Creating War While Leading Through Opposition! (VIDEO)

 Creating War While Leading Through Opposition! (VIDEO) | Donald-Trump-is-sending-US-ground-troops-to-Kuwait-to-fight-ISIS-594991 | CIA Government Corruption Mainstream Media Multimedia Propaganda US News

Fake News Media is “the enemy of the American People.” –President Donald Trump

There is less than 21% approval rating for the American media.  The reason is that people in this country understand that it is nothing more than fake and contrived news! Yet, they remain in the present, continuing to lie and to further their agenda by promulgating propaganda, as well as driving support for Donald Trump, as a leader of the opposition. The more the media attacks him, the more support that he garners.

Those pulling the strings behind the corrupt politicians knew that Hillary Clinton never had the support of the American people anymore than John McCain had running against Barrack Hussein Obama.  Sad to say, it took the American people 8 years to figure out that he did everything opposite of what he promised. It was an easy fix.

Fake News now seems to apply to those who are for the Law and the United States Constitution while they expose corruption wherever it may be, even when it hits their favorite politicians. The enemies of America are thankful for people that remain ignorant of their enumerated laws (Hosea 4:6).  So far, the majority of the American people have been very accommodating.

“How fortunate for governments that people never think.” –Adolph Hitler

I reported earlier this year, 70 years of CIA propaganda and corruption, and how disinformation is exactly what they have been spewing out of the CIA for a long time, not only in our country, but in other countries, as well.

Dr. Udo Ulfkotte came out in 2016 exposing the CIA by stating the following:

“The entire mainstream media is totally fake!”

“Taught to lie, to betray the people and not to tell the truth to the public.”

“The CIA gets control over all of the majority of journalists.”

“CIA’s primary mission is to collect, analyze, evaluate, and disseminate foreign intelligence to assist the President and senior U.S. government policymakers in making decisions relating to national security.”

Dr. Ulfkotte dropped dead inside of a year of making those claims.

If you don’t believe what he said, then you deserve what you have coming.

What they say that they do and what they actually are doing are two different stories. The fruit of the CIA has been war, world destabilization, media propaganda, murder, bribery, etc. Listen to former CIA agent John Stockwell:

“It is the function of the CIA to keep the world unstable, and to propagandize the American people to hate, so we will let the establishment spend any amount of money on arms. ….”

Of course, they have been in cahoots with the military industrial complex, which President Eisenhower warned Americans about back in January 1961.

The CIA has become a propaganda outlet.

We can see what former CIA Director William Casey said when reinforcing John Stockwell’s statement:

“We’ll know our disinformation program is complete when everything the American people believe is false.”

The media cannot be trusted, and most of us agree on that (Psalm 101:3).

“If you are not careful, the newspapers (The Media) will have you hating the people who are being oppressed, and loving the people who are doing the oppressing.”

So, how is it that when their favorite politician moves into the White House, all of a sudden, the things that he does, regardless if they are constitutional (legal) or not, as long, (as he has on your favorite jersey) all is accepted? This is exactly what is happening in America.  Once again, it’s a different President, but the same illegal and unconstitutional policies and agenda moves forward. However, as long as you like him, that is all that matters. Where have America’s principles gone? (Jeremiah 5:21)

“Kings will be tyrants from policy, when subjects are rebels from principle.” –Edmond Burke

Americans must adjust to changing times and still hold to unchanging principles (Psalm 119:89).

“For a people that value its privileges above its principles soon loses both.” –President David Eisenhower

Now, we have Hillary Clinton and Donald Trump agreeing as to what should be done with Syria.  Yet, Donald Trump promised a special prosecutor to investigate her for her crimes against “We the People.” He launched 59 Tomahawks in Syria, but refuses to bring forth “the rule of law” concerning corruption here at home? How do they attempt to justify their aggression, they tell you that they have chemical weapons that could be used against us.  Apparently, Americans did not learn that inciting the people to war first comes with a threat regardless if it is legitimate or not. Remember Weapons of Mass Destruction in Iraq under the Bush administration that could never be verified?

That was before Donald Trump became the president, and after he told the American people that they “owed her [Hillary Clinton] a major debt of gratitude” for her service to our country.

How many scandals are exposed concerning these corrupt politicians like that of Nancy Pelosi and Chuck Schumer, and now that Donald Trump is the president, they now agree. Are the flags going up yet?

And to take one step further, Trump’s assault on Syria was praised by world leaders.  Before he was the president, a majority of these “world leaders” were attacking him.  Now that he is the president, they are praising him.

There you have it.  The same world leaders who have been used to lie, steal, kill, sell their people out and wage war across the globe are in concert praising the new President of the United States of America.

How about holding Donald Trump to his own promises when it comes to dealing with corruption inside our borders rather than dealing with corruption outside America? First things first, after all, isn’t that what Donald Trump promised to do? (Psalm 94:16)

How is it that you now believe the media that has been lying to you for so long?  (Romans 1:18)

This is pro-wrestling at its very worst.

Are they now telling you the truth because it is Donald Trump who is the president?  Hypocrites!  Again, isn’t Donald Trump the one that has called out American media resources as “Fake News Media” and the “Enemy of the American people?” America, this is leading through opposition.

As more troops are sent to another war, remember, it will not be Donald Trump’s young men and woman that will fight that war.  It will be our fathers, mothers, brothers, sisters, neighbors and children that will fight these unconstitutional wars.

“The man who can look upon a crisis without being willing to offer himself upon the altar of his country is not fit for public trust.” -President Millard Fillmore

What is it that Trumps administration is not telling you?

Let a former United States Marine tell you what the American media will not.

Another Canadian journalist exposed the lies of the Western media and the US about the war in Syria.

Hopefully, this will sum up the whole of what I am saying for those who have not learned from the past.

Every one of these warmongers claimed to be Christians (Matthew 7:16; 2 Corinthians 11:14).

  • President Jimmy Carter: El-Salvador, Guatemala, Angola, and Afghanistan
  • President Bill Clinton, Balkans, Iraq, Sudan, Rwanda.
  • President George Bush Sr. Gulf war, Panama, Somalia,
  • President George Bush Jr. Iraq, Afghanistan
  • President Barrack Hussein Obama, Libya, Syria, Yemen, Afghanistan and Ukraine

Remember, war is the rule of force. Peace is the reign of law.

When was it America’s job to police the world?

“We Americans have no commission from God to police the world.”

“The Law…Expressed in orderly constitutional methods, is the only King to which we bow.” –President Benjamin Harrison

Furthermore, how many of these above “wars” were constitutional?

America, do you wonder why you are so hated by other countries?  You are hated because of what you allow your representative government to do to other countries, in many cases without provocation.

The best way to enhance freedom in other lands is to demonstrate here that our Republican system is worthy of emulation.

America, when are you going to figure this out? (Psalm 11:3)


Subscribe to The Sleuth Journal Newsletter for Daily Articles!


The post Creating War While Leading Through Opposition! (VIDEO) appeared first on The Sleuth Journal.


