Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
CIA Hacking Tools Revealed by Wikileaks - Rivals much NSA can do!
#21
David Guyatt Wrote:Ray McGovern has posted the below video on his Facebook page with the following introduction:

"Larry has several reliable sources with excellent access. He was correct on the false-flag sarin gas attack outside Damascus on August 21, 2013 (aimed at mousetrapping Obama into doing "shock and awe" against Syria). He is correct here, as well. Small wonder the Fawning Corporate Media avoid him, and others of us VIPS, like the bubonic plague."

What Larry Johnson says is that Britain's GCHQ had access to Trump's electronic output and shared this with certain officials in the US IC. THis is nothing new. There has been an arrangement going back decades where the UK taps (although that is the incorrect technical method) US citizens phones etc., and the US NSA reciprocates by tapping (sic) UK citizens. This forms part of the Five Eyes intelligence sharing agreement.


That GCHQ 'gift' to NSA and then to whoever always goes on.....and may have been a special target [Trump and his pals]. This makes sense, as does making it look like it was done by the Ruskies. The level of upheaval in US governmental and elite structures [even perhaps Deep Political structures] seems quite unprecedented and doesn't bode well for the future no matter how this and other plans no doubt in the works by both sides come out in the 'wash'...... Democracy, truth and stability are all being lost. I could even see a strange kind of re-run of new Civil War in the US...not with guns [at least not that much], but with propaganda and cyber warfare, covert ops, black ops, some 'suicides' and such....some 'accidents' and such. We're in somewhat uncharted waters...not that anything happening is new, but the intensity of what is going on is very strong and the different camps are not the 'usual' order of battle.
"Let me issue and control a nation's money and I care not who writes the laws. - Mayer Rothschild
"Civil disobedience is not our problem. Our problem is civil obedience! People are obedient in the face of poverty, starvation, stupidity, war, and cruelty. Our problem is that grand thieves are running the country. That's our problem!" - Howard Zinn
"If there is no struggle there is no progress. Power concedes nothing without a demand. It never did and never will" - Frederick Douglass
Reply
#22
Quote:Fresh Doubts about Russian Hacking'
March 8, 2017

Exclusive: The gauzy allegations of Russia "hacking" the Democrats to elect Donald Trump just got hazier with WikiLeaks' new revelations about CIA cyber-spying and the capability to pin the blame on others, reports Robert Parry.




By Robert Parry


WikiLeaks' disclosure of documents revealing CIA cyber-spying capabilities underscores why much more skepticism should have been applied to the U.S. intelligence community's allegations about Russia "hacking" last year's American presidential election. It turns out that the CIA maintains a library of foreign malware that could be used to pin the blame for a "hack" on another intelligence service.




WikiLeaks founder Julian Assange at a media conference in Copenhagen, Denmark. (Photo credit: New Media Days / Peter Erichsen)
That revelation emerged from documents that WikiLeaks published on Tuesday from a CIA archive that WikiLeaks said had apparently been passed around within a community of former U.S. government hackers and contractors before one of them gave WikiLeaks some of the material.


The documents revealed that the CIA can capture the content of encrypted Internet and cell-phone messages by grabbing the material in the fraction of a second before the words are put through encryption.


Another program called "Weeping Angel" can hack Samsung "smart" TVs with built-in Internet connections, allowing the CIA and British intelligence to covertly use the TVs as listening devices even when they appear to be turned off.


Besides the 1984-ish aspects of these reported capabilities Orwell's dystopia also envisioned TVs being used to spy on people in their homes the WikiLeaks' disclosures add a new layer of mystery to whether the Russians were behind the "hacks" of the Democratic Party or whether Moscow was framed.


For instance, the widely cited Russian fingerprints on the "hacking" attacks such as malware associated with the suspected Russian cyber-attackers APT 28 (also known as "Fancy Bear"); some Cyrillic letters: and the phrase "Felix Edmundovich," a reference to Dzerzhinsky, the founder of a Bolsheviks' secret police look less like proof of Russian guilt than they did earlier.


