+ Reply to Thread
Page 4 of 18 FirstFirst 1 4 14 18 LastLast
Results 61 to 80 of 352

Thread: Vault 7

  1. Link to Post #61
    France On Sabbatical
    Join Date
    7th March 2011
    Location
    Brittany
    Posts
    16,763
    Thanks
    60,315
    Thanked 95,889 times in 15,481 posts

    Default Re: Vault 7

    Snowden Says WikiLeaks CIA Classified Leaks Archive 'Looks Authentic'

    Sputnik World 20:25 - 07.03.2017


    © AFP 2017/ Frederick Florin

    Edward Snowden, former National Security Agency (NSA) contractor, turned whistleblower, said Tuesday that alleged CIA files released by WikiLeaks seemed "authentic" and "a big deal."

    MOSCOW (Sputnik) — Earlier in the day, WikiLeaks began publishing its trove of classified documents, allegedly belonging to the US intelligence agency.
    "Still working through the publication, but what @Wikileaks has here is genuinely a big deal. Looks authentic," Snowden said on his Twitter.
    Quote
    Edward Snowden‏Verified account @Snowden 1h1 hour ago
    Edward Snowden Retweeted WikiLeaks
    PSA: This incorrectly implies CIA hacked these apps / encryption. But the docs show iOS/Android are what got hacked - a much bigger problem.

    Edward Snowden added,
    WikiLeaksVerified account @wikileaks
    WikiLeaks #Vault7 confirms CIA can effectively bypass Signal + Telegram + WhatsApp + Confide encryption https://wikileaks.org/ciav7p1

    122 replies 3,872 retweets 3,496 likes

    Edward Snowden‏Verified account @Snowden

    Still working through the publication, but what @Wikileaks has here is genuinely a big deal. Looks authentic.

    8:53 AM - 7 Mar 2017
    163 replies 3,469 retweets 4,500 likes
    ​Snowden added that "Program & office names, such as the JQJ (IOC) crypt series" were what made him trust the authenticity of the release as "only a cleared insider could know them."

    Snowden has been residing in Russia since 2013, when he fled the United States after exposing the NSA massive online spying scheme.


    Related:
    Wikileaks Reveals CIA Developed Means to Counter Most Prominent Anti-Viruses
    "La réalité est un rêve que l'on fait atterrir" San Antonio AKA F. Dard

    Troll-hood motto: Never, ever, however, whatsoever, to anyone, a point concede.

  2. The Following 13 Users Say Thank You to Hervé For This Post:

    Bill Ryan (8th March 2017), BMJ (8th March 2017), Cidersomerset (7th March 2017), cursichella1 (7th March 2017), Eram (7th March 2017), Ewan (7th March 2017), Innocent Warrior (7th March 2017), Jean-Marie (7th March 2017), KiwiElf (8th March 2017), ponda (8th March 2017), Reinhard (20th April 2017), StandingWave (7th March 2017), The Freedom Train (8th March 2017)

  3. Link to Post #62
    UK Avalon Member Cidersomerset's Avatar
    Join Date
    16th May 2011
    Location
    Bridgwater somerset UK
    Age
    63
    Posts
    22,333
    Thanks
    33,460
    Thanked 79,632 times in 18,693 posts

    Default Re: Vault 7

    It could be early days but no articles on the intel infiltrated US media like CNN ,
    ABC ,NBC , MSNBC & CBS maybe they are waiting for their briefing notes
    from Langley ? or just slow off the mark...LOL . They may have printed articles but
    nothing on any of their u'tub channels yet.....

    ---------------------------------------------------------------------------------------------

    Wikileaks 'reveals CIA hacking tools' - BBC News

    https://www.youtube.com/watch?v=GXuVWyMTYTk

    Published on 7 Mar 2017
    After weeks of hints, Wikileaks has posted a huge amount of documents which it
    says show hacking tools used by the US central intelligence agency. The CIA's told
    the BBC "We do not comment on the authenticity or content of purported
    intelligence documents". Our security correspondent Gordon Correra has begun
    sifting through them - here's his initial impressions.

    ==============================================

    WIKILEAKS VAULT 7 CIA CAN SPY THROUGH TELEVISION:
    Edward Snowden Analyzes WikiLeaks Vault 7



    Published on 7 Mar 2017
    WikiLeaks releases 'entire hacking capacity of the CIA'

    ===============================================
    CIA HOARDED ZERO DAY VULNERABILITY REVEALS WIKILEAKS VAULT 7:
    CIA Can Hack Trump Twitter

    https://www.youtube.com/watch?v=9_wZYCiqiQM

    Published on 7 Mar 2017
    WikiLeaks releases 'entire hacking capacity of the CIA'

    ================================================

    CIA declines to comment on WikiLeaks document dump

    https://www.youtube.com/watch?v=KcSMtNstaFA

    Published on 7 Mar 2017
    Docs purportedly from CIA's Center for Cyber Intelligence; Benjamin Hall reports
    from London
    Last edited by Cidersomerset; 7th March 2017 at 20:43.

