Announcement

Collapse
No announcement yet.

CIA Dirty Cyber Tricks?

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • CIA Dirty Cyber Tricks?

    Retired Military Intelligence Professional: “We” Hacked DNC Server, Provided Info to WikiLeaks

    “THE EVIDENCE IS NOT THAT THE RUSSIANS DID IT”

    The Post & Email

    by Sharon Rondeau
    3/9/2017

    Excerpt:

    (Mar. 9, 2017) — On Wednesday night, Fox News anchor Sean Hannity interviewed Circa News reporter Sara Carter about information she and another reporter said they received about surveillance allegedly carried out on a server located at Trump Tower in the weeks before the November election.

    Carter was followed by Lt. Col. Tony Shaffer (Ret) and former National Security Agency (NSA) intelligence-gathering “architect” William Binney to discuss the release by WikiLeaks on Tuesday of “Vault7” containing thousands of pages of documents allegedly leaked from the Central Intelligence Agency (CIA).

    The documentation details the tools and methods the CIA allegedly uses in its work across the globe.

    As Binney noted, the CIA’s “charter” does not permit surveillance and intelligence-gathering in the United States, although he said he is sure it has been occurring “for many decades.”

    Binney resigned from the NSA in 2001 after coming to believe that government surveillance had overstepped constitutional bounds.

    Shaffer said that the leaks of conversations between former Trump national security adviser Lt. Gen. Michael Flynn and Russian officials are clearly “illegal” and should be prosecuted.

    Hannity expressed concern that given the alleged capabilities of the agencies, all Americans are “subject to living in a police state.”

    Although unable to respond to all of Hannity’s questioning on the matter, Shaffer said that he believes that regardless of the checks and balances built into the laws authorizing the CIA’s activities, Obama “just told people to go out and do things.” He said he thinks a “moral” standard needs to be enforced on data-gathering by an intelligence overseer of sorts.

    When Hannity posed the scenario in which the NSA and CIA have the ability to penetrate computer systems, electronic devices, television sets, penetrate software firewalls and record conversations happening in real time, he mentioned the matter of the hacking of the Democrat National Committee (DNC) servers last year which resulted in thousands of emails having been provided to WikiLeaks and published in July, just prior to their convention.


    .................................................. ...........................
    View the complete article including image, links and comments at:

    http://www.thepostemail.com/2017/03/...nfo-wikileaks/
    Last edited by bsteadman; 03-09-2017, 10:28 PM.
    B. Steadman

  • #2
    Hannity Demands Obama Answer Questions About FISA Warrant on Trump Tower Server

    "SABOTAGE"

    The Post & Email

    by Sharon Rondeau
    3/8/2017

    Excerpt:

    (Mar. 8, 2017) — At the opening of his 10:00 p.m. EST show on Wednesday, Sean Hannity stated that new information is available supporting the claim that a FISA warrant was issued for U.S. intelligence agencies to surveille a computer server in Trump Tower prior to the November 2016 presidential election.

    He suggested that Barack Obama and his supporters are attempting to “sabotage” President Donald Trump’s administration.

    Hannity introduced Sara Carter of Circa News, who said that brand-new information coming to her just before her appearance shows that two investigations were in progress in October, one of which emanated from the FISA warrant, and the other carried out by the FBI without the need for a FISA warrant.

    Carter works with former longtime AP reporter John Solomon. Carter said her sources had a “direct” connection with FBI agents who performed one of the investigations, and she confirmed the existence of a FISA warrant acted upon in October on the Trump Tower server.

    “It was a completely separate incident,” Carter said of the FBI’s probe. “The inspector general at the DOJ is now investigating.”

    She said that her sources say that “nothing was found” on the Trump server to cause concern for law-enforcement agencies.

    Carter said that it is thought that the FISA warrant “had to do with the Russian hacking on a very broad level,” referring to the allegations that Russia interfered in the U.S. elections.

    Hannity called out the mainstream media for failing to investigate Donald Trump’s allegation made Saturday morning on Twitter that Barack Obama had “ordered” the Trump Tower server “wiretapped.”