Or put differently based on the newly available CIA material the possibility that these telltale signs were planted to incriminate Moscow doesn't sound as farfetched as it might have earlier.


A former U.S. intelligence officer, cited by The Wall Street Journal on Wednesday, acknowledged that the CIA's "Umbrage" library of foreign hacking tools could "be used to mask a U.S. operation and make it appear that it was carried out by another country…. That could be accomplished by inserting malware components from, say, a known Chinese, Russian or Iranian hacking operation into a U.S. one."


While that possibility in no way clears Moscow in the case of the Democratic "hack," it does inject new uncertainty into the "high confidence" that President Obama's intelligence community expressed in its assessment of Russian culpability. If the CIA had this capability to plant false leads in the data, so too would other actors, both government and private, to cover their own tracks.


Dubious Forensics


Another problem with the U.S. intelligence community's assessment is that the forensics were left to private contractors working for the Democrats, not conducted independently by U.S. government experts.




Former Secretary of State Hillary Clinton.
That gap in the evidentiary trail widens when one notes that CrowdStrike, the Democratic Party's consultant, offered contradictory commentary about the skills of the hackers.


CrowdStrike praised the hackers' tradecraft as "superb, operational security second to none" and added: "we identified advanced methods consistent with nation-state level capabilities including deliberate targeting and access management' tradecraft both groups were constantly going back into the environment to change out their implants, modify persistent methods, move to new Command & Control channels and perform other tasks to try to stay ahead of being detected."


In other words, CrowdStrike cited the sophistication of the tradecraft as proof of a state-sponsored cyber-attack, yet it was the sloppiness of the tradecraft that supposedly revealed the Russian links, i.e. the old malware connections, the Cyrillic letters and the Dzerzhinsky reference.


As Sam Biddle wrote for The Intercept, "Would a group whose tradecraft is superb' with operational security second to none' really leave behind the name of a Soviet spy chief imprinted on a document it sent to American journalists? Would these groups really be dumb enough to leave cyrillic comments on these documents? Would these groups that constantly [go] back into the environment to change out their implants, modify persistent methods, move to new Command & Control channels' get caught because they precisely didn't make sure not to use IP addresses they'd been associated [with] before?


"It's very hard to buy the argument that the Democrats were hacked by one of the most sophisticated, diabolical foreign intelligence services in history, and that we know this because they screwed up over and over again."


Sources and Methods


The WikiLeaks' disclosures on Tuesday also demonstrate that the pro-transparency Web site has a well-placed source with access to sensitive U.S. intelligence data.




WikiLeaks logo
That reinforces the suggestion from WikiLeaks' associate, former British Ambassador Craig Murray, that the emails purloined from Hillary Clinton's campaign chairman John Podesta originated from U.S. intelligence intercepts and were then leaked by an American insider to WikiLeaks, not obtained via a "hack" directed by the Russian government.


Podesta's association with the international lobbying firm, the Podesta Group, could justify U.S. intelligence monitoring his communications as a way to glean information about the strategies of Saudi Arabia and other foreign clients.


Murray suggested that the earlier WikiLeaks' release of Democratic National Committee emails came from a Democratic insider, not from Russia. In addition, WikiLeaks' founder Julian Assange has denied that Russia was the source of either batch of Democratic emails, although he refused to say who was.


Of course, it would be possible that Russia used American cutouts to launder the emails without WikiLeaks knowing where the material originated. And some cyber-experts, who were cited in press reports about the new WikiLeaks' disclosures on Tuesday, speculated, without evidence, that perhaps Russia was the source of them, too.


Still, there are now fresh reasons to doubt the Official Narrative that Russia "hacked" into Democratic emails in a covert operation intended to throw the U.S. election to Donald Trump.


Those doubts already existed or should have because the U.S. intelligence community refused to release any hard proof that the Russians were responsible for the purloined Democratic emails.


On Jan. 6, just one day after Director of National Intelligence James Clapper vowed to go to the greatest possible lengths to supply the public with the evidence behind the accusations, his office released a 25-page report that contained no direct evidence that Russia delivered hacked emails from the DNC and Podesta to WikiLeaks.