  4. The Following 9 Users Say Thank You to Cidersomerset For This Post:

    Bill Ryan (8th March 2017), BMJ (8th March 2017), cursichella1 (8th March 2017), Eram (7th March 2017), Innocent Warrior (7th March 2017), KiwiElf (8th March 2017), Noelle (8th March 2017), ponda (8th March 2017), The Freedom Train (8th March 2017)

  5. Link to Post #63
    UK Avalon Member Cidersomerset's Avatar
    Join Date
    16th May 2011
    Location
    Bridgwater somerset UK
    Age
    63
    Posts
    22,333
    Thanks
    33,460
    Thanked 79,632 times in 18,693 posts

    Default Re: Vault 7

    Quote It could be early days but no articles on the intel infiltrated US media like CNN ,
    ABC ,NBC , MSNBC and CBS , maybe they are waiting for their briefing notes
    from Langley ? or just slow off the mark...LOL . They may have printed articles but
    nothing on any of their u'tub channels yet.....
    Well that's 'spooky' ..LOL ...The first of the 'big boys' must have read my post above.
    They play it down and focus on dangers to operatives rather than being spied on...


    What WikiLeaks' CIA hacking documents may reveal

    4 minutes ago....



    Published on 7 Mar 2017
    Tuesday, WikiLeaks published thousands of documents that they say
    reveal the scope of the CIA's global hacking program. Mike Baker, a
    former CIA covert operations officer, spoke to CBSN about what these
    leaks reveal.

    ====================================================

    WikiLeaks releases documents on CIA hacking

    https://www.youtube.com/watch?v=mQklU-RJWIg

    Published on 7 Mar 2017
    WikiLeaks has released thousands of documents it says include sensitive materials
    from the Central Intelligence Agency's Center for Cyber Intelligence. Cybersecurity
    analyst Theresa Payton joins CBSN to discuss the leak and what it means for
    America's cyberespionage program.

    ====================================================

    WikiLeaks Dump Claims to Show CIA Hacking Tools

    https://www.youtube.com/watch?v=kPGJoZX-c4Q

    Published on 7 Mar 2017
    WikiLeaks says documents it obtained reveal that the CIA targeted everyday
    gadgets such as smartphones and personal computers as part of a surveillance
    program. AP reporter Jack Gillum explains why the release could be damaging to
    the CIA. (March 7)
    Last edited by Cidersomerset; 7th March 2017 at 21:43.

  6. The Following 7 Users Say Thank You to Cidersomerset For This Post:

    Bill Ryan (8th March 2017), BMJ (8th March 2017), cursichella1 (8th March 2017), Eram (7th March 2017), Innocent Warrior (7th March 2017), KiwiElf (8th March 2017), The Freedom Train (8th March 2017)

  7. Link to Post #64
    France On Sabbatical
    Join Date
    7th March 2011
    Location
    Brittany
    Posts
    16,763
    Thanks
    60,315
    Thanked 95,889 times in 15,481 posts

    Default Re: Vault 7

    FBI refusal to divulge Tor hack code sees child porn evidence thrown out of court

    RT
    Published time: 26 May, 2016 16:34
    Get short URL


    © Jessica Rinaldi / Reuters

    A US District court judge has thrown out evidence submitted by the FBI because they refuse to reveal exactly how they hacked into the servers of visitors to a child porn website.

    In April it was revealed that a key Tor software developer was hired by the FBI, through a contractor, to create malware to help the FBI hack into a childporn website and spy on its users.

    Tor software is a non-profit, anti-surveillance network that allows users to enter websites undetected by routing traffic through thousands of servers, and is a prerequisite for visiting hidden ‘dark web’ directories.

    In February 2015, the FBI took over one of the internet’s largest child porn websites, Playpen, and continued to run it for almost three months - infecting thousands of users who entered the site within that time with malware that revealed their identities.

    However, the FBI’s refusal to divulge the full code that enabled them to exploit Tor means that evidence gathered against a Vancouver school administrator, Jay Michaud, who allegedly visited Playpen, cannot be used in court.

    Michaud’s defense lawyers argue that they need to learn how the FBI gained access to determine if the related warrant legally entitled them to do so.

    The defense team entered a motion to dismiss the case. On Wednesday US District Judge Robert Bryan said the case can still go ahead, but ruled that the evidence - “the fruits of that warrant” - should be excluded.

