Sunday, April 2, 2017

WIKILEAKS: CIA'S 676 FALSE FLAG CODE FILES

The DNCLeaks and Wikileaks Podesta Emails have become legendary during the 2016 US Presidential campaign. Amidst Democrat Media Complex attacks on President Trump, Wikileaks presents Vault 7. Its mission is to "open Governments". Wikileaks play a vital role in cyber politics, because our politicians simply lack the knowledge and insight to function as a check on what intel agencies are cooking. 


UPDATE: Latest WikiLeaks release shows how the CIA uses computer code to hide the origins of its hacking attacks and 'disguise them as Russian or Chinese activity'

  • WikiLeaks published 676 source code files today which it claimed are from CIA
  • It says the CIA disguised its own hacking attacks to make it appear those responsible were Russian, Chinese, Iranian or North Korean 

WikiLeaks has published hundreds more files today which it claims show the CIA went to great lengths to disguise its own hacking attacks and point the finger at Russia, China, North Korea and Iran. The 676 files released today are part of WikiLeaks' Vault 7 tranche of files and they claim to give an insight into the CIA's Marble software, which can forensically disguise viruses, trojans and hacking attacks.  WikiLeaks says the source code suggests Marble has test examples in Chinese, Russian, Korean, Arabic and Farsi (the Iranian language). It says: 'This would permit a forensic attribution double game, for example by pretending that the spoken language of the malware creator was not American English, but Chinese.' This could lead forensic investigators into wrongly concluding that CIA hacks were carried out by the Kremlin, the Chinese government, Iran, North Korea or Arabic-speaking terror groups such as ISIS.




March 24, 2017


WIKILEAKS REVEAL 'DARK MATTER' MALWARE


CIA documents published by WikiLeaks Thursday reveal hacks used by the agency against Apple cellphones and computers. Dubbed “Dark Matter,” the documents, a new addition to WikiLeaks’ ongoing “Vault 7” dump, detail hacks developed for iPhones and MacBooks as far back as 2008. “These documents explain the techniques used by CIA to gain ‘persistence’ on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware,” a WikiLeaks press release says. By targeting the firmware, CIA hackers can remain in control of an infected device even if the target wipes the data and re-installs the operating system. One such tool, known as “Sonic Screwdriver,” is, according to the CIA, a “mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting…”

By providing a target with a compromised peripheral device such as an Apple Thunderbolt-to-Ethernet adapter, which stores “Sonic Screwdriver” in its firmware, the CIA can gain persistence “even when a firmware password is enabled” on the target computer. A 2008 document discussing an attack on iPhones, called “NightSkies,” reveals a malicious implant that would be physically installed on a new device. One method of deploying the hack could potentially involve intercepting an iPhone before it reaches a target. “The tool operates in the background providing upload, download and execution capability on the device,” the document states. “NS is installed via physical access to the device and will wait for user activity before beaconing.”

The “Dark Matter” release follows WikiLeaks’ initial “Year Zero” dump which included attacks on other high-profile gadgets. The “Weeping Angel” exploit designed for older model Samsung TVs, which required physical access to a device with outdated firmware, allowed conversations to be recorded through the TV’s microphone. (More)





March 10, 2017


WIKILEAKS PLAYS A VITAL ROLE AS INTEL WATCHDOG


The film Zero Days (IMDb) shows that CIA and NSA are at the cutting edge of cyber warfare (trailer). It's far beyond the pay grade of the House Permanent Select Committee. In other words, the CIA and the NSA are dealing with a subject matter on which the average politician is incapable of doing oversight. This is a danger the likes of which Gen. Hayden and other statists and globalists can't wrap their thick skulls around. But there are also dangers for the civil society.
IF you’re a law-abiding citizen reading about government surveillance, you might just shrug and think: ‘I’ve got nothing to hide.” But every right-minded person should be very afraid of the power of modern spies and the tech industry’s array of intrusive digital spy gadgets. Do we really trust spooks, cops bureaucrats and advertisers with these tools? Unless we're very careful, society could be sleepwalking into a nightmare which would make George Orwell shudder in his grave.  (More) N.B. Get out of Facebook! 






March 9, 2017


(VIDEO) ASSANGE HOLDING PRESSER ON CIA LEAKS #VAULT7




Mar 9, 2017 LIVE STREAM: Julian Assange Holds News Conference on CIA leaks.

Today Julian Assange held a news conference on the CIA Leaks, Samsung and household devices capable of spying. A day after WikiLeaks released what it alleged to be the “entire hacking capacity of the CIA,” the focus Wednesday began shifting to just who gave the stunning surveillance information to the anti-secrecy website. “There is heavy s--- coming down,” said a veteran cyber contractor for the intelligence community who previously worked in the breached unit, the CIA’s Center for Cyber Intelligence. (More)






March 8, 2017


TECH FIRMS REACTING TO WIKILEAKS' VAULT7


Several of the tech firms whose products have been allegedly compromised by the CIA have given their first reactions to the claims. Wikileaks published thousands of documents said to detail the US spy agency's hacking tools on Tuesday. They included allegations the CIA had developed ways to listen in on smartphone and smart TV microphones. Apple's statement was the most detailed, saying it had already addressed some of the vulnerabilities. "The technology built into today's iPhone represents the best data security available to consumers, and we're constantly working to keep it that way," it said. "Our products and software are designed to quickly get security updates into the hands of our customers, with nearly 80% of users running the latest version of our operating system. (More)






