Jump to content

The Deep State War Heats Up :ph34r:


Recommended Posts

Wikileaks may have just blown the Russian hacking story out of the water with it's release of the CIA's cyber warfare kit, including a program called UMBRAGE:

 

https://wikileaks.org/ciav7p1/cms/page_2621753.html

 

...Which is a library of attack techniques and programs stolen "from the wild" (i.e. other state actors and hackers). Considering the only "evidence" proffered so far that points to the Russians has been the origin of the servers involved and their IP addresses, I've maintained for weeks it's possible that those markers were not authentic, considering the first thing any state agency run cyber outfit would do is protect the provenance of their attack. Now Umbrage makes it clear not only is CIA capable of pulling that trick off, they excel in it and design their cyber operations around exactly that.

 

Said another way, all the evidence offered to support the Russian conclusion so far falls under the scope of Umbrage - meaning the evidence is no longer (and never was) indicative of who the attackers actually were.

 

Buckle up, this is gonna get bumpier still...

 

(more)

 

https://mobile.twitter.com/wikileaks/status/839117937042735104/photo/1

Edited by Deranged Rhino
Link to comment
Share on other sites

Did they delay the release of this particular "dump" until certain parts of the CIA's own leakage had come to light ?

 

(Russia, wiretaps)

 

It seems that way. It's a large dump, so I'm only partially through it (and will have to put it down when work starts) -- but this has been something they've teased for months. A lot of people assumed, because of the title (Vault 7 - referring to the doomsday seed vault) that it was going to be something massively game changing.

 

So far it fits that bill. Definitely could have been coordinated with the recent news as it impacts every story on this subject being reported now.

Added: The bulk of this leak basically proves it's not just NSA spying on Americans, but CIA as well. They put a backdoor into every computer running windows, every smart TV, every piece of electronics with a camera they can/have/and continue to access.

 

Mind you, CIA's charter doesn't allow for any of this on US soil.

 

This is an explosive turn -- that will be undoubtedly met by many in the same way Snowden's leaks were: "meh, I got nothing to hide so who cares"

:wallbash::wallbash:

And... now certain corners of the internet are going nuts because of this: CIA admits it can hack moving cars.

 

http://i.imgur.com/exEpsg8.png

 

Which is interesting considering whom Michael Hastings was investigating before he was assassinated.

 

 

Who was he investigating again? Right, this guy:

 

d32fda57daa54bf4b8d9abaeb0760c6e.jpg

Here's the WikiPress release: https://wikileaks.org/ciav7p1/

Snowden's chimed in now: https://twitter.com/Snowden/status/839157182872576000

Link to comment
Share on other sites

Wikileaks may have just blown the Russian hacking story out of the water with it's release of the CIA's cyber warfare kit, including a program called UMBRAGE:

 

https://wikileaks.org/ciav7p1/cms/page_2621753.html

 

...Which is a library of attack techniques and programs stolen "from the wild" (i.e. other state actors and hackers). Considering the only "evidence" proffered so far that points to the Russians has been the origin of the servers involved and their IP addresses, I've maintained for weeks it's possible that those markers were not authentic, considering the first thing any state agency run cyber outfit would do is protect the provenance of their attack. Now Umbrage makes it clear not only is CIA capable of pulling that trick off, they excel in it and design their cyber operations around exactly that.

 

Said another way, all the evidence offered to support the Russian conclusion so far falls under the scope of Umbrage - meaning the evidence is no longer (and never was) indicative of who the attackers actually were.

 

Buckle up, this is gonna get bumpier still...

 

(more)

 

https://mobile.twitter.com/wikileaks/status/839117937042735104/photo/1

The narrative is written.

 

Editor approved.

 

Published.

 

We're way past caring about the truth.

Link to comment
Share on other sites

The narrative is written.

 

Editor approved.

 

Published.

 

We're way past caring about the truth.

 

I hear you, but I hope not.

 

The scope of the release today is staggering. It's the NSA leaks on steroids...