    Referring to Obama’s statement, made through a spokesman, that he did not “order” the alleged wiretapping, Hannity asked Carter if Obama “knew” about it, to which Carter responded, “We believe that people were briefed on this,” meaning the October FISA warrant.

    She then posited that the surveillance had become “politicized.”

    During his opening monologue, Hannity also contended that a concerted effort exists to delegitimize Trump and destroy his administration and presidency.


    .................................................. ...................

    View the complete article including image, links and comments at:

    http://www.thepostemail.com/2017/03/...-tower-server/
    Last edited by bsteadman; 03-20-2017, 05:20 PM.
    B. Steadman

    Comment


    • #3
      Troubling questions about “Umbrage” and potential false-flag attacks.

      CIA DIRTY CYBER TRICKS?

      Canada Free Press

      by Mathew Vadum
      3/9/2017

      Excerpt:

      The Central Intelligence Agency now can mimic foreign intelligence agencies’ hack attacks by leaving electronic “fingerprints” creating the false impression of a foreign intrusion into computer networks, according to claims accompanying a new WikiLeaks document dump.

      In other words, there may not be hard evidence that CIA operatives, say, used cyberspace to create a modern-day Reichstag fire to undermine the Trump administration, but it may be the case that the CIA has the technological capabilities to do such a thing, if it were so inclined.

      This assertion that the CIA can hack computer networks and leave behind convincing evidence that somebody else did it, comes with the release by WikiLeaks of a huge collection of documents – 8,761 items in all – collectively dubbed the “Vault 7” leaks that purport to describe espionage techniques used by the CIA. The Vault 7 collection is said to have come from a former U.S. government hacker or contractor associated with “an isolated, high-security network” within the CIA’s Center for Cyber Intelligence in Langley, Va. The files made public don’t include the actual cyber weapons themselves which WikiLeaks says it will not release for the time being.

      This documentary agglomeration covers “the entire hacking capacity of the CIA,” Julian Assange’s WikiLeaks claimed in a press release, and it is only the first in a series of what he calls the “Year Zero” leaks.

      The Year Zero label has a decidedly sinister quality to it and may offer clues into what WikiLeaks hopes to accomplish with these new leaks, apparently the most significant and damaging to the U.S. intelligence community since former NSA contractor Edward Snowden handed over thousands of classified U.S. documents to journalists in 2013.

      Year Zero was used by the bloodthirsty Khmer Rouge when it seized power in Cambodia in 1975. The term is analogous to Year One of the French Revolutionary calendar, which implied a violent break with the old system and the merciless leveling of existing institutions.

      As one online resource states:


      The idea behind Year Zero is that all culture and traditions within a society must be completely destroyed or discarded and a new revolutionary culture must replace it, starting from scratch. All history of a nation or people before Year Zero is deemed largely irrelevant, as it will ideally be purged and replaced from the ground up. In Cambodia, so-called New People—teachers, artists, and intellectuals—were especially singled out and executed during the purges accompanying Year Zero.
      According to WikiLeaks, “[t]he CIA’s Remote Devices Branch’s UMBRAGE group collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.”

      With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from. UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.
      If this new information about “Umbrage” is accurate, this means that, as stated above, the CIA could hack people and institutions and then attribute the cyber-attacks to others in what amount to false-flag operations. For example, in order to create the impression that a foreign power favored one political candidate over another, the CIA or unseen rogue elements with access to “Umbrage,” could have hacked into Hillary Clinton’s campaign and the Democratic National Committee and made it appear that the intrusion was carried out by former KGB lieutenant colonel Vladimir Putin’s operatives.

      That Russians hacked Clinton and the DNC and gave Trump an unfair advantage in the election is precisely what Democrats allege. Is such a scenario in which U.S. operatives hack one political party to help another at least a little far-fetched?

      .................................................. ......

      View the complete article including image and links at:

      http://canadafreepress.com/article/c...y-cyber-tricks
      Last edited by bsteadman; 03-09-2017, 11:23 PM.
      B. Steadman

      Comment

      Working...
      X