Source: Alternative news journal

Share and Enjoy

  • Facebook
  • Twitter
  • Delicious
  • LinkedIn
  • StumbleUpon
  • Add to favorites
  • Email
  • RSS

Neocon Mike Pompeo’s First Public Remarks As CIA Director

Neocon Mike Pompeo’s First Public Remarks As CIA Director | mike-pompeo-donald-trump-cia-1024x577 | CIA Government Sleuth Journal Special Interests

(image: AP Photo/Andrew Harnik)

As long as the CIA exists, world peace, stability and security remain unattainable.

The agency operates secretly and unaccountably. Along with collecting, coordinating and disseminating intelligence, it functions extrajudicially.

It subverts rule of law principles by toppling democratically elected governments, inciting global instability and chaos, backing ISIS and other terrorist groups, assassinating foreign officials, supporting friendly despots, and operating as a global Mafia hit squad – high crimes its specialty.

Its unchecked power shortens the life of the American republic. Its existence threatens world peace.

Neocon Mike Pompeo serves as current director. His  first public remarks at the Center for Strategic and International Studies weren’t encouraging.

The CIA “engages (in) foreign espionage,” said Pompeo. “We steal secrets” – from friends and adversaries alike, he failed to explain.

“And we’re damn proud of it. (We) make no apologies…We utilize our whole toolkit” – every dirty trick and high crime imaginable.

The CIA is “legally prohibited from spying on people through electronic surveillance in the United States. We’re not tapping anyone’s phone…”

Fact: The CIA spies on anyone it wishes anywhere – legally and extrajudicially, its activities unchecked by presidents, Congress or the courts. It’s a rogue agency, making its own rules.

Pompeo: “(W)e do not pursue covert action on a whim and without the approval or accountability.”

FALSE!

Pompeo: “…I inherited an agency that has deep respect for the rule of law and the Constitution.”

FALSE!

Pompeo: “(W)e’re an organization committed to uncovering the truth and getting it right.”

Fact: The CIA is a global Mafia organization, far more vicious, deadly and destructive than private sector criminals.

Pompeo blasted whistleblowers Edward Snowden and Julian Assange. He lied claiming “they care nothing about the lives they put at risk or the damage they cause to national security,” adding:

“WikiLeaks (operates as) a hostile intelligence service…(I)t overwhelmingly focuses on the United States while seeing support from anti-democratic countries and organizations.”

“(O)ur intelligence community determined that Russian military intelligence…used WikiLeaks to release” DNC emails…Russia’s primary propaganda outlet, RT, has actively collaborated with WikiLeaks.”

Fact: Assange, Snowden, Manning and other whistleblowers deserve high praise, not criticism.

Fact: They perform vital services, exposing government high crimes and other wrongdoing.

Fact: Their mission is truth-telling, polar opposite how Western media scoundrels operate and rogue agencies like the CIA, NSA and FBI.

Fact: RT, Sputnik News and other alternative media are vital sources of real news, information and analysis.

Fact: Pompeo’s job is lying, deceiving, misinforming and directing CIA high crimes and other wrongdoing globally.

Claiming disclosures by WikiLeaks and other whistleblowers “caused harm, great harm, to our nation’s national security” is a bald-faced Big Lie.

So is saying Assange, Snowden and other whistleblowers “are not the slightest bit interested in improving civil liberties or enhancing personal freedom,” fundamental rights the CIA is hellbent on destroying – Pompeo its current maestro of misery, directing the agency’s high crimes.

He attacked First Amendment rights, saying “we can no longer allow Assange and his colleagues the latitude to use free speech values against us” – deplorably calling the right to speak freely about anything “a perversion of what our…Constitution stands for. It ends now,” without elaborating on what he intends.

“As the CIA director, it is my sworn duty to uphold the Constitution” – by breaching its fundamental principles.

“…I promise you that the CIA will be tireless in our mission to keep America safe” – by targeting and eliminating legitimate critics of rogue US policies.

America’s intelligence community supports wealth, power and privilege exclusively at the expense of peace, equity and justice for all.


Subscribe to The Sleuth Journal Newsletter for Daily Articles!


Save

The post Neocon Mike Pompeo’s First Public Remarks As CIA Director appeared first on The Sleuth Journal.


Source: Alternative news journal

Share and Enjoy

  • Facebook
  • Twitter
  • Delicious
  • LinkedIn
  • StumbleUpon
  • Add to favorites
  • Email
  • RSS

Lost Privacy Rights in America

Lost Privacy Rights in America | surveillance | Civil Rights Government Control Losing Rights Surveillance US News

America is a total surveillance society. Big Brother is no longer fiction. Sophisticated technologies make total monitoring possible, everyone vulnerable, including presidents.

All our moves, transactions and communications can be recorded, compiled and stored for easy access. Anything we say or do can be used against us.

Bill of Rights protections no longer apply. Collecting meta-data communications on Americans is unrelated to national security.

Judicial oversight is absent. Congressional members are told little about what goes on. The CIA, NSA, FBI and other US spy agencies operate ad libitum, doing whatever they wish unaccountably.

Cable and phone companies want online privacy made illegal. They require permission to use personal information about their subscribers.

They want congressional legislation removing this protection. Senator Jeff Flake (R. AZ) and Rep. Marsha Blackburn (R. TN) support the campaign by cable and phone companies to abolish online privacy.

They intend using Congressional Review Act (1996) authority. It lets Congress review, by expedited legislative procedures, federal regulations issued by government agencies.

They can be rescinded by a joint House and Senate resolution. Once repealed, CRA prohibits reissuing the rule in substantially similar form or issuing a new regulation, substantially the same  – “unless the reissued or new rule is specifically authorized by a law enacted after the date of the joint resolution disapproving the original rule.”

Phone and cable companies want online privacy restrictions removed so they can sell consumer information secretly for profit, without requiring permission to do it.

Privacy rights in America are fast disappearing. If phone and cable companies get their way, they’ll be dealt another severe body blow – congressional members serving them at the expense of consumer and constitutional rights.


Subscribe to The Sleuth Journal Newsletter for Daily Articles!


The post Lost Privacy Rights in America appeared first on The Sleuth Journal.


Source: Alternative news journal

Share and Enjoy

  • Facebook
  • Twitter
  • Delicious
  • LinkedIn
  • StumbleUpon
  • Add to favorites
  • Email
  • RSS

New Wikileaks Vault 7 Release Proves The CIA Bugs “Factory Fresh” iPhones and Other Devices

New Wikileaks Vault 7 Release Proves The CIA Bugs “Factory Fresh” iPhones and Other Devices | cia-spying-iphone-wikileaks-vault-7 | CIA Science & Technology Sleuth Journal Special Interests Surveillance Whistle Blowers

Wikileaks has released another portion of Vault 7 called “Dark Matter.” In this telling release comes the story of the CIA’s involvement in bugging a number of Apple products, including iPhones and the Macbook Air.

