used the German city of Frankfurt am Main as the starting point for numerous hacking attacks on Europe, China and the Middle East.

WikiLeaks reported that the group developed trojans and other malicious software in the American Consulate General Office, the largest US consulate in the world. The programs focused on targets in Europe, the Middle East and Africa.

 The documents revealed that CIA experts worked in the building under cover and included advice for life in Germany.

“Do not leave anything electronic or sensitive unattended in your room,” it told employees, also advising them to enjoy Lufthansa’s free alcohol “in moderation.”

The Frankfurt hackers, part of the Center for Cyber Intelligence Europe, were said to be given diplomatic passports and a State Department identity. It instructed employees how to safely enter Germany. A WikiLeaks tweet published an section of the Frankfurt information.

…click on the above link to read the rest of the article…

Wikileaks Unveils ‘Vault 7’: “The Largest Ever Publication Of Confidential CIA Documents”; Another Snowden Emerges

Wikileaks Unveils ‘Vault 7’: “The Largest Ever Publication Of Confidential CIA Documents”; Another Snowden Emerges

WikiLeaks has published what it claims is the largest ever release of confidential documents on the CIA. It includes more than 8,000 documents as part of ‘Vault 7’, a series of leaks on the agency, which have allegedly emerged from the CIA’s Center For Cyber Intelligence in Langley, and which can be seen on the org chart below, which Wikileaks also released:

total of 8,761 documents have been published as part of ‘Year Zero’, the first in a series of leaks the whistleblower organization has dubbed ‘Vault 7.’ WikiLeaks said that ‘Year Zero’ revealed details of the CIA’s “global covert hacking program,” including “weaponized exploits” used against company products including “Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.”

WikiLeaks tweeted the leak, which it claims came from a network inside the CIA’s Center for Cyber Intelligence in Langley, Virginia.

Among the more notable disclosures which, if confirmed, “would rock the technology world“, the CIA had managed to bypass encryption on popular phone and messaging services such as Signal, WhatsApp and Telegram. According to the statement from WikiLeaks, government hackers can penetrate Android phones and collect “audio and message traffic before encryption is applied.”

Another profound revelation is that the CIA can engage in “false flag” cyberattacks which portray Russia as the assailant. Discussing the CIA’s Remote Devices Branch’s UMBRAGE group, Wikileaks’ source notes that it “collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.

“With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from. UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.”

…click on the above link to read the rest of the article…

How Globalists Predict Your Behavior

How Globalists Predict Your Behavior

The globalists seem to have an overarching obsession with data collection. As we have seen with revelations from multiple government whistle-blowers, the establishment spends most of its time, energy and manpower collecting information not just on known threats to their supremacy, but information on EVERYONE through FISA-based surveillance protocols. This is because the establishment sees every individual as a potential threat.

Thus, the system, without warrant, is programmed to collate data from everywhere, not necessarily to be analyzed on the spot, but to be analyzed later in the event that a specific person rises to a level that poses legitimate harm to the globalist power structure.

There was a time not long ago when this notion was considered “conspiracy theory” by the mainstream, but with multiple exposures from Wikileaks to Edward Snowden it is now common knowledge that the government (and the globalists) spy on us en masse. However, I do not think that many people understand the greater implications or uses for this full spectrum surveillance. This is why you sometimes hear the argument that “if you aren’t doing anything wrong, then you have nothing to worry about…”

The truth is, mass surveillance is not done merely for the sake of surveillance, and it is certainly not undertaken for the sake of public safety. There is a greater purpose, and it is something the elites crave dearly — the purpose of total and PREDICTIVE information awareness.

The establishment is not just hoping to observe our present behavior in detail. No, they hope to use today’s data to predict our behavior tomorrow, and at this very moment, they are extremely close to achieving their goal.

Lets examine some of the methods they use in the pursuit of this goal…

…click on the above link to read the rest of the article…

The Mainstream Media is Asking for a Government Bailout Via Censorship

The Mainstream Media is Asking for a Government Bailout Via Censorship

screen-shot-2016-12-09-at-10-35-32-am

The current controversy is different. Many people in Washington are irate over Wikileaks — not because the email were untrue but because they proved what many had long suspected . . . that Washington is a highly corrupt place full of truly despicable people. For people who make their living on controlling media and information, it was akin to the barbarians breaching the walls of Rome. So the answer is to call for government regulation to combat what will be declared “fake” news or propaganda. It is only the latest effort to convince people to surrender their rights and actually embrace censorship. 