The DNI report amounted to a compendium of reasons to suspect that Russia was the source of the information built largely on the argument that Russia had a motive for doing so because of its disdain for Democratic nominee Clinton and the potential for friendlier relations with Republican nominee Trump.


A Big Risk


But the DNI's case, as presented, was one-sided, ignoring other reasons why the Russians would not have taken the risk.




Russian President Vladimir Putin, following his address to the UN General Assembly on Sept. 28, 2015. (UN Photo)
For instance, while it is true that many Russian officials, including President Putin, considered Clinton to be a threat to worsen the already frayed relationship between the two nuclear superpowers, the report ignores the downside for Russia trying to interfere with the U.S. election campaign and then failing to stop Clinton, which looked like the most likely outcome until Election Night.


If Russia had accessed the DNC and Podesta emails and slipped them to WikiLeaks for publication, Putin would have to think that the National Security Agency, with its exceptional ability to track electronic communications around the world, might well have detected the maneuver and would have informed Clinton.


So, on top of Clinton's well-known hawkishness, Putin would have risked handing the expected incoming president a personal reason to take revenge on him and his country. Historically, Russia has been very careful in such situations, holding its intelligence collections for internal purposes only and not sharing them with the public.


While it is conceivable that Putin decided to take this extraordinary risk in this case despite the widely held view that Clinton was a shoo-in to defeat Trump an objective report would have examined this counter argument for him not doing so.


But the DNI report was not driven by a desire to be evenhanded; it was, in effect, a prosecutor's brief, albeit one that lacked any real evidence that the accused is guilty.


Though it's impossible for an average U.S. citizen to know precisely what the U.S. intelligence community may have in its secret files, some former NSA officials who are familiar with the agency's eavesdropping capabilities say Washington's lack of certainty suggests that the NSA does not possess such evidence.


That's the view of William Binney, who retired as NSA's technical director of world military and geopolitical analysis and who created many of the collection systems still used by NSA.


Binney, in an article co-written with former CIA analyst Ray McGovern, said, "With respect to the alleged interference by Russia and WikiLeaks in the U.S. election, it is a major mystery why U.S. intelligence feels it must rely on circumstantial evidence,' when it has NSA's vacuum cleaner sucking up hard evidence galore. What we know of NSA's capabilities shows that the email disclosures were from leaking, not hacking."


Released last summer around the time of the Democratic National Convention the DNC emails revealed senior party officials showing a preference for former Secretary of State Clinton over Sen. Bernie Sanders although the DNC was supposed to remain neutral.


Later in the campaign, the Podesta leak exposed the contents of speeches that Clinton gave to Wall Street banks, which she wanted to keep secret from the American voters, and the existence of pay-to-play features of the Clinton Foundation.


News articles based on the WikiLeaks' material embarrassed the DNC and the Clinton campaign, but the rupture of secrets was not considered a very important factor in Clinton's loss to Donald Trump. Clinton herself blamed that surprising outcome on FBI Director James Comey's last-minute decision to briefly reopen the investigation into her improper use of a private server for her emails as Secretary of State.


After Comey's move, Clinton's poll numbers cratered and she seemed incapable of reversing the trend. More generally, Clinton faced criticism for running an inept campaign that included her insulting many Trump supporters by calling them "deplorables" and failing to articulate a clear, hopeful vision for the future.


However, after the shock of Trump's stunning victory began to wear off, the outgoing Obama administration and angry Democrats began singling out Putin as a chief culprit in Clinton's defeat.


Despite the appearance that they were scapegoating America's old adversary the Russkies liberals and Democrats have used the allegations to energize their base and put the young Trump administration on the defensive, even though hard evidence to support the accusations is still lacking.