In short, the leak exposes how the CIA infects Apple Mac computer firmware to gain ‘persistence’ on Apple devices, including laptops and phones. These projects have been developed by the CIA’s Embedded Development Branch (EDB).

WikiLeaks explains that this ‘bug’ allows an attacker/hacker to boot its attack software from a USB stick onto a device, even when a firmware password has been enabled. According to WiKiLeaks, the infector is stored in the Apple Thunderbolt-to-Ethernet adapter.

Essentially, the leak suggests the CIA is bugging iPhones from their factory fresh state and that, regardless of whether or not the user deletes or re-installs an operating system, their phone is bugged. Data can be collected, devices can be hacked, and so forth.

The full live stream press briefing about this release can be viewed here: LIVE: WikiLeaks press briefing in some minutes: CIA #Vault7 “darkmatter” ask questions with #AskWL https://t.co/ldG78exSsu
— WikiLeaks (@wikileaks) March 23, 2017

 

Below is WikiLeaks’ press release on the matter.

Today, March 23rd 2017, WikiLeaks releases Vault 7 “Dark Matter”, which contains documentation for several CIA projects that infect Apple Mac Computer firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA’s Embedded Development Branch (EDB). These documents explain the techniques used by CIA to gain ‘persistence’ on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware.

Among others, these documents reveal the “Sonic Screwdriver” project which, as explained by the CIA, is a “mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting” allowing an attacker to boot its attack software for example from a USB stick “even when a firmware password is enabled”. The CIA’s “Sonic Screwdriver” infector is stored on the modified firmware of an Apple Thunderbolt-to-Ethernet adapter.

“DarkSeaSkies” is “an implant that persists in the EFI firmware of an Apple MacBook Air computer” and consists of “DarkMatter”, “SeaPea” and “NightSkies”, respectively EFI, kernel-space and user-space implants.

Documents on the “Triton” MacOSX malware, its infector “Dark Mallet” and its EFI-persistent version “DerStake” are also included in this release. While the DerStake1.4 manual released today dates to 2013, other Vault 7 documents show that as of 2016 the CIA continues to rely on and update these systems and is working on the production of DerStarke2.0.

Also included in this release is the manual for the CIA’s “NightSkies 1.2” a “beacon/loader/implant tool” for the Apple iPhone. Noteworthy is that NightSkies had reached 1.2 by 2008, and is expressly designed to be physically installed onto factory fresh iPhones. i.e the CIA has been infecting the iPhone supply chain of its targets since at least 2008.

While CIA assets are sometimes used to physically infect systems in the custody of a target it is likely that many CIA physical access attacks have infected the targeted organization’s supply chain including by interdicting mail orders and other shipments (opening, infecting, and resending) leaving the United States or otherwise.

Why Does This Matter?

We are learning the truth about what government agencies are doing behind the backs of citizens and without their approval. While it can be argued that these measures are taken for the sake of national security, there is much more at play here, and as Edward Snowden has always stated, the public deserves to know, and we all should decide whether or not this is right.

We are in a time when we are learning a great deal about the true workings of our world and governments, and the more we learn, the more questions we have — and rightly so. There is an ‘inconvenient truth’, if you will, that humanity is faced with and must begin to work through, and that is that we do not determine who is elected to our governments like we might think. Our governments are not who we think they are and do not have our best interests at heart.

We must accept this truth, because that is the only way we can begin to change our world and start creating one where humans can thrive. We have the capability to do so, but we must first take the manipulative forces out of the equation. Awareness of what is really going on is that first step. News stories like this help us begin asking those big questions that lead to understanding what’s really going on and then effecting change.


Subscribe to The Sleuth Journal Newsletter for Daily Articles!


The post New Wikileaks Vault 7 Release Proves The CIA Bugs “Factory Fresh” iPhones and Other Devices appeared first on The Sleuth Journal.


Source: Alternative news journal

Share and Enjoy

  • Facebook
  • Twitter
  • Delicious
  • LinkedIn
  • StumbleUpon
  • Add to favorites
  • Email
  • RSS

How The CIA And A Tech Startup Are Arming Police, Intelligence Agencies

How The CIA And A Tech Startup Are Arming Police, Intelligence Agencies | police_watching_surveillance-1024x576 | CIA Civil Rights Government Control Science & Technology Sleuth Journal Special Interests Surveillance Tyranny & Police State

Police use surveillance software, which uses mobile technology and social media to keep tabs on citizens.

By: Eric Draitser, Mint Press News |

It is run out of a quiet, unassuming office on a tree-lined avenue in Bethesda, Maryland.  The rows of hip restaurants are offering young urban professionals all the grande-iced-sugar-free-vanilla-soy-lattes they could ever need. However, this serene suburban idyll belies the fact that serious work for the police state is taking place out of view.

Nestled in a suite just upstairs from the Asian fusion and seafood restaurants is a company that is transforming the way law enforcement, intelligence agencies and even giant corporations communicate within their organizations and with each other.

The company is called BlueLine Grid. It markets itself as “the nation’s premier, trusted collaboration network for law enforcement, first responder and security teams.”  Indeed, BlueLine Grid boasts an impressive array of investors and customers, including the LAPD and General Electric, among others.

But perhaps their most interesting client – and the one that deserves the most scrutiny – is In-Q-Tel, the venture capital and investment arm of the CIA. It is no secret that In-Q-Tel invests in emerging technologies that the U.S. intelligence community, especially the CIA, views as potential tools in their covert trade.

As the “Vault 7” documents published by WikiLeaks have revealed, the CIA’s Directorate for Digital Innovation is involved in hundreds of projects aimed at turning everything from smartphones and televisions to critical computer software into potent weapons for U.S. intelligence. Private companies operating outside of, but in partnership with, the CIA form a vital aspect of the agency’s innovation industry.

BlueLine Grid is a perfect example of the partnership that exists between the intelligence community and the private sector. This partnership raises significant concerns regarding potential breaches of privacy.

Policing the World by Smartphone

How The CIA And A Tech Startup Are Arming Police, Intelligence Agencies | unnamed-file-768x295 | CIA Civil Rights Government Control Science & Technology Sleuth Journal Special Interests Surveillance Tyranny & Police State

BlueLine Grid uses real-time GPS information to allow police officers, intelligence operatives and other potential clients to communicate and coordinate within a given area and respond, in real-time, to changing developments on the ground. (Photo: Blueline Grid marketing material)

BlueLine Grid’s apps allow clients to communicate with team members in a reliable and secure network using a technology called geofencing.  Essentially, the technology allows a particular client (e.g. the Los Angeles or New York police departments) to draw a perimeter on a live map and communicate with all officers within that perimeter.

Put another way, BlueLine Grid uses real-time GPS information to allow police officers, intelligence operatives and other potential clients to communicate and coordinate within a given area and respond, in real-time, to changing developments on the ground. Rather than a walkie-talkie or generic mass text message, BlueLine Grid’s technology allows users to rigidly define a geographic space within which messages can be sent, as well as prevent those messages from being sent outside of the space.