– From Jonathan Turley’s: Washington Post Issues Correction To “Fake News” Story

Watching Hillary Clinton attack “fake news” and calling for legislative action against free speech she doesn’t like got me thinking. Why is she doing this? Yes, it’s obviously related to her notorious personality trait of never taking responsibility for anything and attaching herself to an invented controversy in order to deflect blame for her monumentally embarrassing loss to Donald Trump. But there’s more going on here. A lot more.

To set the stage, we need to examine the types of people who are most jumping on the “fake news” meme. What you’ll find is that it’s a who’s who of the most contemptible and corrupt people in America. As Glenn Greenwald so accurately noted in his piece published earlier today:

Those who most loudly denounce Fake News are typically those most aggressively disseminating it.

But the problem here goes way beyond mere hypocrisy. Complaints about Fake News are typically accompanied by calls for “solutions” that involve censorship and suppression, either by the government or tech giants such as Facebook. 

…click on the above link to read the rest of the article…

Iceland Interior Minister Reveals Plot By Obama Administration “To Frame Julian Assange”

Iceland Interior Minister Reveals Plot By Obama Administration “To Frame Julian Assange”

Back in October we noted a scheme, linked to the Hillary Clinton campaign, to tie Julian Assange and WikiLeaks to a pedophilia ring (see “Hillary Clinton Linked To Mysterious Front Associated with Julian Assange Pedophile Smear“).  Of course, the scheme was revealed amid daily dumps by WikiLeaks of John Podesta’s emails leaving the Clintons, and their many “friends in high places”, scrambling for anyway possible to shut Assange down.


A front has released through US Democratic media an elaborate story accusing Julian Assange of paedophillia & taking US$1million from Russia

On WikiLeaks, Journalism, and Privacy: Reporting on the Podesta Archive Is an Easy Call

FOR YEARS, WIKILEAKS has been publishing massive troves of documents online — usually taken without authorization from powerful institutions and then given to the group to publish — while news outlets report on their relevant content. In some instances, these news outlets work in direct partnership with WikiLeaks — as the New York Times and The Guardian, among others, did when jointly publishing the Iraq and Afghanistan war logs and U.S. diplomatic cables — while other times media outlets simply review the archives published by WikiLeaks and then report on what they deem newsworthy.

WikiLeaks has always been somewhat controversial, but reaction has greatly intensified this year because many of its most significant leaks have had an impact on the U.S. presidential election and, in particular, have focused on Democrats. As a result, Republicans who long vilified the group as a grave national security threat have become its biggest fans (“I love WikiLeaks,” Donald Trump gushed last night, even though he previously called for Edward Snowden to be executed), while Democrats who cheered the group for its mass leaks about Bush-era war crimes now scorn it as an evil espionage tool of the Kremlin.

The group’s recent publication of the emails of Clinton campaign chair John Podesta has been particularly controversial because it comes less than a month before the election; it included all sorts of private and purely personal exchanges along with substantive, newsworthy material; and it was obtained through actions that were likely criminal (hacking). Compounding the intensity of the debate is the now standard Democratic campaign tactic of reflexively accusing adversaries of being tools or agents of Moscow.

…click on the above link to read the rest of the article…

‘Made in USA’: 3 key signs that point to Washington’s hand in Brazil’s ‘coup’

‘Made in USA’: 3 key signs that point to Washington’s hand in Brazil’s ‘coup’

As Brazil’s left-wing president, Dilma Rousseff, has been suspended from office to face trial for disregarding budget laws, details have emerged on key figures involved in what Rousseff supporters are calling a coup, hinting at a covert plot involving Washington.

Following last week’s vote in the Brazilian Senate that led to the suspension of the country’s first female president, the left-wing politician herself noted that she “never imagined that it would be necessary to fight a coup in this country.”