    Quote
    Brad Heath‏Verified account @bradheath

    A federal judge says DOJ can't use evidence gathered through a Tor exploit because the FBI won't reveal how it works



    1:53 PM - 25 May 2016
    5 replies 214 retweets 173 likes
    The FBI’s refusal could seriously impact another 1,200 related cases that are pending against alleged visitors to Playpen.

    In April, Massachusetts District Court Judge William Young found the FBI’s warrant to obtain evidence against Alex Levin for alleged child porn possession was “void” because it was issued by a magistrate who didn’t have the jurisdictional power to do so.

    Related:
    Former Tor developer makes malware for FBI
    FBI under court order to release code used to hack 1,000+ computers in child porn sting
    FBI ran massive child porn website to catch pedophiles
    "La réalité est un rêve que l'on fait atterrir" San Antonio AKA F. Dard

    Troll-hood motto: Never, ever, however, whatsoever, to anyone, a point concede.

  8. The Following 11 Users Say Thank You to Hervé For This Post:

    7alon (8th March 2017), avid (7th March 2017), Bill Ryan (8th March 2017), BMJ (8th March 2017), Cidersomerset (7th March 2017), cursichella1 (8th March 2017), Eram (7th March 2017), Innocent Warrior (7th March 2017), KiwiElf (8th March 2017), sheme (7th March 2017), The Freedom Train (8th March 2017)

  9. Link to Post #65
    France On Sabbatical
    Join Date
    7th March 2011
    Location
    Brittany
    Posts
    16,763
    Thanks
    60,315
    Thanked 95,889 times in 15,481 posts

    Default Re: Vault 7

    So... let me get this somewhat straight: with all these formerly undocumented tools/hacks at their disposal, like exploits, worms, viruses, trojans, keyloggers, etc... nothing could have prevented the CIA and/or the NSA and or the FBI to have scrubbed incriminating data from their assets' computers and/or phones OR planting incriminating data on anyone's they didn't like or wanted to get rid of... right!?
    Last edited by Hervé; 7th March 2017 at 21:07.
    "La réalité est un rêve que l'on fait atterrir" San Antonio AKA F. Dard

    Troll-hood motto: Never, ever, however, whatsoever, to anyone, a point concede.

  10. The Following 10 Users Say Thank You to Hervé For This Post:

    avid (7th March 2017), Bill Ryan (8th March 2017), BMJ (8th March 2017), cursichella1 (8th March 2017), Eram (8th March 2017), Innocent Warrior (7th March 2017), Jean-Marie (8th March 2017), JRS (8th March 2017), KiwiElf (8th March 2017), The Freedom Train (8th March 2017)

  11. Link to Post #66
    UK Avalon Member Cidersomerset's Avatar
    Join Date
    16th May 2011
    Location
    Bridgwater somerset UK
    Age
    63
    Posts
    22,333
    Thanks
    33,460
    Thanked 79,632 times in 18,693 posts

    Default Re: Vault 7

    Quote FBI refusal to divulge Tor hack code sees child porn evidence thrown out of court
    This is where black and white can be grey, Judges and courts are set up to interpret
    the law, & as technology is out pacing the judicial services we will get these
    problems. Yet really they should have been foreseen and all this secrecy does not
    help. Nobody wants to see criminal activity of any kind slip thru , but we don't want
    the innocent enticed and framed.The case above seems very unfortunate , lets
    hope they have more evidence if they are sure he is guilty.

    I was on Jury service two years ago and one of the cases revolved getting texts
    from a US company on a sex with a minor case , which took a long time to come
    thru and when they did the accused had no choice to change his plea from not
    guilty to guilty,and after several days listening to the case we were dismissed as
    not needed. So I do have some sympathy with the court system.
    Last edited by Cidersomerset; 7th March 2017 at 21:37.

  12. The Following 10 Users Say Thank You to Cidersomerset For This Post:

    avid (7th March 2017), bennycog (7th March 2017), Bill Ryan (8th March 2017), BMJ (8th March 2017), cursichella1 (8th March 2017), Eram (8th March 2017), Hervé (7th March 2017), Innocent Warrior (7th March 2017), KiwiElf (8th March 2017), The Freedom Train (8th March 2017)

  13. Link to Post #67
    Great Britain Unsubscribed
    Join Date
    23rd January 2013
    Age
    73
    Posts
    2,006
    Thanks
    7,723
    Thanked 7,391 times in 1,757 posts

    Default Re: Vault 7

    Sounds like we have compromised judiciary.