The frightening implication is that this technology could eventually be used to stifle protest and halt communication among protesters. It is not hard to imagine police officers in major U.S. cities using the tech to harass and arrest protesters within specific geographical areas, cutting the legs out from under protests before they even begin.

Considering that police forces across the country are already fully militarized and employ military-style tactics, it would seem that BlueLine Grid is offering yet another potent weapon in the police state’s ongoing war against free speech and assembly. But it goes much further than that, as this technology is now quite literally the property of the CIA thanks to the undisclosed, but assuredly large, investment made in BlueLine Grid by the agency. And the connections to the police state and military-industrial-security complex run far deeper.

The Forces Behind BlueLine Grid

How The CIA And A Tech Startup Are Arming Police, Intelligence Agencies | AP_383838050662-768x499 | CIA Civil Rights Government Control Science & Technology Sleuth Journal Special Interests Surveillance Tyranny & Police State

New York City Police Commissioner William J. Bratton announces that every police officer will be equipped with a smart phone by March 2016 during the New York City Police Foundation’s “State of the NYPD” breakfast, Wednesday, Jan. 20, 2016, in New York. (image: Diane Bondareff/AP)

The company was founded by former politician Jack Weiss and entrepreneur David Riker, along with former New York and Los Angeles police department chief Bill Bratton.  Originally founded as Bratton Technologies, Inc., the company rebranded itself as BlueLine Grid in 2013. A quick look at the background of these individuals offers some insight into how BlueLine Grid got on the fast track to being the premier state intelligence app service.

Bratton, in many ways, has been the public face of the company since its inception. He’s a skilled political operator connected to some of the most important power brokers in Washington, DC.  After founding the company, Bratton had a stint as Commissioner of the New York Police Department, a position from which he resigned in 2016.

Bratton did not retire into obscurity, however. Instead, he took a job with Teneo Holdings, a consulting group closely linked to the Clinton political machine, as well as to Israel and its powerful DC lobby. Teneo Holdings was founded by longtime Clinton advisers Douglas Band and Declan Kelly, who used their Clinton connections to make Teneo into one of the world’s most lucrative consulting firms.

Alongside Bratton, Teneo boasts influential consultants, such as former Clinton and Obama Middle East envoy George Mitchell, and former British Foreign Secretary William Hague. Teneo has essentially become a nexus between law enforcement, the national security state, the military-industrial complex and political power brokers.

Teneo as a whole, and Bratton specifically, have deep ties to Israel, with Bratton having given multiple high-profile speeches, including the keynote address at Israel’s National Conference on Personal Security in Jerusalem, a conclave of some of the leading figures in Israel’s (and the United States’) national security apparatus.

The conference included influential attendees from around the globe.  With Israel having established itself as one of the world’s leading security-tech centers, it’s no wonder that Bratton has cultivated such ties over the years as he established joint-training and close cooperation between the LAPD and Israeli security forces as chief of the department.

How The CIA And A Tech Startup Are Arming Police, Intelligence Agencies | bratton-768x512 | CIA Civil Rights Government Control Science & Technology Sleuth Journal Special Interests Surveillance Tyranny & Police State

NYPD Commissioner William Bratton poses with Israeli officials at the First National Personal Security Conference in Israel.

Considering the way in which Israel criminalizes and represses Palestinian activists, it should come as no surprise that Bratton is also interested in cutting-edge technologies that give his clients the advantage over activists and oppressed communities.

But Bratton is not the only connection between BlueLine Grid and the military-industrial-security state.  Co-founder of BlueLine Grid Jack Weiss has also traveled in some of the elite circles within the security apparatus.

Before co-founding Bratton Technologies, Weiss worked for Altegrity Inc., a private contractor that focused on global investigations and security.  The chairman of Altegrity was the same Bill Bratton who, at the time, had recently retired from the LAPD. Altegrity went on to acquire the infamous Kroll, Inc., a business intelligence and investigations company, with Weiss heading up Kroll’s LA office.

As a 2009 New Yorker profile of the company’s founder Jules Kroll noted:

Kroll really made his living, and his name, on Wall Street. He owed his success …to Goldman Sachs and Skadden Arps and a long list of corporations, law firms, investment banks, management consultants, hedge funds, and brokerage houses…he and his company have been more highly valued for keeping things in the dark than for the occasional, client-approved exposé. They are the keepers of innumerable embarrassing, probably career-destroying, possibly corporation-destroying secrets.

Kroll is widely credited with having created an industry where there was none. Call it corporate intelligence…He offered an ever-widening range of services—forensic accounting, crisis management, competitor analysis—tooled for a globalized business world, in which industrial espionage, counterfeiting, computer fraud, identity fraud, and sophisticated financial crimes have flourished.

Indeed, the Kroll brand was well-known in political and financial circles, perhaps too well-known. As the New Yorker continued:

“With its international intelligence networks and their sometimes unnerving abilities, Kroll began to be described as ‘a private C.I.A.’ This was unhelpful. [Norb] Garrett—who was the C.I.A.’s station chief in Cairo before he joined Kroll—told me, ‘We can’t work in certain parts of the world if people believe we’re C.I.A. We just can’t.’”

Kroll, with its deep ties to the CIA and U.S. intelligence, came under the leadership of Weiss and Bratton in the last decade. Now they’re scratching each other’s backs one more time, this time with CIA seed money bankrolling yet another Weiss-Bratton business venture, BlueLine Grid.

And as the CIA money came flowing in, Weiss chose to move the company from New York to Bethesda, Maryland, just a 10-mile drive from CIA headquarters in Langley.  As Weiss stated:

“We have this incredible pool of talent from industries related to government that enable us to build real, mission critical, serious, hardcore technology right here in the D.C. area…We can take people who have been working on big, serious projects for a past couple years and put them in a new, cool startup environment and create a ton of new value.”

Put another way, BlueLine Grid moved to DC in order to leverage its contacts with the CIA and other government agencies and share talent and resources with them. While it remains a private startup company, BlueLine Grid has become a de facto government contractor, part of the very large revolving door between government and the security-surveillance complex.

Reclaiming the Tech Theater of Conflict

How The CIA And A Tech Startup Are Arming Police, Intelligence Agencies | AP377143519000 | CIA Civil Rights Government Control Science & Technology Sleuth Journal Special Interests Surveillance Tyranny & Police State

(AP Photo/Laszlo Beliczay, MTI)

Thousands of demonstrators hold up their cell phones as they protest against an Internet tax planned to be introduced by the Hungarian government, in front of the Ministry of National Economy in Budapest, Hungary, Sunday, Oct. 26, 2014. Inscription reads: “Mafia government”.

There should be little doubt that the technology with which BlueLine Grid is equipping police forces, intelligence agencies and private corporations could be used against groups that organize to challenge state and corporate power.

That’s why it’s critical that activists from Standing Rock to Zuccotti Park, from Ferguson to Berkeley, be equipped with the necessary technology to defend themselves. They will need hackers to take BlueLine Grid’s technology and turn it into a tool for organizing.