While Latin America’s modern history is riddled with well-documented examples of US operations aimed at overthrowing regimes, some would argue the situation in Brazil is tied to a popular protest movement that has sprang up due to the corruption scandal and slumping economy. However, profiles of those at the center of current events offer clues as to why Washington’s hand might be at play.

1. From US informant to Brazil’s acting president

After it emerged that Rousseff’s old ally and former vice-president, Michel Temer, would succeed her as an interim head of the country, the murky details from his past have emerged on Wikileaks. The whistleblowing website said it has published proof Temer served as an embassy informant for Washington.


Wikileaks:’s new head used to chat with US intelligence…a lot

Panama Papers – Who Instigated the Leak? USA or Russia?

Mossack Fonseca logo

The US think tank Brookings Institution is claiming that Russia had released the Panama Papers in order to destabilize the West. Wikileaks claimed the exact opposite that the publications have been launched by the United States. Our sources put the blame on neither. Indeed, it is starting to emerge that attempts to leak information to Germany before were ignored by the government. Several times a whistleblower attempted to provide information to the Minister of Finance. The whistleblower wanted to expose questionable dealings of the Bundesdruckerei which is a state owned company with one of the longest histories in the business, dating as far back as the 18th century. The German government took over Bundesdruckerei as a wholly state-owned company. In recent years, however, the company has been transformed into a leading international Full ID | Management supplier.

SchäubleSPIEGEL is now reporting that the German Finance Minister Wolfgang Schaeuble and his Secretary of StateWerner Gatzer have refused contact with a whistleblower for years. The Ministry of Finance assumed Bundesdruckerei had used this company to do business in Venezuela.

It appears that the whistleblower is German. This appears to be really an internal breach rather than a state orchestrated event. There appears to be no real motive to expose the Panama Papers for this has been following the same path as to why Hitler did not invade Switzerland; he too needed access to secret measures. Switzerland’s secrecy began when Hitler made it illegal to have an account outside of Germany. He could have invaded Switzerland for defeating his laws, but he did not. There are some lines you do not cross. and this is one of them.

Consequently, the leak does appear to be internal for personal political reasons rather than instigated by USA or Russia.

George Soros Targeting Putin through the Panama Papers?

George Soros Targeting Putin through the Panama Papers?

George Soros, cc Flickr Heinrich-Böll-Stiftung, modified, https://creativecommons.org/licenses/by-sa/2.0/

The Panama Papers represent the biggest document leak of the modern era, and George Soros apparently has a role.

The scandal that has erupted after the publication of the Mossack Fonseca law firm’s so-called “Panama Papers”  was organized by the US Centers for investigations on corruption and organized crime using US government funds and donations from billionaire George Soros, according to “WikiLeaks” – which itself became famous for the dissemination of classified high-profile information.

Wikileaks tweeted: “#PanamaPapers Putin attack was produced by OCCRP which targets Russia & former USSR and was funded by USAID & Soros.”

Therefore, the Panama Papers investigations obtained financial support from the Democracy Fund of the United Nations, the US Agency for International Development (USAID) and Soros’ Open Society Foundation. USAID is the US administration’s central body for managing aid to government and foreign non-governmental institutions.

The Panama Papers, so named because they reveal the dealings of one Panamanian law firm, Mossack Fonseca that has allegedly managed billions of dollars’ worth of filtered assets on behalf of the world’s richest and most powerful. Given the whims of defamation law, we stress that people, fabulously wealthy though they may be, have legitimate reasons for using entities such as Mossack Fonseca.

Therefore, we do not assume that any Mossack Fonseca customer was necessarily breaking any laws. Indeed, forming shell companies does not necessarily prove that anybody has committed a crime. Yet, one of the most obvious aspects of the Papers is that the disclosures largely concern those in disfavor with either Soros or the United States. Not surprisingly Vladimir Putin, whose strategy in Syria has enabled Assad’s forces to erode Islamic State’s stranglehold of Syria, is the most prominent figure.

…click on the above link to read the rest of the article…

Olduvai IV: Courage
Click on image to read excerpts

Olduvai II: Exodus
Click on image to purchase

Click on image to purchase @ FriesenPress