  14. Link to Post #68
    Australia Avalon Member bennycog's Avatar
    Join Date
    1st June 2010
    Location
    orange, nsw
    Age
    45
    Posts
    1,245
    Thanks
    9,975
    Thanked 4,296 times in 971 posts

    Default Re: Vault 7

    Going back to the encrypted photo, it seems 353 was a number that was placed there as a means to make sure all this follows through.

    because not only is 353 the country calling code for Ireland or the year of consulship between Magnentius and Decentuis of ancient Rome.

    but it is an Angel number meaning change and the inevitable change to the human race. A change that needs to be embraced with open arms because some of your strengths can be stripped away. It is also a symbol of love.

    It is just an interesting thing to note as it fits, well, quite well into this scenerio.

  15. The Following 10 Users Say Thank You to bennycog For This Post:

    7alon (8th March 2017), Bill Ryan (8th March 2017), BMJ (8th March 2017), Cidersomerset (7th March 2017), cursichella1 (8th March 2017), Eram (8th March 2017), Innocent Warrior (7th March 2017), Karma Ninja (10th March 2017), KiwiElf (8th March 2017), The Freedom Train (8th March 2017)

  16. Link to Post #69
    UK Avalon Member Cidersomerset's Avatar
    Join Date
    16th May 2011
    Location
    Bridgwater somerset UK
    Age
    63
    Posts
    22,333
    Thanks
    33,460
    Thanked 79,632 times in 18,693 posts

    Default Re: Vault 7

    Trump Was Tapped | Media Suddenly Ask for ‘Evidence’

    https://www.youtube.com/watch?v=7QW-IF4uyKM

    Published on 7 Mar 2017
    It's that bad, buckaroos. Trump was taped by NSA or Obama or whomever and
    #Vault7 may add credence ex post facto.


    ===================================================
    ===================================================

    Some good thoughts on CIA Faking the Russian hack and more.....

    Today's Lionel Nation - on Vault 7, he calls the 'smoking gun'.



    VAULT 7: CIA Staged Fake Russian Hacking to Set Up Trump — Russian Cyber-Attack
    M.O. As False Flag

    Published on 7 Mar 2017

    "The United States must not adopt the tactics of the enemy. Means are important,
    as ends. Crisis makes it tempting to ignore the wise restraints that make men free.
    But each time we do so, each time the means we use are wrong, our inner
    strength, the strength which makes us free, is lessened." — Sen. Frank Church

    WikiLeaks Press Release

    Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S.
    Central Intelligence Agency. Code-named "Vault 7" by WikiLeaks, it is the largest
    ever publication of confidential documents on the agency.

    The first full part of the series, "Year Zero", comprises 8,761 documents and files
    from an isolated, high-security network situated inside the CIA's Center for Cyber
    Intelligence in Langley, Virgina. It follows an introductory disclosure last month of
    CIA targeting French political parties and candidates in the lead up to the 2012
    presidential election.

    Recently, the CIA lost control of the majority of its hacking arsenal including
    malware, viruses, trojans, weaponized "zero day" exploits, malware remote control
    systems and associated documentation. This extraordinary collection, which
    amounts to more than several hundred million lines of code, gives its possessor the
    entire hacking capacity of the CIA. The archive appears to have been circulated
    among former U.S. government hackers and contractors in an unauthorized
    manner, one of whom has provided WikiLeaks with portions of the archive.

    "Year Zero" introduces the scope and direction of the CIA's global covert hacking
    program, its malware arsenal and dozens of "zero day" weaponized exploits against
    a wide range of U.S. and European company products, include Apple's iPhone,
    Google's Android and Microsoft's Windows and even Samsung TVs, which are
    turned into covert microphones.

    Since 2001 the CIA has gained political and budgetary preeminence over the U.S.
    National Security Agency (NSA). The CIA found itself building not just its now
    infamous drone fleet, but a very different type of covert, globe-spanning force — its
    own substantial fleet of hackers. The agency's hacking division freed it from having
    to disclose its often controversial operations to the NSA (its primary bureaucratic
    rival) in order to draw on the NSA's hacking capacities.

    ********************

    Note this well. “By the end of 2016, the CIA’s hacking division, which formally falls
    under the agency’s Center for Cyber Intelligence (CCI), had over 5,000 registered
    users and had produced more than a thousand hacking systems, Trojans, viruses,
    and other ‘weaponized’ malware,” Wikileaks disclosed just before 9:00 AM ET today.

    https://wikileaks.org/ciav7p1/#FAQ

    Sign up for Lionel's Newsletter and Truth Warrior manifestos. http://lionelmedia.com/2015/05/04/inf...