If police and intelligence officers can freely communicate in order to organize and coordinate their actions, so too should protesters and revolutionaries. If the iPhone or Android is a weapon in the hands of the authorities, so too should it be a weapon in the hands of the peaceful protester.

Technology is one of the most critical theaters of conflict with the state and the forces of corporate control. There may be a BlueLine Grid out there working to arm the police with hi-tech weapons, but there are also millions of us working to disarm them and build a better world.


Eric Draitser is a geopolitical analyst based in New York and the founder of StopImperialism.

The post How The CIA And A Tech Startup Are Arming Police, Intelligence Agencies appeared first on The Sleuth Journal.


Source: Alternative news journal

Share and Enjoy

  • Facebook
  • Twitter
  • Delicious
  • LinkedIn
  • StumbleUpon
  • Add to favorites
  • Email
  • RSS

The CIA Can Now Order Drone Strikes Without Pentagon Approval

The CIA Can Now Order Drone Strikes Without Pentagon Approval | drone-operators-1024x576 | CIA Drones Government Military Pentagon Trump

(image: U.S. Air Force/Tech. Sgt. Nadine Barclay)

By: Ben Sullivan, Motherboard |

President Trump is widening the CIA’s remit on targeted killing.

Last November, Motherboard asked how President Trump would handle the legacy of his predecessor’s drone program. Much was unclear, but four months later, we have our answer: America’s remote killing strategy is only intensifying.

Trump has given unprecedented power to the CIA to expand its killing program and launch drone strikes against targets, drone strikes that have no legal obligation for public disclosure and do not require the the approval of the Pentagon.

Dan Gettinger, co-director at the Center for the Study of the Drone at Bard College, told Motherboard in an email that Trump’s decision repeals a central restriction placed on the targeted killing program by the Obama administration.

In a distinct change to Obama’s policies, which allowed the CIA to hunt and surveil suspected terror targets but required the permission of the military to physically launch a missile strike, The Wall Street Journal reports that Trump has given the CIA authority to pull the trigger on its own strikes. This decision came shortly after his inauguration, and has already been used in a strike against al Qaeda deputy Abu al-Khayr al-Masri in February, the newspaper reports.

“Although the CIA never abandoned its role in drone strikes, the agency will now have greater freedom to carry out strikes on its own,” Gettinger said. “In the coming months, we are likely to see a further redefinition of the targeted killing program by the Trump administration.”

The unnamed US officials speaking to the Journal said that the new authority the CIA possesses can only be used for operations in Syria, but there are fears the CIA could easily expand its remit to outside of the country.

Obama’s decision to allow the military to preside over the final call on drone strikes, rather than the CIA, promoted heightened transparency and public disclosure on America’s drone operations. The CIA can now kill at will, unaffected by the need for public disclosure.

The revelation comes as US officials admit the Trump administration has almost put the finishing touches on a drone strike review that lowers the threshold on acceptable civilian casualties injured or killed in a drone strike, according to The Washington Post. The review goes back on policies Obama introduced, and could give the Pentagon permission to launch its own strikes without the approval from the White House.

It was previously unclear how Trump would wage his war against terror, but it is now obvious that the drone strike complex initiated by Bush, propelled by Obama, and now inherited by Trump continues to expand along the same trajectory.

The post The CIA Can Now Order Drone Strikes Without Pentagon Approval appeared first on The Sleuth Journal.


Source: Alternative news journal

Share and Enjoy

  • Facebook
  • Twitter
  • Delicious
  • LinkedIn
  • StumbleUpon
  • Add to favorites
  • Email
  • RSS

VAULT 7 – Real Leaker and Why Now (VIDEO)

VAULT 7 - Real Leaker and Why Now (VIDEO) | obama-wiretap-trump-tower | CIA Government Corruption Multimedia National Security Agency Sleuth Journal Special Interests Surveillance US News Whistle Blowers

By: Barry Soetoro |

Who really leaked VAULT 7 details on CIA eavesdropping thru your TV and cellphone? Did ‘good guys’ really expose these Deep State secrets — or were they leaked for a sinister purpose by ‘bad guys?’

And why now? Why is this the perfect time for the real leaker to expose Deep State spying to the general public?

As America realizes NSA wiretapping is out of control and reels at the thought of illegal CIA surveillance, are we distracted from the shocking fact that Obama wiretapped Trump Tower to help Hillary win the 2016 election?

Should we be happy or suspicious that Wikileaks (Julian Assange) supposedly leaked these Vault 7 documents exposing Deep State spying on every American citizen in violation of the 4th Amendment?

For Updates, Subscribe to ‘Barry Soetoro’ Channel: https://www.youtube.com/channel/UCgzi…

Save

The post VAULT 7 – Real Leaker and Why Now (VIDEO) appeared first on The Sleuth Journal.


Source: Alternative news journal

Share and Enjoy

  • Facebook
  • Twitter
  • Delicious
  • LinkedIn
  • StumbleUpon
  • Add to favorites
  • Email
  • RSS

Top 15 Discoveries and Implications of Wikileaks CIA Vault 7 – So Far

Top 15 Discoveries and Implications of Wikileaks CIA Vault 7 – So Far | hacking | CIA Science & Technology Sleuth Journal Surveillance US News Whistle Blowers

Vault 7 has been the subject of a curious and cryptic set of tweets from Wikileaks over the course of the past month or so. Now we know why. In bombshell news, in the greatest leak in Wikileaks history, in the greatest leak in CIA history, a total of 8,761 documents has been released in a series that has been dubbed Vault 7. Even for seasoned conspiracy researchers, the documents are fascinating and horrible at the same time. It confirms the suspicions and knowledge of many investigators. Now we have the proof to substantiate our hunches and intuition. The CIA has been caught with its pants down: spying on its citizens, bypassing encryption to steal their messages, hacking into their electronic devices to listen on their conversations, using US consulates abroad to conduct spying operations, remotely hacking into vehicles (to perform undetectable assassinations) and much more.

Some will be shocked, but really, let’s remember the true nature and purpose of the CIA: a rogue agency that overthrows foreign leaders, installs puppet regimes, imports drugs, runs guns and assassinates anyone who gets in the way of its agenda, including US presidents. Wikileaks has stated that it has only released less than 1% of its Vault 7 series, so this is literally the tip of the iceberg. Imagine what else is to come …

Here are the top 15 discoveries and implications of Vault 7 so far:

Vault 7 Discovery/Implication #1: CIA = Virus & Malware Factory

The CIA is not just a rogue agency that runs illegal drugs and weapons, assassinates people, starts wars and conducts regime change. It has also spent untold millions or even billions of dollars developing what is probably the most sophisticated cyber warfare/hacking/spying department on the planet, equaling or even surpassing that of the NSA. Wikileaks reveals that the CIA has its own “hacking division” that is run by its CCI (Center for Cyber Intelligence) which by the end of 2016:

“… had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other “weaponized” malware. Such is the scale of the CIA’s undertaking that by 2016, its hackers had utilized more code than that used to run Facebook. The CIA had created, in effect, its “own NSA” with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.”