March 7, 2017


WIKILEAKS PRESENT "VAULT "7 CIA LEAKS


Wikileaks Press Release
Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named "Vault 7" by WikiLeaks, it is the largest ever publication of confidential documents on the agency. The first full part of the series, "Year Zero", comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA's Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election. Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized "zero day" exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive. "Year Zero" introduces the scope and direction of the CIA's global covert hacking program, its malware arsenal and dozens of "zero day" weaponized exploits against a wide range of U.S. and European company products, include Apple's iPhone, Google's Android and Microsoft's Windows and even Samsung TVs, which are turned into covert microphones. (More)





Dec. 15, 2016


DNC EMAILS HANDED OVER IN PARK, NOT 'HACKED BY RUSSIANS'


A former British ambassador who is now a WikiLeaks operative claims Russia did NOT provide Clinton emails - they were handed over to him at a D.C. park by an intermediary for 'disgusted' Democratic whistleblowers. Craig Murray, former British ambassador to Uzbekistan and associate of Julian Assange, told the Dailymail.com he flew to Washington, D.C. for the emails. He claims he had a clandestine hand-off in a wooded area near American University with one of the email sources.  The leakers' motivation was 'disgust at the corruption of the Clinton Foundation and the 'tilting of the primary election playing field against Bernie Sanders' Murray says: 'The source had legal access to the information. The documents came from inside leaks, not hacks'. 'Regardless of whether the Russians hacked into the DNC, the documents Wikileaks published did not come from that,' Murray insists Murray is a controversial figure who was relieved of his post as British ambassador amid allegations of misconduct but is close to Wikileaks. (More)





Dec. 11, 2016


ICELAND: 'OBAMA TRIED TO FRAME ASSANGE'


(...) the former Interior Minister of Iceland, Ogmundur Jonasson, has now come forward to reveal details of a 2011 plot by the Obama administration to frame Julian Assange. The U.S. first contacted Icelandic authorities in June 2011 to offer "help" in fending off hackers that the U.S. said were looking to destroy software systems in the country. Jonasson was initially "suspicious" of the U.S. offer to help, suspicions which he said were confirmed later in the summer of 2011 when a "planeload of FBI agents" showed up in Iceland seeking support in an effort to "frame Julian Assange and Wikileaks," then-Interior Minister Ogmundur Jonasson, said in an interview with the Katoikos publication @KatoikosEU. (...) Jonasson ultimately refused cooperation with U.S. efforts and sent the FBI agents home saying that if he had to choose sides he "would be on the side of WikiLeaks."
“Since they had not been authorized by the Icelandic authorities to carry out police work in Iceland and since a crack-down on WikiLeaks was not on my agenda, to say the least, I ordered that all cooperation with them be promptly terminated and I also made it clear that they should cease all activities in Iceland immediately,” the politician said.
Jónasson went on to discuss other whistleblowers like Edward Snowden: the Althing, the Icelandic parliament, debated whether Snowden should have been granted citizenship, but “there hasn't been political consensus” on the matter. “Iceland is part of NATO and such a decision would be strongly objected to by the US,” Jonasson said. (More)


<O @Windwens



Nov. 29, 2016

WIKILEAKS RELEASE 1979 US DIPLOMATIC CABLES 


Wikileaks Public Library of US Diplomacy (source) was updated with 500,000 U.S. diplomatic cables from 1979. Reporters around the world now have access to cables on everything from the Iranian revolution and Grenada’s coup to Saddam Hussein’s rise in Iraq. It's very interesting from the historical perspective. “If any year could be said to be the ‘year zero’ of our modern era, 1979 is it,” Mr. Assange said in a statement posted on WikiLeaks.org.
The year saw the start of a great many political conflicts and alliances which continue to define the present world order, as well as the rise of still-important personalities and political dynasties. The cables document the start of the Iranian Revolution, leading to the stand-off between Iran and the West (1979 – present); the Second Oil Crisis; the Afghan conflict (1978 – present); the Lebanon–Israel conflict (1978 – present); the Camp David Accords; the Sandinista Revolution in Nicaragua and the subsequent conflict with US proxies (1978 – 1990); the 1978 Vietnamese invasion of Cambodia; the Ethiopian invasion of Eritrea; Carter's critical decision on the neutron bomb; the break-up of the USSR's nuclear-powered satellite over Canada, which changed space policy; the US "playing the China card" against Russia; Brzezinski's visit to China, which led to the subsequent normalisation of relations and a proxy war in Cambodia; with the US, UK, China and Cambodia on one side and Vietnam and the USSR on the other. Through 1978, Zbigniew "Zbig" Brzezinski was US National Security Advisor. He would become the architect of the destabilisation of Soviet backed Afghanistan through the use of Islamic militants, elements of which would later become known as al-Qaeda. Brzezinski continues to affect US policy as an advisor to Obama. He has been especially visible in the recent conflict between Russia and the Ukraine. WikiLeaks' Carter Cables II comprise 500,577 US diplomatic cables and other diplomatic communications from and to US embassies and missions in nearly every country. It follows on from the Carter Cables (368,174 documents from 1977), which WikiLeaks published in April 2014. The Carter Cables II bring WikiLeaks total published US diplomatic cable collection to 2.7 million documents. What follows are some example areas. (More)




Nov. 27, 2016


(AUDIO) ASSANGE RESURFACES IN INTERVIEW


Thankfully Julian Assange has resurfaced after the Nov. 8 elections. The first part of the audio is from the periscope stream which got cut. The second part is from the Facebook live stream.





Nov. 5, 2016


(VIDEO) INTERVIEW WITH JULIAN ASSANGE (FULL)




Nov 5, 2016 Secret World of US Election: Julian Assange talks to John Pilger (FULL INTERVIEW).

RT- Whistleblower Julian Assange has given one of his most incendiary interviews ever in a John Pilger Special, courtesy of Dartmouth Films, in which he summarizes what can be gleaned from the tens of thousands of Clinton emails released by WikiLeaks this year. READ TRANSCRIPT.


Historical archive


Related