    ===================================================
    ===================================================

    'Cyber warfare is a new frontline': CIA created malware designed to penetrate
    software - WikiLeaks



    Published on 7 Mar 2017
    WikiLeaks has published what it claims is the largest ever batch of confidential
    documents on the CIA, revealing the breadth of the agency’s ability to hack
    smartphones and popular social media messaging apps such as WhatsApp.

    ====================================================
    ====================================================

    Inf Wars : CIA Documents Admit They Spy On Everyone

    https://www.youtube.com/watch?v=p380zt3P9yw

    Published on 7 Mar 2017
    Follow David on Twitter - https://twitter.com/libertytarian


    Facebook Announces Ban On Vault 7/WikiLeaks

    https://www.youtube.com/watch?v=YMH7iTwChkI

    --------------------------------------------------------------------------------------------

    Possible hacking and hijacking cars and planes go back along way and have been
    associated with 9/11 , Princess Di and others....

    News night
    http://www.bbc.co.uk/iplayer/live/bbctwo
    Last edited by Cidersomerset; 7th March 2017 at 23:22.

  17. The Following 8 Users Say Thank You to Cidersomerset For This Post:

    Bill Ryan (8th March 2017), BMJ (8th March 2017), Eram (8th March 2017), Ewan (8th March 2017), Innocent Warrior (7th March 2017), KiwiElf (8th March 2017), ponda (8th March 2017), The Freedom Train (8th March 2017)

  18. Link to Post #70
    Australia On Sabbatical
    Join Date
    30th October 2014
    Location
    Great Northern Hotel, Twin Peaks.
    Posts
    3,798
    Thanks
    27,109
    Thanked 29,551 times in 3,482 posts

    Default Re: Vault 7

    Quote Posted by Ewan (here)
    That password failed to open the archive, archive size is 525,651 KB but I require password to even test the archive is sound.
    That looks right, that's about what the compressed file size was (MB though?). How'd you go, do you have it open now? Once WikiLeaks has published it on their website you don't need to have it downloaded to view it btw, you can read it in the document tab. I don't know enough about how it's set up to comment on why they released it the way they did, I was hoping Assange would explain that at the press conference. So far as I can see, this is the only comment they've made on that so far, "WikiLeaks' new publishing model for "Year Zero": pre-distribute full encrypted publication everyone can embed".

    Quote (..and please don't disappear on sabbatical like that again (so suddenly) I was concerned you weren't coming back!).
    Sorry Ewan! OK.
    Last edited by Innocent Warrior; 8th March 2017 at 03:40. Reason: clarified
    Never give up on your silly, silly dreams.

    You mustn't be afraid to dream a little BIGGER, darling.

  19. The Following 9 Users Say Thank You to Innocent Warrior For This Post:

    7alon (8th March 2017), bennycog (8th March 2017), Bill Ryan (8th March 2017), BMJ (8th March 2017), Eram (8th March 2017), Ewan (8th March 2017), Hervé (8th March 2017), KiwiElf (8th March 2017), The Freedom Train (8th March 2017)

  20. Link to Post #71
    United States Avalon Member Chester's Avatar
    Join Date
    15th December 2011
    Location
    into my third life within this one
    Language
    English
    Age
    66
    Posts
    6,069
    Thanks
    34,011
    Thanked 33,205 times in 5,691 posts

    Default Re: Vault 7

    Note this was the lead story on Fox News Special Report. It's a big deal.
    Last edited by Chester; 8th March 2017 at 00:11.
    All the above is all and only my opinion - all subject to change and not meant to be true for anyone else regardless of how I phrase it.

  21. The Following 7 Users Say Thank You to Chester For This Post:

    bennycog (8th March 2017), Bill Ryan (8th March 2017), BMJ (8th March 2017), Eram (8th March 2017), Innocent Warrior (7th March 2017), KiwiElf (8th March 2017), The Freedom Train (8th March 2017)

  22. Link to Post #72
    Australia On Sabbatical
    Join Date
    30th October 2014
    Location
    Great Northern Hotel, Twin Peaks.
    Posts
    3,798
    Thanks
    27,109
    Thanked 29,551 times in 3,482 posts

    Default Re: Vault 7

    Cider posted -
    Quote WIKILEAKS VAULT 7 CIA CAN SPY THROUGH TELEVISION:
    Edward Snowden Analyzes WikiLeaks Vault 7
    If you own a smart TV, see "Weeping Angel" in the projects section.

    @Hervè - Right, that seems like a fair statement to me.
    Never give up on your silly, silly dreams.

    You mustn't be afraid to dream a little BIGGER, darling.