Snowden’s leaks were already bad enough, showing that the NSA was an agency above the law that monitored, surveilled and spied upon just about anyone it wanted, since most people on the planet are within its reach in one way or another. Now, we have confirmation that the CIA is engaging in exactly the same kind activity, or perhaps even worse. Could there be any possible doubt left by anyone that the MIC (Military Intelligence Complex) runs the US Government and the world?

Vault 7 Discovery/Implication #2: Bypassing Encryption

You know how all these companies promise encryption and some even charge more for the service? Guess what? It doesn’t matter! Vault 7 leaked docs shows that the CIA is getting audio files before they get encrypted. The CIA can hack into your phone, compromise your operating system and suck up your messages before they’re encrypted and sent. It doesn’t matter what precautions you’ve taken. Encrypted messaging apps like WhatsApp, Signal, Telegram and many more are vulnerable.

Vault 7 Discovery/Implication #3: Bypassing Computer Operating System

The CIA can hack your computer. In fact, every part of your computer can be bypassed, including your operation system. Per Wikileaks:

“The CIA has developed automated multi-platform malware attack and control systems covering Windows, Mac OS X, Solaris, Linux and more, such as EDB’s “HIVE” and the related “Cutthroat” and “Swindle” tools.”

Vault 7 Discovery/Implication #4: Smart TVs become Spy TVs

It was obvious to anyone with half a functioning brain cell that smart TVs were basically spy TVs (see The SMART Deception), but now we have the proof. In the Vault 7 docs, the CIA has a program called Weeping Angel (read ’em and weep) that it developed with the MI5/BTSS (British Security Service). It details how the CIA can hack Samsung smart TVs and then place them in fake-off mode so that an unsuspecting owner falsely believes their TV is off – when really it is on, recording all sounds in the room and transmitting them via the net to a covert CIA server.

Top 15 Discoveries and Implications of Wikileaks CIA Vault 7 – So Far | CIA-copyright-infringement-kimdotcom-479x685 | CIA Science & Technology Sleuth Journal Surveillance US News Whistle Blowers

Vault 7 Discovery/Implication #5: MicroSoft MicroSpy Software

Bill Gates is the agenda-man for the New World Order. Clearly he sold out a long, long time ago. Kim Dotcom has been particularly vocal, calling for Gates to come clean (ain’t gonna happen) and admit how much he helped the CIA (and the MIC in general) by helping them build backdoors in the software. The CIA turned Microsoft software into spyware, using exploits that were built into the system:

“The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized “zero days”, air gap jumping viruses such as “Hammer Drill” which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( “Brutal Kangaroo”) and to keep its malware infestations going.

Many of these infection efforts are pulled together by the CIA’s Automated Implant Branch (AIB), which has developed several attack systems for automated infestation and control of CIA malware, such as “Assassin” and “Medusa”.”

Top 15 Discoveries and Implications of Wikileaks CIA Vault 7 – So Far | windows-CIA-spyware-kimdotcom-479x278 | CIA Science & Technology Sleuth Journal Surveillance US News Whistle Blowers

Vault 7 Discovery/Implication #6: Skype is Vulnerable

Vault 7 reveals that conversations on Skype are converted to text then uploaded to a CIA cloud for data assortment and analysis.

Vault 7 Discovery/Implication #7: iPhones and Androids are Vulnerable

Both Apple iOS and Android systems are vulnerable. Snowden already told us this, but Vault 7 re-confirms that iPhones and Android are easily hackable. The CIA has been creating all kinds of malware to spy on practically every piece of electronic equipment you own.

Top 15 Discoveries and Implications of Wikileaks CIA Vault 7 – So Far | vault-7-CIA-keeping-US-unsafe-snowden-tweet-479x150 | CIA Science & Technology Sleuth Journal Surveillance US News Whistle Blowers

Vault 7 Discovery/Implication #8: Breaking “Zero Day” Commitment by Hoarding Vulnerabilities

Wikileaks notes that Obama had promised the technology industry (after much lobbying) that the US Government would disclose any vulnerabilities as soon as it had discovered them (thus the term “zero day”). Yet the CIA stockpiled these vulnerabilities because it wanted to retain the advantage of knowing how to hack into systems and devices, which endangers everyone else who uses them:

“”Year Zero” documents show that the CIA breached the Obama administration’s commitments. Many of the vulnerabilities used in the CIA’s cyber arsenal are pervasive and some may already have been found by rival intelligence agencies or cyber criminals.

As an example, specific CIA malware revealed in “Year Zero” is able to penetrate, infest and control both the Android phone and iPhone software that runs or has run presidential Twitter accounts. The CIA attacks this software by using undisclosed security vulnerabilities (“zero days”) possessed by the CIA but if the CIA can hack these phones then so can everyone else who has obtained or discovered the vulnerability. As long as the CIA keeps these vulnerabilities concealed from Apple and Google (who make the phones) they will not be fixed, and the phones will remain hackable.”

Vault 7 Discovery/Implication #9: Hijacking All Sorts of Vehicles – for Assassination

Of all the discoveries, this one is explosive – literally. Vault 7 exposes that the CIA has the ability to remotely hijack all kinds of vehicles (including cars and planes), which means it can carry out undetectable assassinations. This casts a new light on the suspicious death of Michael Hastings, whose car burst into flames and ran into a tree at high speed. It also makes one wonder about the deaths of JFK Jr. (son of John F. Kennedy) and former US senator Paul Wellstone, both of whom died in suspicious plane accidents.

Vault 7 Discovery/Implication #10: Using US Consulate in Germany as a Spy and Hacking Base

You can imagine how impressed the Germans are with the US now. Remember when it was revealed that Obama was hacking the cell phone of German Chancellor Angela Merkel? Now we learn that the CIA, in flagrant violation of international law, has been using the US consulate in Frankfurt, Germany, as a base for its spying and hacking activities, many of which in this case required a close physical proximity to the target. From Wikileaks:

“CIA hackers operating out of the Frankfurt consulate ( “Center for Cyber Intelligence Europe” or CCIE) are given diplomatic (“black”) passports and State Department cover.

Your Cover Story (for this trip)
Q: Why are you here?
A: Supporting technical consultations at the Consulate.

A number of the CIA’s electronic attack methods are designed for physical proximity. These attack methods are able to penetrate high security networks that are disconnected from the internet, such as police record database. In these cases, a CIA officer, agent or allied intelligence officer acting under instructions, physically infiltrates the targeted workplace. The attacker is provided with a USB containing malware developed for the CIA for this purpose, which is inserted into the targeted computer. The attacker then infects and exfiltrates data to removable media.”

Vault 7 Discovery/Implication #11: CIA-Electronics Supplier Collusion

Another aspect to consider with this is CIA collusion with electronics manufacturers and suppliers. We know the CIA owns the MSM, Hollywood, the Communication Industry, etc. Wikileaks reports that the CIA’s Mobile Device Branch created technology to infect and control smartphones. Do they possess a backdoor into the software and hardware of all smartphones?