The liberals and Democrats also don't seem to care that they are using these dubious allegations to ratchet up tensions between the world's two nuclear superpowers, thus putting the future of the world at risk.
Source
The shadow is a moral problem that challenges the whole ego-personality, for no one can become conscious of the shadow without considerable moral effort. To become conscious of it involves recognizing the dark aspects of the personality as present and real. This act is the essential condition for any kind of self-knowledge.
Carl Jung - Aion (1951). CW 9, Part II: P.14
Reply
#23
The shadow is a moral problem that challenges the whole ego-personality, for no one can become conscious of the shadow without considerable moral effort. To become conscious of it involves recognizing the dark aspects of the personality as present and real. This act is the essential condition for any kind of self-knowledge.
Carl Jung - Aion (1951). CW 9, Part II: P.14
Reply
#24
David Guyatt Wrote:


Pretty good set of summary opinions and reports and some mad-dog conservative foaming at the mouth against the 'hidden hordes' waiting to poison our private bodily fluids..... McAfee was right on the mark....there is little to be done to 'fix' all this without a whole new paradigm...all other 'fixes' will work for weeks or months at best. A usually insane World has gotten insane to the third power in just the last few months.
"Let me issue and control a nation's money and I care not who writes the laws. - Mayer Rothschild
"Civil disobedience is not our problem. Our problem is civil obedience! People are obedient in the face of poverty, starvation, stupidity, war, and cruelty. Our problem is that grand thieves are running the country. That's our problem!" - Howard Zinn
"If there is no struggle there is no progress. Power concedes nothing without a demand. It never did and never will" - Frederick Douglass
Reply
#25
Peter Lemkin Wrote:
David Guyatt Wrote:


Pretty good set of summary opinions and reports and some mad-dog conservative foaming at the mouth against the 'hidden hordes' waiting to poison our private bodily fluids..... McAfee was right on the mark....there is little to be done to 'fix' all this without a whole new paradigm...all other 'fixes' will work for weeks or months at best. A usually insane World has gotten insane to the third power in just the last few months.

I can't think of another time in my life when competing elite factions quite so openly revealed just how repulsive they -- especially as it comes down, I think, to controlling power in the US in order that they can suck the blood of the nation and get their grubby hands on the national purse.
The shadow is a moral problem that challenges the whole ego-personality, for no one can become conscious of the shadow without considerable moral effort. To become conscious of it involves recognizing the dark aspects of the personality as present and real. This act is the essential condition for any kind of self-knowledge.
Carl Jung - Aion (1951). CW 9, Part II: P.14
Reply
#26
"Let me issue and control a nation's money and I care not who writes the laws. - Mayer Rothschild
"Civil disobedience is not our problem. Our problem is civil obedience! People are obedient in the face of poverty, starvation, stupidity, war, and cruelty. Our problem is that grand thieves are running the country. That's our problem!" - Howard Zinn
"If there is no struggle there is no progress. Power concedes nothing without a demand. It never did and never will" - Frederick Douglass
Reply
#27
The shadow is a moral problem that challenges the whole ego-personality, for no one can become conscious of the shadow without considerable moral effort. To become conscious of it involves recognizing the dark aspects of the personality as present and real. This act is the essential condition for any kind of self-knowledge.
Carl Jung - Aion (1951). CW 9, Part II: P.14
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  The Dubious Case of Russian Hacking David Guyatt 6 18,493 05-02-2017, 05:45 PM
Last Post: Peter Lemkin
  WikiLeaks offers award for #LabourLeaks Magda Hassan 2 7,001 24-09-2016, 07:42 AM
Last Post: David Guyatt
  NSA/GCHQ hacking anti-spyware/encryption programs to invade your computer! Peter Lemkin 3 10,767 13-04-2016, 11:29 AM
Last Post: David Guyatt
  KARMA POLICE - another NSA+GCHQ Program revealed Peter Lemkin 0 6,078 27-09-2015, 08:21 AM
Last Post: Peter Lemkin
  Google gave FBI Wikileaks staffers emails - and kept quiet about it David Guyatt 0 4,017 26-01-2015, 09:34 AM
Last Post: David Guyatt
  CIA admits to hacking Senate computers Tracy Riddle 2 5,051 03-08-2014, 02:34 PM
Last Post: Magda Hassan
  Secret EU surveillance drone project revealed David Guyatt 0 4,489 12-02-2014, 09:43 AM
Last Post: David Guyatt

Forum Jump:


Users browsing this thread: 1 Guest(s)