  23. The Following 8 Users Say Thank You to Innocent Warrior For This Post:

    bennycog (8th March 2017), Bill Ryan (8th March 2017), BMJ (8th March 2017), Cidersomerset (8th March 2017), Eram (8th March 2017), Hervé (8th March 2017), KiwiElf (8th March 2017), The Freedom Train (8th March 2017)

  24. Link to Post #73
    Avalon Member Omni's Avatar
    Join Date
    1st February 2011
    Location
    Pacific NW
    Posts
    3,813
    Thanks
    12,541
    Thanked 22,392 times in 3,448 posts

    Default Re: Vault 7

    i read in an article posted that the NSA and CIA don't get along well. I do believe the true heads of those hydras are coordinated. But I am very interested in how deep that schism goes...

    Since CIA spying techniques are a focus, I thought I'd share some of the topics of my upcoming book Covert Transhumanism.

    The apex spying method involves no internal machine coding at all. Just like humans, machines can be surveilled & hacked by directed energy weapons. Ever heard of remote neural monitoring? Well the CIA and NSA have that for machines too. I guess the frequencies given off in the EMF of electronics give the contents of the data going through the machine at any given time. Just like brain waves potentially give the data of the mind and are tapped into, computers can be too. They can also be made to malfunction with RF Energy methodology as well (directed energy weapons again).

    Citing these two articles: (A) || (B) about a court case between a targeted individual (John St. Clair Akwei) vs. the National Security Agency (NSA):

    Quote Posted by SIGINT
    Signals Intelligence (SIGINT):

    The Signals Intelligence mission of the NSA has evolved into a program of decoding EMF waves in the environment for wirelessly tapping into computers and tracking persons with the electrical currents in their bodies. Signals Intelligence is based on the fact that everything in the environment with an electric current in it has a magnetic flux around it which gives off EMF waves. The NSA/DoD has developed proprietary advanced digital equipment which can remotely analyze all objects whether man-made or organic that have electrical activity.
    Quote Posted by SIGINT & Electronics
    Signals Intelligence Remote Computer Tampering:

    The NSA keeps track of all PCs and other computers sold in the U.S. This is an integral part of the Domestic Intelligence network. The NSA's EMF equipment can tune in RF emissions from personal computer circuit boards (while filtering out emissions from monitors and power supplies). The RF emission from PC circuit boards contains digital information in the PC. Coded RF waves from the NSA's equipment can resonate PC circuits and change data in the PC's. Thus the NSA can gain wireless modem-style entry into any computer in the country for surveillance or anti-terrorist electronic warfare. Radio and Television signals can be substituted at the receiving end with special EMF equipment. Replacing signals in Radios and Televisions is another outgrowth of the NSA's Signals Intelligence (SIGINT) mission.
    Last edited by Omni; 8th March 2017 at 03:55.

  25. The Following 12 Users Say Thank You to Omni For This Post:

    Bill Ryan (8th March 2017), BMJ (8th March 2017), Eram (8th March 2017), Hervé (8th March 2017), Innocent Warrior (8th March 2017), JRS (8th March 2017), Karma Ninja (10th March 2017), KiwiElf (8th March 2017), mab777 (23rd March 2017), ponda (8th March 2017), sandy (8th March 2017), The Freedom Train (8th March 2017)

  26. Link to Post #74
    France On Sabbatical
    Join Date
    7th March 2011
    Location
    Brittany
    Posts
    16,763
    Thanks
    60,315
    Thanked 95,889 times in 15,481 posts

    Default Re: Vault 7

    Wikileaks: CIA hackers can pose as Russians—ring a bell?

    By Jon Rappoport Mar 7, 2017

    Let’s see. The CIA claims that Russian government hackers interfered in the US election, on the side of Trump.

    But suppose CIA hackers fabricated an operation to make it look like a Russian hack? Too far-fetched?

    Not anymore.

    In conjunction with their new data-dump of CIA material, WikiLeaks issues this statement:
    “The CIA’s Remote Devices Branch’s UMBRAGE group collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation. With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the ‘fingerprints’ of the groups that the attack techniques were stolen from.”
    Spy games.

    A group within the CIA wanted to shift blame for Hillary Clinton’s defeat? How about pointing at the Russians? “Easy. We can use Russian hacking tools and fabricate a scenario. We can say we discovered ‘fingerprints’ that point to the Russian government.”

    Here is what the CNN Wire Service reported on January 2, 2017:
    “Even as President-elect Donald Trump and his aides cast doubt on the links between Russia and recent hacks against Democrats, US intelligence officials say that newly identified ‘digital fingerprints’ indicate Moscow was behind the intrusions.”