 

These are the kind of revelations, if honestly considered by the people, that light the torches of revolution.

 

But you're probably right, most people will dismiss it because "I've got nothing to hide"... at least until this gets swept up into the ongoing Russian narrative. With Trump demanding an investigation, it threatens to expose these programs and more to a wider audience -- which is why CIA and the various deep state mouthpieces are so busy going out of their way to make Trump's accusations sound off base.

Link to comment
Share on other sites

Besides the ability to hack and control moving cars, Vault 7 reveals the CIA has the means to hack and control private and commercial airliners in mid air. That should make people think back to TU-154 referrenced in the OP, as well as JFK Jr who was the front runner for a senate seat before his plane crashed allowing Hillary to run unimpossed...

 

This **** is just getting started.

Link to comment
Share on other sites

Not to mention Malaysian Air two flights to the ocean's bottom.

My bad. Only one went into the deep blue sea.

The Rooskies took care of the other one... maybe because Trump suggested they do that.

Edited by Nanker
Link to comment
Share on other sites

Wikileaks may have just blown the Russian hacking story out of the water with it's release of the CIA's cyber warfare kit, including a program called UMBRAGE:

 

https://wikileaks.org/ciav7p1/cms/page_2621753.html

 

...Which is a library of attack techniques and programs stolen "from the wild" (i.e. other state actors and hackers). Considering the only "evidence" proffered so far that points to the Russians has been the origin of the servers involved and their IP addresses, I've maintained for weeks it's possible that those markers were not authentic, considering the first thing any state agency run cyber outfit would do is protect the provenance of their attack. Now Umbrage makes it clear not only is CIA capable of pulling that trick off, they excel in it and design their cyber operations around exactly that.

 

Said another way, all the evidence offered to support the Russian conclusion so far falls under the scope of Umbrage - meaning the evidence is no longer (and never was) indicative of who the attackers actually were.

 

 

 

 

 

 

The CIA’s Remote Devices Branch’s UMBRAGE group collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.

 

With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from.

 

UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.

 

Wikileaks compares this style to that of finding the same “knife wound on multiple separate murder victims.” This evidence leads investigators to believe the same person committed each murder so when they apprehend the killer then they can solve the other murders.

(more…)

Link to comment
Share on other sites

 

 

 

 

The CIA’s Remote Devices Branch’s UMBRAGE group collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.

 

With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from.

 

UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.

 

Wikileaks compares this style to that of finding the same “knife wound on multiple separate murder victims.” This evidence leads investigators to believe the same person committed each murder so when they apprehend the killer then they can solve the other murders.

(more…)

 

This, to me, is the biggest part of the story just due to its timing.

 

This not only blows up the current narrative being pushed by CIA, the corporate media and those on the left and right blinded by their partisanship -- it also explains (possibly) why Trump is demanding an investigation. Any such investigation would, based on these documents, reveal the scope of illegal CIA spying going on domestically... which is why there's such a push back to outright deny Trump's claims with extreme prejudice.

 

The house is on fire, and people are more worried about rearranging the furniture than extinguishing the flames. That's America in 2017.

Edited by Deranged Rhino
Link to comment
Share on other sites

That's funny. CIA can easily kill JFK Jr to suit Hillary's needs, but have allowed Assange & Snowden to air their dirty laundry for the world to see.

 

Makes sense to me.

Link to comment
Share on other sites

 

Dodge, duck, dive -- anything but addressing the substance of the release itself.

 

I was commenting, as always, on your outlandish takes on whatever news hits.

 

If the CIA information is as damning as you say it is, why hasn't CIA killed Assange? If he had a get out of jail card, it was probably holding on to some really really scary CIA stuff. Well, now he's apparently released really really scary CIA stuff.

 

So, if we are to believe your implication that the CIA has no qualms killing a very popular son of a semi-god president to satisfy the career needs of a woman who the CIA despised, and that the CIA can commandeer cars, aircraft or anything else that's come into its cross-hairs, what's stopping the CIA from killing Assange? If the CIA has the blood of thousand innocents on its hands, what's another body of an accused rapist?