Vault 7 Discovery/Implication #12: Fiscal Damage

The CIA has caused worldwide damage that can be estimated in millions or maybe even billions of dollars, since they can’t now control the malware they have created. The CIA has lost control of the monster it created. We are all vulnerable. How much data will be hacked, how much privacy stolen and how much money will it cost to prevent and repair this breach?

Vault 7 Discovery/Implication #13: Project Umbrage: The Framing of Foreign Nations like Russia

Well well well. Remember all that brouhaha about Russia hacking the US elections? It was all lies and propaganda, but many people fell for it. Now look at this. The CIA has been using a program called Project Umbrage under which it manipulates code to make it look like it comes from somewhere else like another nation. You could call it false flag cyber terrorism. In other words, the CIA clones the hacking procedures of Russia to create false flag hacking attacks, and then says with a straight face that the attacks “are consistent with what we would expect from Russian hackers”. That may be technically truthful (but what deceit!) – however only because the CIA has first intentionally mimicked those techniques with a motive to frame an innocent party or country. As YouTuber Joe in General writes:

“The CIA’s Remote Devices Branch gathers and maintains a large library of attack techniques stolen from malware produced in other countries, including Russia. One particular attack technique is the ability leave behind fake digital “fingerprints” that make it look like a CIA initiated cyber attack was done by someone else. At this early stage, its unclear if this is WikiLeaks’ interpretation of one thing the CIA could do, or if there’s a specific place in the document where the CIA mentions this use of UMBRAGE.)

This is HUGE. The ability to create a digital false flag calls into question anytime in recent history that the CIA has accused another country of hacking. “We have proof that Russia hacked the U.S election.””

Top 15 Discoveries and Implications of Wikileaks CIA Vault 7 – So Far | nro-national-reconnaisance-office-we-own-the-night | CIA Science & Technology Sleuth Journal Surveillance US News Whistle Blowers Top 15 Discoveries and Implications of Wikileaks CIA Vault 7 – So Far | nro-national-reconnaisance-office-nothing-beyond-our-reach | CIA Science & Technology Sleuth Journal Surveillance US News Whistle Blowers

Vault 7 Discovery/Implication #14: The CIA-NSA Turf War

For some time, we have known about the rivalry or turf war going on between the CIA and NSA in their struggle to become the preeminent military intelligence agency. Another implication of Vault 7 is that we now know for sure that the CIA has a hacking system that is at least equivalent to, if not better than, that of the NSA. The spying, criminality and illegality of the NSA is already miles past the line of what is acceptable in a free, open and just society. Now the CIA has doubled the criminality? Where’s the line here? What are the other 16-17 agencies doing? What’s the DIA (Defense Intelligence Agency) doing to us? What about the creepy NRO (National Reconnaisance Office), who sports mottos such as “Nothing is Beyond Our Reach” and “We Own the Night” (see above)?

Are all these agencies in some kind of selfish, macho competition to see who can enslave us the fastest?

Top 15 Discoveries and Implications of Wikileaks CIA Vault 7 – So Far | vault-7-CIA-higher-than-president-479x722 | CIA Science & Technology Sleuth Journal Surveillance US News Whistle Blowers

This chart shows the CIA at the top of the tree, feeding data to the Executive Branch (the President). Black-and-white proof the CIA is above the President?

Vault 7 Discovery/Implication #15: CIA Above the Rank of President

JFK found out the hard way that presidents don’t tell what the CIA to do. The CIA tells the president what to do. The image above is interesting proof showing that the CIA is further up in the hierarchy that the Executive Branch.

Top 15 Discoveries and Implications of Wikileaks CIA Vault 7 – So Far | kimdotcom-obama-spy-trump-479x249 | CIA Science & Technology Sleuth Journal Surveillance US News Whistle Blowers

Reactions

The timing of this release is interesting, given it occurred right after Trump accused Obama of wiretapping – an accusation in itself which is totally unprecedented. When has a sitting president ever even come to close to accusing a former president of any crime like that? Trump has been vindicated, but only in a certain sense. The CIA has no need to single him out when it can literally spy on anyone who owns a smart phone, smart TV or computer, or who uses Skype or WhatsApp.

Melissa Dykes of Truthstream Media suggests the leak may cause more apathy or learned helplessness, and that may be true, but it really depends on people’s attitudes in response to this information. Sadly and predictably, many US Government officials have reacted by scampering to find who did the leaking, rather than address the magnitude of the content of the leaks themselves.

Live by the Sword, Die by the Sword

The CIA has lived by the sword ever since its inception. It has always played with fire. Now it has lost control of a big chunk of its weapons – its cyber weaponry. The implications of Vault 7 are monumental yet hard to comprehend at this point. What this means is that any nation hostile to the US (and there’s a long list of invaded and subverted nations the CIA has left in its wake since 1953) can now use these weapons against America. It also opens the door to genuine criminal thief-hackers who are just out to steal information and money.

What the CIA has done is not just negligent. It’s not even just reckless – it’s brazenly criminal and utterly unaccountable.

They Want TOTAL INFORMATION CONTROL

The CIA is just another tool for the people who run the world. They want total information control. They want to know what you’re thinking. And they may already have the capacity to do that. This is just the beginning. Wikileaks has only released 1% of Vault 7. Multiply the revelations so far by 100. What do you get?

They want to know what you’re thinking and control your every act. They want you to be a completely controllable slave.

No one could be that evil? Oh yes they could, or rather, the dark force controlling them could.

Have a critical mass of people finally awoken to this horrible fact yet?

Can the Vault 7 leak get us to the point where we can fully face this reality?

Sources:

*https://wikileaks.com/ciav7p1/

*https://wikileaks.com/ciav7p1/cms/page_20251151.html

*http://freedom-articles.toolsforfreedom.com/russian-hack-supposedly-confirmed-cia/

*https://www.youtube.com/watch?v=es2gXuE1RNo

*https://www.youtube.com/watch?v=La3AiTmIWwY

The post Top 15 Discoveries and Implications of Wikileaks CIA Vault 7 – So Far appeared first on The Sleuth Journal.


Source: Alternative news journal

Share and Enjoy

  • Facebook
  • Twitter
  • Delicious
  • LinkedIn
  • StumbleUpon
  • Add to favorites
  • Email
  • RSS

Every ‘Conspiracy Theorist’ In America Has Just Been Vindicated…

Every ‘Conspiracy Theorist’ In America Has Just Been Vindicated… | surveillance | CIA Government Government Corruption National Security Agency Science & Technology Sleuth Journal Special Interests Surveillance Whistle Blowers

Yes, the government can use your phone, your computer and even potentially your television to spy on what you are doing inside your own home. Last Tuesday, Wikileaks released thousands of documents that prove what virtually every “conspiracy theorist” in America has been saying for years about government spying. And I don’t even like to use the term “conspiracy theorist” much, because the truth is that most “conspiracy theorists” are simply citizen journalists that are attempting to expose things that the mainstream media doesn’t want to talk about. And one of the things that the mainstream media has always been hesitant to address is the unconstitutional surveillance that U.S. intelligence agencies systematically conduct on their own citizens.