    “One official told CNN the administration has traced the hack to the specific keyboards — which featured Cyrillic characters — that were used to construct the malware code, adding that the equipment leaves ‘digital fingerprints’ and, in the case of the recent hacks, those prints point to the Russian government.”
    Really? We live in a world where spies and their cronies are constantly fixing reality to suit themselves.

    So now all this bravado about discovering how the Russians hacked and stole the election blows up like a cream puff with a firecracker inside.

    Who originally hacked/accessed the Democratic National Committee (DNC) email files and handed them to WikiLeaks for publication? That appeared to be an insider at the DNC. But the cover story—“the Russians did it”—floated by the CIA [and] other US intelligence agencies now takes on a new hue.

    The CIA has worked, over the years, to refine its ability to fake a hack-trace to all sorts of people, including the Russian government.

    This gives people yet another opportunity to realize that employees of intelligence agencies are trained to lie. It’s their bread and butter. A day without lying is a misspent day.

    They purposely lie in their investigations, in their reports, in their testimony, in their leaks to the press, in their budget requests, in their clandestine operations, in their statements about the circumscribed limits of their activities.

    In their minds, they lie in order to tell the truth.

    They will, when it suits them, also tell the truth in a way that supports a larger lie.

    Some CIA agents eventually forget which way is up and what they’re doing. This is a qualification for promotion.

    Jon Rappoport

    ======================================================

    "The lie is different in each compartment of a level as well as with each level..."

    ... so, in such a universe, how can anything possibly be what it seems?
    "La réalité est un rêve que l'on fait atterrir" San Antonio AKA F. Dard

    Troll-hood motto: Never, ever, however, whatsoever, to anyone, a point concede.

  27. The Following 14 Users Say Thank You to Hervé For This Post:

    Bill Ryan (8th March 2017), BMJ (8th March 2017), Bob (8th March 2017), Cidersomerset (8th March 2017), Eram (8th March 2017), Ewan (8th March 2017), Innocent Warrior (8th March 2017), JRS (8th March 2017), KiwiElf (8th March 2017), Mike (8th March 2017), Omni (8th March 2017), ponda (8th March 2017), StandingWave (8th March 2017), The Freedom Train (8th March 2017)

  28. Link to Post #75
    Australia On Sabbatical
    Join Date
    30th October 2014
    Location
    Great Northern Hotel, Twin Peaks.
    Posts
    3,798
    Thanks
    27,109
    Thanked 29,551 times in 3,482 posts

    Default Re: Vault 7



    * * *

    Classified manuals (PDFs) for CIA to infest Linux and Windows (and more) with malware -

    (U) Hive 2.6.2 User's Guide, January 13, 2014

    (U) Hive Engineering Development Guide, January 10, 2014

    * * *

    CIA Method of Snooping WiFi Data through Mobile App/Exploit (Redditor research)

    * * *

    From Snowden -

    Quote If you're writing about the CIA/@Wikileaks story, here's the big deal: first public evidence USG secretly paying to keep US software unsafe.


    Source.
    Never give up on your silly, silly dreams.

    You mustn't be afraid to dream a little BIGGER, darling.

  29. The Following 12 Users Say Thank You to Innocent Warrior For This Post:

    7alon (8th March 2017), A Voice from the Mountains (8th March 2017), bennycog (8th March 2017), Bill Ryan (8th March 2017), BMJ (8th March 2017), Eram (8th March 2017), Ewan (8th March 2017), Hervé (8th March 2017), KiwiElf (8th March 2017), muxfolder (8th March 2017), ponda (8th March 2017), The Freedom Train (8th March 2017)

  30. Link to Post #76
    United States Unsubscribed
    Join Date
    24th September 2014
    Location
    Appalachia
    Posts
    2,551
    Thanks
    9,947
    Thanked 13,078 times in 2,355 posts

    Default Re: Vault 7

    I'm sure this is all inter-related. The Wikileaks releases shows how the CIA alone can spy on anyone without warrants, illegally and on a massive scale using all sorts of things.

    Congress will be investigating the Obama administration's spying on Trump soon.

    And more Wikileaks are on the way. This was only part 1 today.

  31. Link to Post #77
    Australia On Sabbatical
    Join Date
    30th October 2014
    Location
    Great Northern Hotel, Twin Peaks.
    Posts
    3,798
    Thanks
    27,109
    Thanked 29,551 times in 3,482 posts

    Default Re: Vault 7

    Quote Posted by A Voice from the Mountains (here)
    I'm sure this is all inter-related. The Wikileaks releases shows how the CIA alone can spy on anyone without warrants, illegally and on a massive scale using all sorts of things.

    Congress will be investigating the Obama administration's spying on Trump soon.

    And more Wikileaks are on the way. This was only part 1 today.
    Yeah, this is huge.