Link to comment
Share on other sites

 

I was commenting, as always, on your outlandish takes on whatever news hits.

 

No you weren't, you were twisting my words into falsehoods while downplaying the subject. It's your bag, and you do it often.

 

 

 

 

 

If the CIA information is as damning as you say it is, why hasn't CIA killed Assange?

 

There was a lengthy discussion about Assange being taken off the board in October. It's been covered, as has my stance that he's an unknown.

 

What hasn't been disputed, by anyone, is the accuracy of Wikileak's drops to date. They have yet to release a single falsified document.

 

So, again, you're more interested in avoiding the subject by attacking the messenger than actually looking at what the release says.

 

It's !@#$ing damning.

 

 

 

So, if we are to believe your implication that the CIA has no qualms killing a very popular son of a semi-god president to satisfy the career needs of a woman who the CIA despised, and that the CIA can commandeer cars, aircraft or anything else that's come into its cross-hairs, what's stopping the CIA from killing Assange? If the CIA has the blood of thousand innocents on its hands, what's another body of an accused rapist?

 

There it is.

Link to comment
Share on other sites

 

No you weren't, you were twisting my words into falsehoods while downplaying the subject. It's your bag, and you do it often.

 

 

 

There was a lengthy discussion about Assange being taken off the board in October. It's been covered, as has my stance that he's an unknown.

 

What hasn't been disputed, by anyone, is the accuracy of Wikileak's drops to date. They have yet to release a single falsified document.

 

So, again, you're more interested in avoiding the subject by attacking the messenger than actually looking at what the release says.

 

It's !@#$ing damning.

 

 

 

There it is.

 

Hard to twist these words, even for a wordsmith. Please explain what you meant by the bolded.

 

That should make people think back to TU-154 referrenced in the OP, as well as JFK Jr who was the front runner for a senate seat before his plane crashed allowing Hillary to run unimpossed...

 

 

 

As for Assange, nobody is doubting the authenticity of the documents. What's always doubted is your interpretation of the events.

 

Are you saying that Assange is not an accused rapist?

Link to comment
Share on other sites

 

Hard to twist these words, even for a wordsmith. Please explain what you meant by the bolded.

 

The documents, which you have not read, make the CIA's capabilities clear.

 

Michael Hastings was assassinated -- it's long been a theory. This lends more evidence to that narrative.

 

JFK Jr.'s crash was anything but routine, the timing was always suspicious and now there's evidence that there might have been more at play than just pilot error.

 

Those aren't conclusions, they're observations... now backed by evidence.

 

As for Assange, nobody is doubting the authenticity of the documents. What's always doubted is your interpretation of the events.

 

Are you saying that Assange is not an accused rapist?

 

Have you read the release?

Edited by Deranged Rhino
Link to comment
Share on other sites

 

The documents, which you have not read, make the CIA's capabilities clear.

 

Michael Hastings was assassinated -- it's long been a theory. This lends more evidence to that narrative.

 

JFK Jr.'s crash was anything but routine, the timing was always suspicious and now there's evidence that there might have been more at play than just pilot error.

 

Those aren't conclusions, they're observations... now backed by evidence.

 

 

Have you read the release?

 

Which is the whole point. If CIA can take out little known figures like Hastings, why are Assange and Wikileaks still alive when they present a far bigger danger to the Deep State?

 

Maybe because there isn't a Deep State, but a bunch of turf battles inside the organizations, which conspiracy nuts love to exaggerate the molehills into mountains?

Link to comment
Share on other sites

 

Which is the whole point. If CIA can take out little known figures like Hastings, why are Assange and Wikileaks still alive when they present a far bigger danger to the Deep State?

 

Maybe because there isn't a Deep State, but a bunch of turf battles inside the organizations, which conspiracy nuts love to exaggerate the molehills into mountains?

 

Have you read the release?

Link to comment
Share on other sites

×
×
  • Create New...