But now the mainstream media is being forced to talk about government surveillance because Wikileaks has just exposed it for all the world to see. According to Wikileaks, the CIA has been secretly running “its ‘own NSA’ with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified”. It is known as the Central Intelligence Agency’s Center for Cyber Intelligence, and it has produced “more than a thousand hacking systems, trojans, viruses, and other ‘weaponized’ malware”. In fact, the computer or phone that you are reading this article on may be infected with one of their programs right now.

The documents that were released by Wikileaks show that government spooks can remotely take control of Apple iPhones, Google Android phones, Microsoft Windows operating systems and Samsung smart televisions, and once in control of those devices they can use them to spy on their owners.

The ironic thing is that while Barack Obama and members of Congress have been accusing Russia of conducting cyberattacks, the truth is that U.S. intelligence agencies have been perhaps the biggest offenders of all.

This is an absolutely massive scandal, and I truly hope that it gets the attention that it deserves in the days ahead. The following is a portion of the press release that Wikileaks issued on Tuesday

Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

“Year Zero” introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.

Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA). The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force — its own substantial fleet of hackers. The agency’s hacking division freed it from having to disclose its often controversial operations to the NSA (its primary bureaucratic rival) in order to draw on the NSA’s hacking capacities.

By the end of 2016, the CIA’s hacking division, which formally falls under the agency’s Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other “weaponized” malware. Such is the scale of the CIA’s undertaking that by 2016, its hackers had utilized more code than that used to run Facebook.

After learning about this, you may never look at your smart TV the same way again.

In fact, according to the documents that Wikileaks has given us the CIA can even use your smart TV to spy on you when it appears to be turned off

A program dubbed “Weeping Angel” after an episode of the popular British TV science fiction series “Dr. Who,” can set a Samsung smart TV into a fake “off” mode to fool the consumer into thinking the TV isn’t recording room sounds when it still is. The conversations are then sent out via the user’s server. The program was developed in conjunction with MI5, the British FBI equivalent of a domestic counterintelligence and security agency, according to the WikiLeaks documents.

And if your phone has been infected by the CIA, they can remotely turn on the camera and microphone whenever they want and use the phone as a GPS locator to track you wherever you go. The following comes from USA Today

CIA-created malware can penetrate and then control the operating systems for both Android and iPhone phones, allege the documents. This software would allow the agency to see the user’s location, copy and transmit audio and text from the phone and covertly turn on the phone’s camera and microphone and then send the resulting images or sound files to the agency.

Just two days ago I wrote a major article warning that the government has the capability to do these sorts of things.

This stuff is really going on, and it needs to stop now. I warned about some of this advanced “Big Brother technology” in my apocalyptic novel “The Beginning Of The End“, and many of us have been screaming about what U.S. intelligence agencies have been doing for years and years. Now that President Trump is extremely upset that the government was spying on him, let us hope that he steps up to the plate and puts an end to this unconstitutional surveillance for good.

In the documents that Wikileaks has just released there is even discussion about the CIA potentially being able to infect a vehicle control system. Presumably the goal would be to remotely take control of a vehicle and either spy on the occupants or kill them by driving into an obstacle at very high speed.

And if you can believe it, the CIA has also been developing ways to make it look like a cyberattack that they conducted actually came from the Russians. The following comes from an article by Jerome Corsi

The Wikileaks “Vault 7” drop of CIA cyber-warfare documents contains the startling revelation that the CIA, under a project identified as “Umbrage,” maintained a substantial library of Russian cyber-attack techniques “stolen” from malware produced in other states including the Russian Federation.

Of course when it comes to violations of privacy, the NSA is even worse than the CIA.

The NSA systematically collects all forms of digital communication and stores them in a giant data center out in Utah. So nothing that you do on a digital device is ever truly private. If you don’t believe the article that I posted the other day, perhaps you will believe a 36 year veteran of the NSA named William Binney

President Donald Trump is “absolutely right” to claim he was wiretapped and monitored, a former NSA official claimed Monday, adding that the administration risks falling victim to further leaks if it continues to run afoul of the intelligence community.

“I think the president is absolutely right. His phone calls, everything he did electronically, was being monitored,” Bill Binney, a 36-year veteran of the National Security Agency who resigned in protest from the organization in 2001, told Fox Business on Monday. Everyone’s conversations are being monitored and stored, Binney said.

Did you catch that last sentence?

Binney knows very well that all of our conversations are systematically being monitored and stored because he helped build the systems that do it.

Now that all of this is out in the open, America has two choices.

We can end this unconstitutional surveillance and go back to being a nation that respects privacy, or we can allow it to continue and keep heading down the road toward becoming a “Big Brother” surveillance society far worse than anything that George Orwell ever warned about.

The post Every ‘Conspiracy Theorist’ In America Has Just Been Vindicated… appeared first on The Sleuth Journal.


Source: Alternative news journal

Share and Enjoy

  • Facebook
  • Twitter
  • Delicious
  • LinkedIn
  • StumbleUpon
  • Add to favorites
  • Email
  • RSS

UK Helped Obama WIRETAP Trump? Insider Explains FBI, NSA Coup (VIDEO)

UK Helped Obama WIRETAP Trump? Insider Explains FBI, NSA Coup (VIDEO) | obama-wiretap | CIA Multimedia National Security Agency Obama Exposed Sleuth Journal Special Interests Trump US News

(image: SOTN)

By: Barry Soetoro |

Did the UK help Obama wiretap Trump Tower?

Larry Johnson (former CIA) explains HOW Obama used FBI and NSA to illegally bug Trump — WHY that is Sedition — and WHICH criminals helped Obama commit this Treasonous crime.

Larry Johnson (former CIA): “All of this was part of a coordinated planned campaign by people that are linked to Barack Obama.”

“Both Jim Clapper and John Brennan (at CIA) were intimately involved in trying to derail the candidacy of Donald Trump. There was some collusion overseas with Britain’s own GCHQ. That information gathered from GCHQ was actually passed to John Brennan, and it was disseminated within the US Government. This dissemination was illegal………”

“There are still senior people in jobs at the Director of National Intelligence office, the office of the Central Intelligence Agency, the National Security Agency that ought to be fired, Larry Johnson, retired CIA and State Department official, told RT.”

For Updates, Subscribe to ‘Barry Soetoro’ Channel: https://www.youtube.com/channel/UCgzi…

Save

The post UK Helped Obama WIRETAP Trump? Insider Explains FBI, NSA Coup (VIDEO) appeared first on The Sleuth Journal.


Source: Alternative news journal

Share and Enjoy

  • Facebook
  • Twitter
  • Delicious
  • LinkedIn
  • StumbleUpon
  • Add to favorites
  • Email
  • RSS