    I'm only posting select pieces of information and this is all I have time for today. A big thank you to members contributing to this thread. Feel free to use any of the information on the thread to start new thread discussions with, we're only scratching the surface here.
    Last edited by Innocent Warrior; 8th March 2017 at 02:37.
    Never give up on your silly, silly dreams.

    You mustn't be afraid to dream a little BIGGER, darling.

  32. The Following 12 Users Say Thank You to Innocent Warrior For This Post:

    A Voice from the Mountains (8th March 2017), Alan (8th March 2017), bennycog (8th March 2017), Bill Ryan (8th March 2017), BMJ (8th March 2017), Eram (8th March 2017), Ewan (8th March 2017), Hervé (8th March 2017), KiwiElf (8th March 2017), ponda (8th March 2017), starlight (9th March 2017), The Freedom Train (8th March 2017)

  33. Link to Post #78
    Avalon Member
    Join Date
    26th May 2010
    Location
    Albuquerque, NM, USA
    Age
    73
    Posts
    2,447
    Thanks
    11,291
    Thanked 22,014 times in 2,416 posts

    Default Re: Vault 7

    Quote Posted by bennycog (here)
    Going back to the encrypted photo, it seems 353 was a number that was placed there as a means to make sure all this follows through.

    because not only is 353 the country calling code for Ireland or the year of consulship between Magnentius and Decentuis of ancient Rome.

    but it is an Angel number meaning change and the inevitable change to the human race. A change that needs to be embraced with open arms because some of your strengths can be stripped away. It is also a symbol of love.

    It is just an interesting thing to note as it fits, well, quite well into this scenerio.
    Not that it means anything, but 353 can also be expressed as 911. 3x5x3=45. 4+5=9. 3+5+3=11.

  34. The Following 6 Users Say Thank You to Satori For This Post:

    bennycog (8th March 2017), BMJ (8th March 2017), Chester (8th March 2017), Eram (8th March 2017), Innocent Warrior (8th March 2017), The Freedom Train (8th March 2017)

  35. Link to Post #79
    United States Administrator ThePythonicCow's Avatar
    Join Date
    4th January 2011
    Location
    North Texas
    Language
    English
    Age
    76
    Posts
    28,565
    Thanks
    30,489
    Thanked 138,348 times in 21,474 posts

    Default Re: Vault 7

    Quote Posted by Ewan (here)

    That password failed to open the archive, archive size is 525,651 KB but I require password to even test the archive is sound.

    (..and please don't disappear on sabbatical like that again (so suddenly) I was concerned you weren't coming back!).
    The password was displaying with a bogus space in it. I updated Innocent Warrior's post to display the password without the bogus space.

    Can you try this (fixed) password:
    Code:
    SplinterItIntoAThousandPiecesAndScatterItIntoTheWinds
    ===
    Quote Posted by muxfolder (here)
    It works fine. Just remove the space (this here: Wi nds).
    Yup - exactly .
    Last edited by ThePythonicCow; 8th March 2017 at 04:07.
    My quite dormant website: pauljackson.us

  36. The Following 7 Users Say Thank You to ThePythonicCow For This Post:

    BMJ (8th March 2017), Ewan (8th March 2017), Hervé (8th March 2017), Innocent Warrior (8th March 2017), KiwiElf (8th March 2017), Omni (8th March 2017), The Freedom Train (8th March 2017)

  37. Link to Post #80
    Canada Avalon Member Justplain's Avatar
    Join Date
    8th April 2016
    Posts
    1,483
    Thanks
    4,787
    Thanked 9,259 times in 1,414 posts

    Default Re: Vault 7

    Does anyone here know the impact of this leak?

    From the article:

    "WASHINGTON -- WikiLeaks published thousands of secret CIA files on Tuesday detailing hacking tools the government employs to break into users’ computers, mobile phones and even smart TVs.

    "Some companies that manufacture smart TVs include Apple, Google, Microsoft and Samsung.

    "The documents describe clandestine methods for bypassing or defeating encryption, antivirus tools and other protective security features intended to keep the private information of citizens and corporations safe from prying eyes. U.S. government employees, including President Trump, use many of the same products and internet services purportedly compromised by the tools."

    http://www.cbsnews.com/news/wikileak...-intelligence/

  38. The Following 6 Users Say Thank You to Justplain For This Post:

    7alon (8th March 2017), DNA (8th March 2017), Innocent Warrior (8th March 2017), Nasu (8th March 2017), The Freedom Train (10th March 2017), WhiteLove (8th March 2017)

+ Reply to Thread
Page 4 of 18 FirstFirst 1 4 14 18 LastLast

Tags for this Thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts