Jun 212017
 

Hillary Clinton requested that FBI Dir. Mueller deliver highly enriched uranium to the Russians in 2009 in secret ‘plane-side tarmac meeting’

Hillary Clinton Requested FBI Director Mueller Deliver Highly Enriched Uranium To Russians In 2009

New Clinton-Mueller Russian uranium ties surface in a new Wikileaks release. Past dealings with the Russians were also mentioned in the cable.

As Secretary of State Hillary Clinton facilitated the transfer a highly enriched uranium (HEU) previously confiscated by the U.S. Department of Energy (DOE) during a 2006 “nuclear smuggling sting operation involving one Russian national and several Georgian accomplices,” a newly leaked classified cable shows.

So-called “background” information was provided in the cable which gave vague details on a 2006 nuclear smuggling sting operation in which the U.S. government took possession of some HEU previously owned by the Russians.

The secret “action request,” dated Aug. 17, 2009, was sent out by Secretary of State Clinton and was addressed to the United States Ambassador to Georgia Embassy Tbilisi, the Russian Embassy, and Ambassador John Beyrle. It proposed that FBI Director Robert Mueller be the one that personally conduct the transfer a 10-gram sample of HEU to Russian law enforcement sources during a secret “plane-side” meeting on a “tarmac” in the early fall of 2009.

The FBI Director was originally scheduled to ‘return’ a sample from the DOE stockpile to the Russians in April but the trip was postponed until September 21.

Paragraph number 6 of the leaked cable confirms Dir. Mueller’s Sept. 21 flight to Moscow.

FBI Director Mueller Deliver Highly Enriched Uranium To Russians

“(S/Rel Russia) Action request: Embassy Moscow is requested to alert at the highest appropriate level the Russian Federation that FBI Director Mueller plans to deliver the HEU sample once he arrives to Moscow on September 21. Post is requested to convey information in paragraph 5 with regard to chain of custody, and to request details on Russian Federation’s plan for picking up the material. Embassy is also requested to reconfirm the April 16 understanding from the FSB verbally that we will have no problem with the Russian Ministry of Aviation concerning Mueller’s September 21 flight clearance.”

But possible even more shocking is the fact that the State Department wanted the transfer of the HEU to take place on an “airport tarmac” which is rather reminisce of the infamous Loretta Lynch/Bill Clinton meeting which occurred on a Phoenix, Arizona, tarmac back in June of 2016.

Past dealings with the Russians were also mentioned in the cable, signifying that previous deals have taken place.

 
 
via

May 302017
 

If there was ever a smoking gun to be produced by WikiLeaks, this is it!

Smoking Gun: Hillary's Intent Found

Specifically, James Comey originally used the argument that the evidence found against Hillary was lacking an “intent” element, meaning they didn’t find she intended to break the law. Well, the WikiLeaks release of John Podesta’s emails contain all the “intent” we need.

HERE’S HOW IT BREAKS DOWN…

Zero Hedge put the pieces together by pointing out the following:
On March 2, 2015 The New York Times reported that Hillary Clinton used a personal email server as Secretary of State.

Later on March 2, 2015 Hillary Clinton’s top aide and attorney wrote John Podesta that “we are going to have to dump all those emails.”

HERE’S THE PROOF…

You can clearly see the email from John Podesta below to Cheryl Mills saying,“On another matter….and not to sound like Lanny, but we are going to have to dump all those emails so better to do so sooner than later”

Hillary's Intent Found

So there you have it folks! Comey’s ‘intent’ element has just been produced.

Zero hedge also points out that, “a search for Lanny Davis reveals the following curious exchange between Robby Mook and John Podesta from March 8, 2015, just days after the above mentioned exchange, in which Mook says:”

“We gotta zap Lanny out of our universe. Can’t believe he committed her to a private review of her hard drive on TV.”

Clearly, the Clinton camp had been hiding and destroying evidence the entire time and they have incriminated themselves for all of America to see.

The story of how Hillary’s “personal” emails came to be deleted using, the now infamous, BleachBit is quite the tale.  Below is an attempt to piece together how the story unfolded per the FBI disclosures.

Here is a quick summary of the timeline of events:

  • February 2013 – Hillary resigns from State Department
  • Spring 2013 – Hillary aide Monica Hanley backs up Pagliano Server to Apple MacBook and a thumb drive
  • February 2014 – Monica Hanley attempts to upload Hillary email archives to new Platte River Networks (PRN) server but encounters technical issues
  • Early 2014 – Monica Hanley mails Apple MacBook to Undisclosed PRN Staff Member to upload Hillary email archives to new PRN server.  Undisclosed PRN Staff Member then uploads Hillary’s emails to a gmail account and then transfers them over to the new PRN server.  The Undisclosed PRN Staff Member deletes most of the emails from gmail but indvertently leaves 940.
  • Early 2014Monica Hanley advises Undisclosed PRN Staff Member to wipe the Apple MacBook clean after uploading Hillary’s emails to the new PRN server but he forgets to do it
  • Early 2014 – Undisclosed PRN Staff Member mails Apple MacBook back to Clinton and it is promptly lost
  • December 2014 – Hillary delivers 55,000 emails to State Department
  • December 2014 / January 2015Heather Samuelson and Cheryl Mills request emails be deleted from their computer using BleachBit
  • December 2014 / January 2015“Unknown Clinton staff member” instructs PRN to remove archives of Clinton emails from PRN server
  • March 2, 2015 – NYT releases an article showing that Hillary used a personal email server in violation of State Department rules
  • March 4, 2015Hillary receives subpoena from House Select Committee on Benghazi instructing her to preserve and deliver all emails from her personal servers
  • March 25, 2015 – Undisclosed PRN Staff Member has a conference call with “President Clinton’s Staff”
  • March 25 – 31, 2015 – Undisclosed PRN Staff Member has “oh shit” moment and realizes he forgot to wipe Hillary’s email archive from the PRN server back in Decemberwhich he promptly does using BleachBit despite later admitting he “was aware of the existence of the preservation request and the fact that it meant he should not disturb Clinton’s e-mail data on the PRN server.”
  • June 2016 – FBI discovers that Undisclosed PRN Staff Member forgot to erase 940 emails from the gmail account he created to help with the PRN server upload

 

 
 
via

Shoot The Panda

 Political  Comments Off on Shoot The Panda
May 252017
 

Shoot the panda – 5 months before the Seth Rich murder!

An article from Vanity Fair January 24, 2016 titled Hillary Clinton Cannot Be Stopped contains an eerie reference to “Shoot the Panda”.

There is more evidence in this article that Hillary Clinton and the DNC murdered Seth Rich than there is that Trump colluded with Russia.

Where is the Special Prosecutor looking into this?

I’m just sayin’.

Panda was Seth Rich’s nickname.

Seth Rich Panda

 
 

HRC Camp Plotted To Smear Trump For A Putin “Bromance” Way Back In 2015

 Political  Comments Off on HRC Camp Plotted To Smear Trump For A Putin “Bromance” Way Back In 2015
May 172017
 

Is this the SMOKING GUN in the Trump Russia Fake News narrative?

HRC Camp Plotted To Smear Trump For A Putin Bromance Way Back In 2015

A Wikileaks email shows that Hillary Clinton’s campaign team was advised to link Russian President Vladimir Putin with Donald Trump in an apparent bid to distract voters from her strategy on ISIS.

The exchange of emails between Clinton campaign chair John Podesta and Clinton ally and columnist Brent Budowsky was among the batch of around 1,000 emails from Podesta’s account released by WikiLeaks on October 22, 2016.

In a December 21, 2015 email, Budowsky criticizes Clinton’s position on fighting ISIS before advising Podesta to draw Putin into her attacks on Donald Trump.

Wikileaks Email ID 25621 Brent Budowsky advises Podesta – to smear Trump with a Putin “Bromance”:

Russia Setup

Budowsky’s email follows a discussion with Podesta on how to best position the former secretary of state on the issue of tackling ISIS.

Budowsky warns that Clinton is not coming down strongly enough on fighting ISIS and that her support for Obama’s approach is a potential “death ray to her candidacy in a general election.”

“Walk back and escape from her statement that ‘finally we are where we need to be’ against ISIS. We are not where we need to be, we are far from it, most voters do not believe it, and when the next terror attack comes in America – which it certainly will – she will be branded in hot iron with that statement,” Budowski warns.

“She will never state what I believe we need to do – at least 20,000 ground troops with 3,000 American and at least 10,000 from Sunni Muslim nations – because she is consumed with keeping Obama’s goodwill and afraid of liberal backlash.”

Podesta counters: “Her reference was not to ISIS but to going after Assad diplomatically because of UNSC resolution passed Friday. We will make that clear. She has given two major speeches about how we are NOT where we need to be on ISIS.”

“That’s good, sooner it’s clarified the better, and the stronger the better,” Budowski replies, later adding: “Best approach is to slaughter Donald for his bromance with Putin, but not go too far betting on Putin re Syria.”

 
 

DNC Staffer Seth Rich Leaked 44K Emails to WikiLeaks Before His Murder

 Political  Comments Off on DNC Staffer Seth Rich Leaked 44K Emails to WikiLeaks Before His Murder
May 172017
 

Murdered DNC staffer Seth Rich believed to have leaked DNC emails to Wikileaks

DNC Staffer Seth Rich Leaked 44K Emails to WikiLeaks Before His Murder

New information has surfaced regarding the murder of Seth Rich, the Democratic National Committee staffer who was mysteriously killed last July in what Washington D.C. police claimed was a botched robbery despite no evidence to back the claim. After almost a year of conspiracy theories linking the staffer’s death to the DNC, private investigator Rod Wheeler has come forward with information indicating that those theories may not be too far off.

The former D.C. detective, hired by Rich’s family, indicated to local Fox affiliate Fox 5 that “there is tangible evidence on Rich’s laptop that confirms he was communicating with WikiLeaks prior to his death.” Wheeler believes the murder is being covered up and said a source inside the department told him D.C. police have been told not to investigate the case.

According to Wheeler:

The police department nor the FBI have been forthcoming. They haven’t been cooperating at all. I believe that the answer to solving his death lies on that computer, which I believe is either at the police department or either at the FBI. I have been told both.”

“I have a source inside the police department that has looked at me straight in the eye and said, ‘Rod, we were told to stand down on this case and I can’t share any information with you.’ Now, that is highly unusual for a murder investigation, especially from a police department. Again, I don’t think it comes from the chief’s office, but I do believe there is a correlation between the mayor’s office and the DNC and that is the information that will come out [Tuesday].”

Asked if his sources have told him that information exists linking Rich to Wikileaks, he said, “Absolutely. Yeah. That’s confirmed.”

Wikileaks founder Julian Assange gave no comment on the allegations but has not denied working with Rich and retweeted the breaking story shortly after it broke Monday evening. Wikileaks has offered a reward of $20,000 for information leading to the conviction of the murderer, and Assange previously implied Rich was involved in the leaks.

A spokesman for Rich’s family, Brad Bauman, stated Tuesday that the family had not authorized Wheeler to speak on their behalf and wanted to keep the focus on finding Seth’s murderers.

“Even if tomorrow, an email was found, it is not a high enough bar of evidence to prove any interactions as emails can be altered and we’ve seen that those interested in pushing conspiracies will stop at nothing to do so. We are a family who is committed to facts, not fake evidence that surfaces every few months to fill the void and distract law enforcement and the general public from finding Seth’s murderers,” said Bauman.

Regardless, Fox News released a separate, full report on Tuesday with new details on the investigation Tuesday morning, dropping the bombshell that a federal investigator has corroborated Wheeler’s claims. The outlet reported that “an FBI forensic report of Rich’s computer — generated within 96 hours after Rich’s murder — showed he made contact with WikiLeaks through Gavin MacFadyen, a now-deceased American investigative reporter, documentary filmmaker, and director of WikiLeaks who was living in London at the time, the federal source told Fox News.”

According to the report, “44,053 emails and 17,761 attachments between Democratic National Committee leaders, spanning from January 2015 through late May 2016, were transferred from Rich to MacFadyen before May 21.”

D.C. police insisted they’re working with the family to find the killers, offering a reward of $25,000 for information leading to the arrest and conviction of those responsible, while a separate reward of $130,000 has been offered by Republican lobbyist Jack Burman.

According to the anonymous federal investigator, he has “seen and read the emails between Seth Rich and WikiLeaks” and says the FBI is in possession of the damning evidence. It is important to note that the mainstream media, including the Washington Post, has been widely criticized for citing anonymous sources in its reporting on Russian election hacking claims.

Regardless, the FBI has not yet commented on the allegations.

Clinton Body Count

 
 
Source…

The CIA Implanted Microphones Into The Skin Of CATS

 Political  Comments Off on The CIA Implanted Microphones Into The Skin Of CATS
May 012017
 

The CIA tried to turn a CAT into a cyborg spy by implanting it with a microphone and antenna

The CIA Implanted Microphones Into The Skin Of CATS

The CIA once implanted microphones into a cat in a bizarre attempt to spy on Soviet Russia.

The cat had a microphone, antenna and battery pack surgically embedded into its skin so the feline could act as a covert recording device.

Recently declassified documents show how the scientists responsible for the cruel research were praised by spy chiefs for their ‘pioneering’ work.

Acoustic Kitty

The CIA once implanted microphones into a cat in a bizarre attempt to spy on Soviet Russia. Declassified documents reveal that the work was praised by CIA chiefs as a ‘remarkable scientific achievement’

The strange eavesdropping technique, though never used in the field, resurfaced this week when WikiLeaks tweeted a link to declassified CIA memos, first released in 2001.

The research was dubbed ‘Project Acoustic Kitty’ and cost $13 million (£10 million) over its five-year development in the 1960s.

The cat’s tail was used as an antenna with a wire travelling all the way up its spine to a microphone in the animal’s ear.

The equipment’s battery pack was sewn into the cat’s chest.

Victor Marchetti, a former CIA officer, told The Telegraph that year of the gruesome creation.

He said: ‘They slit the cat open, put batteries in him, wired him up’.

‘They made a monstrosity. They tested him and tested him.

‘They found he would walk off the job when he got hungry, so they put another wire in to override that,’ he added.

The final 1967 report on the project concluded it was non-practical, signalling the end of the research.

But the memo hailed the ‘remarkable scientific achievement’ reached by the American spy agency.

‘The work done on this problem over the years reflects great credit on the personnel who guided it,’ the document concluded.


The cats had microphones, antennae and battery packs surgically embedded into their skin so the felines could act as covert recording devices.

 
 
via

Fact-Sheet On Syria’s White Helmets

 Political  Comments Off on Fact-Sheet On Syria’s White Helmets
Apr 132017
 

Who are the White Helmets? This is a question that everyone should be asking themselves.

Fact-Sheet On Syria’s White Helmets

The White Helmets – here are a few facts that you need to know. Share this with your family and friends who rely on the Western Mainstream Media:

 
• The White Helmets, also called Syria Civil Defence, are not who they claim to be. The group is not Syrian; it was created with USA/UK funding under the supervision of a British military contractor in 2013 in Turkey.

• The name “Syria Civil Defence” was stolen from the legitimate Syrian organization of the same name. The authentic Syria Civil Defence was founded in 1953 and is a founding member of the International Civil Defense Organization (1958).

• The name “White Helmets” was inappropriately taken from the legitimate Argentinian relief organization Cascos Blancos / White Helmets. In 2014, Cascos Blancos / White Helmets was honored at the United Nations for 20 years of international humanitarian assistance.

• The NATO White Helmets are primarily a media campaign to support the ‘regime change’ goals of the USA and allies. After being founded by security contractor James LeMesurier, the group was “branded” as the White Helmets in 2014 by a marketing company called “The Syria Campaign” managed out of New York by non-Syrians such as Anna Nolan. “The Syria Campaign” was itself “incubated” by another marketing company named “Purpose”.

• The White Helmets claim to be “neutral, impartial and humanitarian” and to “serve all the people of Syria” is untrue. In reality, they only work in areas controlled by the violent opposition, primarily terrorists associated with Nusra/AlQaeda (recently renamed Jabhat Fath al Sham).

• The White Helmets claim to be unarmed is untrue. There are photos which show their members carrying arms and celebrating Nusra/AlQaeda military victories.

• The White Helmets claim to be apolitical and non-aligned is untrue. In reality they actively promote and lobby for US/NATO intervention in violation of the norms of authentic humanitarian work.

• The Right Livelihood description that “Syria Civil Defence” saved over 60,000 people and “support in the provision of medical services to nearly 7 million people” is untrue. In reality the zones controlled by terrorists in Syria have few civilians remaining. That is why we see “cat” video/media stunts featuring the White Helmets.

• The NATO White Helmets actually undermine and detract from the work of authentic organizations such as the REAL Syria Civil Defence and Syrian Arab Red Crescent.

• The recent Netflix movie about the White Helmets is not a documentary; it is a self promotional advertisement. The directors never set foot in Syria. The Syrian video, real or staged, was provided by the White Helmets themselves. From the beginning scenes showing a White Helmet actor telling his little boy not to give mommy a hard time until the end, the video is contrived and manipulative. The video was produced by a commercial marketing company Violet Films/Ultra Violet Consulting which advertises its services as “social media management”, “crowd building” and “campaign implementation”.

The true face of the White Helmets:


 

The REAL Syria Civil Defence

http://www.globalresearch.ca/the-real-syria-civil-defence-exposes-natos-white-helmets-as-terrorist-linked-imposters/5547528

Who are the Syria White Helmets?

http://21stcenturywire.com/2016/06/21/who-are-the-syria-white-helmets/

White Helmets Deceive Right Livelihood and CodePink

http://truepublica.org.uk/global/white-helmets-deceive-right-livelihood-codepink/

White Helmets cat video showing terrorist zone with no civilians.  “The homeowners abandoned this district and its kittens.”  How fake does it get?

https://www.youtube.com/watch?v=UkfcE-Drnas

White Helmets are caught staging rescue only to claim they were making a mannequin challenge video.

http://archive.is/5D2Ew

 


 

 
via

Wikileaks: CIA Malware For Windows “Grasshopper”

 Political  Comments Off on Wikileaks: CIA Malware For Windows “Grasshopper”
Apr 072017
 

RELEASE: CIA malware for Windows “Grasshopper” — which includes its own language

Wikileaks: CIA Malware For Windows "Grasshopper"

Grasshopper basically allows the Deep State to do anything it wants remotely to a Windows machine. It doesn’t seem to matter if it is Windows XP, Windows 7, Windows 8, or Windows Server versions 2003 or 2008. Almost all the attacks and hijacks bypassed the major intrusion detection systems (MS Security, Symantec, Kapersky, and Rising). No matter how locked down or safe you thought your Windows install was, you were wrong.

Oh even better. It looks like these were designed specifically to avoid the major security programs.

From Wikileaks:

Grasshopper

7 April, 2017

Today, April 7th 2017, WikiLeaks releases Vault 7 “Grasshopper” — 27 documents from the CIA’s Grasshopper framework, a platform used to build customized malware payloads for Microsoft Windows operating systems.

Grasshopper is provided with a variety of modules that can be used by a CIA operator as blocks to construct a customized implant that will behave differently, for example maintaining persistence on the computer differently, depending on what particular features or capabilities are selected in the process of building the bundle. Additionally, Grasshopper provides a very flexible language to define rules that are used to “perform a pre-installation survey of the target device, assuring that the payload will only [be] installed if the target has the right configuration”. Through this grammar CIA operators are able to build from very simple to very complex logic used to determine, for example, if the target device is running a specific version of Microsoft Windows, or if a particular Antivirus product is running or not.

Grasshopper allows tools to be installed using a variety of persistence mechanisms and modified using a variety of extensions (like encryption). The requirement list of the Automated Implant Branch (AIB) for Grasshopper puts special attention on PSP avoidance, so that any Personal Security Products like ‘MS Security Essentials’, ‘Rising’, ‘Symantec Endpoint’ or ‘Kaspersky IS’ on target machines do not detect Grasshopper elements.

One of the persistence mechanisms used by the CIA here is ‘Stolen Goods’ – whose “components were taken from malware known as Carberp, a suspected Russian organized crime rootkit.” confirming the recycling of malware found on the Internet by the CIA. “The source of Carberp was published online, and has allowed AED/RDB to easily steal components as needed from the malware.”. While the CIA claims that “[most] of Carberp was not used in Stolen Goods” they do acknowledge that “[the] persistence method, and parts of the installer, were taken and modified to fit our needs”, providing a further example of reuse of portions of publicly available malware by the CIA, as observed in their analysis of leaked material from the italian company “HackingTeam”.

The documents WikiLeaks publishes today provide an insights into the process of building modern espionage tools and insights into how the CIA maintains persistence over infected Microsoft Windows computers, providing directions for those seeking to defend their systems to identify any existing compromise.

Leaked Documents

Grasshopper-v2_0_2-UserGuide
Grasshopper-v1_1-AdminGuide
StolenGoods-2_1-UserGuide
GH-Run-v1_1-UserGuide
GH-ServiceProxy-v1_1-UserGuide

 

“Grasshopper” re-installs itself every 22 hours by corrupting Windows Update… even if is disabled.


 

 

CIA Vault 7 Part 3 “Marble” Allows CIA To Cover Their Tracks!

 Political  Comments Off on CIA Vault 7 Part 3 “Marble” Allows CIA To Cover Their Tracks!
Mar 312017
 

Vault 7 Part 3: WikiLeaks releases the CIA ‘Marble’ dump

CIA Vault 7 Part 3 "Marble" Allows CIA To Cover Their Tracks
WikiLeaks has released the latest batch of documents detailing CIA hacking tactics. The third release, named ‘Marble’, contains 676 source code files for the agency’s secret anti-forensics framework.Marble Framework, which WikiLeaks explains is part of the CIA’s Core Library of malware, is used to hamper forensic investigators from attributing viruses, trojans and hacking attacks to the CIA. WikiLeaks said Marble was in use at the agency as recently as 2016.

WikiLeaks said Marble hides fragments of texts that would allow for the author of the malware to be identified. WikiLeaks stated the technique is the digital equivalent of a specialized CIA tool which disguises English language text on US produced weapons systems before they are provided to insurgents.

It’s “designed to allow for flexible and easy-to-use obfuscation” as “string obfuscation algorithms” often link malware to a specific developer, according to the whistleblowing site.

The source code released reveals Marble contains test examples in Chinese, Russian, Korean, Arabic and Farsi.

“This would permit a forensic attribution double game, for example by pretending that the spoken language of the malware creator was not American English, but Chinese, but then showing attempts to conceal the use of Chinese, drawing forensic investigators even more strongly to the wrong conclusion,” WikiLeaks explains, “But there are other possibilities, such as hiding fake error messages.”

From Wikileaks:

Marble Framework

31 March, 2017

Today, March 31st 2017, WikiLeaks releases Vault 7 “Marble” — 676 source code files for the CIA’s secret anti-forensic Marble Framework. Marble is used to hamper forensic investigators and anti-virus companies from attributing viruses, trojans and hacking attacks to the CIA.

Marble does this by hiding (“obfuscating”) text fragments used in CIA malware from visual inspection. This is the digital equivallent of a specalized CIA tool to place covers over the english language text on U.S. produced weapons systems before giving them to insurgents secretly backed by the CIA.

Marble forms part of the CIA’s anti-forensics approach and the CIA’s Core Library of malware code. It is “[D]esigned to allow for flexible and easy-to-use obfuscation” as “string obfuscation algorithms (especially those that are unique) are often used to link malware to a specific developer or development shop.

The Marble source code also includes a deobfuscator to reverse CIA text obfuscation. Combined with the revealed obfuscation techniques, a pattern or signature emerges which can assist forensic investigators attribute previous hacking attacks and viruses to the CIA. Marble was in use at the CIA during 2016. It reached 1.0 in 2015.

The source code shows that Marble has test examples not just in English but also in Chinese, Russian, Korean, Arabic and Farsi. This would permit a forensic attribution double game, for example by pretending that the spoken language of the malware creator was not American English, but Chinese, but then showing attempts to conceal the use of Chinese, drawing forensic investigators even more strongly to the wrong conclusion, — but there are other possibilities, such as hiding fake error messages.

The Marble Framework is used for obfuscation only and does not contain any vulnerabilties or exploits by itself.

 
via

Wikileaks: CIA Hacks Dubbed ‘Dark Matter’ Reveal How Apple Products Are Infected

 Political  Comments Off on Wikileaks: CIA Hacks Dubbed ‘Dark Matter’ Reveal How Apple Products Are Infected
Mar 242017
 
WikiLeaks Vault 7 shows that the CIA has developed a huge range of attacks against iPhones since at least 2008.

Wikileaks: CIA Hacks Dubbed Dark Matter Reveal How Apple Products Are Infected

Yesterday, Wikileaks released another series from their ‘Vault 7’ CIA hacks called ‘Dark Matter’ where they reveal how Apple products are infected.

According to Wikileaks, ‘Dark Matter’ contains documentation for several CIA projects that infect Apple MAC computer firmware developed by the CIA’s Embedded Development Branch (EDB). Interestingly… the infection persists even if the operating system is re-installed.

From Wikileaks:

Dark Matter

23 March, 2017

Today, March 23rd 2017, WikiLeaks releases Vault 7 “Dark Matter”, which contains documentation for several CIA projects that infect Apple Mac firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA’s Embedded Development Branch (EDB). These documents explain the techniques used by CIA to gain ‘persistence’ on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware.

Among others, these documents reveal the “Sonic Screwdriver” project which, as explained by the CIA, is a “mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting” allowing an attacker to boot its attack software for example from a USB stick “even when a firmware password is enabled”. The CIA’s “Sonic Screwdriver” infector is stored on the modified firmware of an Apple Thunderbolt-to-Ethernet adapter.

“DarkSeaSkies” is “an implant that persists in the EFI firmware of an Apple MacBook Air computer” and consists of “DarkMatter”, “SeaPea” and “NightSkies”, respectively EFI, kernel-space and user-space implants.

Documents on the “Triton” MacOSX malware, its infector “Dark Mallet” and its EFI-persistent version “DerStarke” are also included in this release. While the DerStarke1.4 manual released today dates to 2013, other Vault 7 documents show that as of 2016 the CIA continues to rely on and update these systems and is working on the production of DerStarke2.0.

Also included in this release is the manual for the CIA’s “NightSkies 1.2” a “beacon/loader/implant tool” for the Apple iPhone. Noteworthy is that NightSkies had reached 1.2 by 2008, and is expressly designed to be physically installed onto factory fresh iPhones. i.e the CIA has been infecting the iPhone supply chain of its targets since at least 2008.

While CIA assets are sometimes used to physically infect systems in the custody of a target it is likely that many CIA physical access attacks have infected the targeted organization’s supply chain including by interdicting mail orders and other shipments (opening, infecting, and resending) leaving the United States or otherwise.

Leaked Documents

Sonic Screwdriver
DerStarke v1.4
DerStarke v1.4 RC1 – IVVRR Checklist
Triton v1.3
DarkSeaSkies v1.0 – URD

Dark Matter Dog

 
via

While The Mainstream Media Focuses On Russia, The Government’s Own Data Shows U.S. Interfered In 81 Elections

 Political  Comments Off on While The Mainstream Media Focuses On Russia, The Government’s Own Data Shows U.S. Interfered In 81 Elections
Mar 232017
 
While the US spin machine hurls accusations about Russian election meddling, it’s worth nothing the US is a seasoned pro at interfering in elections.

While The Mainstream Media Focuses On Russia, The Government's Own Data Shows U.S. Interfered In 81 Elections

Ask an average American who makes a habit of following government-mouthpiece corporate media about interference in national elections and you’ll likely elicit a nebulous response concerning Russian hackers and a plan to install Donald Trump in the White House — but you probably won’t hear a single syllable pertaining to United States government’s actual attempts to do the same.

On Monday, FBI Director James Comey confirmed for the first time publicly the bureau is officially investigating hotly contentious allegations of Russian meddling in the U.S. election — but, even if proven true, such geopolitical escapades better characterize the routine behavior of accuser than of accused.

“The F.B.I., as part of our counterintelligence effort, is investigating the Russian government’s efforts to interfere in the 2016 president election,” the director announced, adding the bureau would conduct a probe to discern whether Trump’s associates had contact with Russian officials.

Despite that the U.S. has hypocritically exerted influence over foreign elections in all corners of the globe — in fact, it has arrogantly done so a whopping 81 times between 1946 and 2000, alone — with just one-third of those operations undertaken overtly.


For months, mainstream media parroted murky accusations hurled by politicians — keen to point a finger of blame for the apparently stultifying victory of a former reality television host on someone — that The Russians had somehow surreptitiously undermined the election-centric foundation of American Democracy.

While that has yet to prove true, this new Red Scare constitutes a duplicitous attempt by the pot to call the kettle … an election meddler.

Researcher Dov Levin of Carnegie Mellon University’s Institute for Politics and Strategy — an expert on the topic at hand — discussed the lengthy but incomplete list of times the U.S. government has interfered in other nations’ elections with NPR’s Ari Shapiro.

Asked for examples where this tampering tangibly altered results, Levin stated,

“One example of that was our intervention in Serbia, Yugoslavia in the 2000 election there. Slobodan Milosevic was running for re-election, and we didn’t want him to stay in power there due to his tendency, you know, to disrupts the Balkans and his human rights violations.

“So we intervened in various ways for the opposition candidate, Vojislav Kostunica. And we gave funding to the opposition, and we gave them training and campaigning aide. And according to my estimate, that assistance was crucial in enabling the opposition to win.”

Levin reiterated the more blatant methods with which the U.S. asserts dominance — through the overt coups or all-out regime changes branding the nation a notorious interventionist — are not among the list of the 80-plus attempts to manipulate the electoral outcome.

As for the issue of pot versus kettle, Levin explained that — although Russia and other powerful nations indisputably employ similar tactics — the United States has been quite prodigious in its effort.

“Well, for my dataset, the United States is the most common user of this technique. Russia or the Soviet Union since 1945 has used it half as much. My estimate has been 36 cases between 1946 to 2000. We know also that the Chinese have used this technique and the Venezuelans when the late Hugo Chavez was still in power in Venezuela and other countries.”

As sanctimonious U.S. politicians cry foul about The Russians, it would behoove the new McCarthyites to reflect on the nation’s sticky imperialist fingerprints around the globe — like that time in 1996, when the United States undertook an extensive, secret operation to ensure the presidency of Boris Yeltsin.

That is, of course, former President Boris Yeltsin — of the Russian Federation.

 
By Claire Bernish

Five Pakistani Congressional Staffers In Criminal Probe Over Unauthorized Computer Access

 Political  Comments Off on Five Pakistani Congressional Staffers In Criminal Probe Over Unauthorized Computer Access
Mar 222017
 
Dozens of House Democrats have collectively paid $4 million since 2009 to Pakistani IT professionals now under criminal investigation who had access to House members’ email and computer files.

Five Pakistani Congressional Staffers In Criminal Probe

Five people employed by members of the House of Representatives remain under criminal investigation for unauthorized access to Congressional computers. Former DNC chair Debbie Wasserman Schultz employed at least one of those under investigation.

The criminal investigation into the five, which includes three brothers and a wife of one of the men, started late last year, as reported by Politico in February. The group is being investigated by US Capitol Police over allegations that they removed equipment from over 20 members’ offices, as well as having run a procurement scheme to buy equipment and then overcharge the House.

House Speaker Paul Ryan said last week Capitol Police are receiving additional help for the investigation. “I won’t speak to the nature of their investigation, but they’re getting the kind of technical assistance they need to do that, this is under an active criminal investigation, their capabilities are pretty strong but they’re also able to go and get the kind of help they need from other sources,” Ryan said.

The brothers, Abid, Jamal and Imran Awan, worked as shared employees for various members of the House, covering committees relating to intelligence, terrorism and cybersecurity, which included the House Committee on Foreign Affairs, the Committee on Homeland Security and the Subcommittee on Tactical Air and Land Forces of the Armed Services Committee.

Imran’s wife, Hina Alvi, and Rao Abbas, both of whom worked as House IT employees, are also under investigation.

Debbie Wasserman Schultz

The group were banned from accessing the computers as a result of the investigation but, as of earlier this month, Imran Awan remains as an “technology adviser” to former Democratic National Committee chair, Debbie Wasserman Schultz, who was forced to resign in July following revelations that she worked to further Hillary Clinton’s chances of winning the Democratic primary at the expense of Vermont Senator Bernie Sanders.

News of the brothers’ investigation has sparked speculation that it may be tied to the hack of the DNC servers, the contents of which were first released by Guccifer 2.0 and later published on WikiLeaks.

Russian actors have been accused of being behind the hack, which Democrats claim contributed to Clinton’s loss to Donald Trump. There have also been reports that the DNC hack came from an insider.

An email between DNC staffers in April 2016, which was released by WikiLeaks, references a staff member named Imran and how this person has access to the passwords for Wasserman Schultz’s iPad.

Garret Bonosky, deputy director of office of the DNC chair, tells Amy Kroll: “I have to get [this iPad] thing figured out. Need to make sure I have her username and password before I delete and reload the app.”

“I do not have access to her ipad password, but Imran does,” Kroll replies, later writing: “Just spoke to Imran, call me whenever GB and I’ll update you, don’t delete anything yet.”

Another email from the DNC hack, dated December 2016, references Imran once again. Wasserman Schultz’s assistant Rosalyn Kumar tells scheduler Anna Stolitzka: “[Nancy] Pelosi is doing [a] closed door meeting. No staff or anyone allowed. Kaitlyn come to Rayburn room and get her iPad for Imran.”

6-Figure Salaries

The brothers were paid high salaries for their work with various House members, above the median salary for Congressional staffers.

Imran, who started working for Wasserman Schultz in 2005, received $164,600 in 2016, with close to $20,000 of that coming from Wasserman Schultz.

Jamal, who started working as a staffer in 2014, was paid $157,350.12 in 2016.

Abid, who started working in 2005, was paid $160,943 in 2016.

Hina Alvi, who was employed as a staffer from February 2007, was paid 168,300 in 2016.

Rao Abbas was paid $85,049 in 2016.

The Daily Caller reports that Imran received $1.2 million in salary since 2010, while Abid and Alvi received over $1 million each.

House Democrats supporting the employees have suggested that the Pakistani nationality of the suspects may have inspired the investigation.

 
via

Mar 182017
 
Bush fired several U.S. Attorneys to help cover up a pedophile ring being run out of the D.C. hotels involving Congressmen, Senators and reporters!

Bush Fired U.S. Attorneys To Cover Up D.C. Pedophile Ring

This was the Franklin Scandal. The Bush administration fired the agents investigating the crimes to cover it up. U.S. senators and congressmen were covering up the Dusty Foggo government lobbyist and military prostitution and pedophilia ring in Washington involving legislators, news reporters, military officers and high government officials. Alberto Gonzales and President Bush fired San Diego U.S. Attorney Carol Lam because she was probing the Dusty Foggo / Jack Abramoff D.C. sex ring.

According to a long-time senior intelligence agent the Washington, DC Hilton, Ritz Carlton and Sheraton Hotels were used for compromising House and Senate members, National Media hosts who had sex with children in a legislative and media Blackmail ring.

“The whole Republican and Democratic Parties were for sale, the House, Senate and the White House.”

“Poppy Bush and Abramoff were up to their eyeballs in this kid sh*t,” said the Federal Agent.

Supposedly convicted Lobbyist Jack Abramoff provided male and female heterosexual, homosexual, lesbian, bisexual and child prostitutes sexual services to numerous US Congressmen, US senators, national media hosts and other federal officials who were compromised and made susceptible to blackmail at three Washington hotels.

The Washington Hilton was specifically used for sex with children because it has what the agent termed a “super secure section for VIPs that is out of public view and which reportedly employs no camera surveillance, an area able to hold around 6-10 vehicles so that no one could observe abducted, abused or drugged children flown in from other states who were coming to or leaving the hotel.” Hilton employees began to become suspicious of Abramoff’s operation, so children were moved to the Washington Ritz-Carlton according to other intelligence officials.

From Wikileaks:

The Global Intelligence Files

On Monday February 27th, 2012, WikiLeaks began publishing The Global Intelligence Files, over five million e-mails from the Texas headquartered “global intelligence” company Stratfor. The e-mails date between July 2004 and late December 2011. They reveal the inner workings of a company that fronts as an intelligence publisher, but provides confidential intelligence services to large corporations, such as Bhopal’s Dow Chemical Co., Lockheed Martin, Northrop Grumman, Raytheon and government agencies, including the US Department of Homeland Security, the US Marines and the US Defence Intelligence Agency. The emails show Stratfor’s web of informers, pay-off structure, payment laundering techniques and psychological methods.

AGENTS: BUSH FIRINGS OBSTRUCTED SEX / SPY PROBE

Released on 2012-10-15 17:00 GMT

Email-ID 475107
Date 2007-03-27 07:27:50
From TomFlocco@cs.com
To undisclosed-recipients:

AGENTS: BUSH FIRINGS OBSTRUCTED SEX / SPY PROBE

AGENTS: BUSH FIRINGS OBSTRUCTED SEX / SPY PROBE TomFlocco.com Foggo sex ring probe linked to forged Iraq dossier, Israeli espionage, convicted lobbyist Abramoff

According to U.S. intelligence sources, President Bush obstructed justice
last December when he had senior advisor Karl Rove and White House Counsel
Harriet Miers instruct Attorney General Alberto Gonzalez to fire eight
U.S. attorneys who were among several others conducting ongoing public
corruption and secret national security grand jury investigations
connected to an espionagea**linked prostitution / pedophile sex ring
operating at the Washington Ritz-Carlton and other DC hotels, whose
clients included U.S. senators and congressmen, elite Washington news
reporters and high government officialsa**some of whom were named by an
intelligence insider.

Central to the scandal is fired U.S. attorney Carole Lam of California who
was reportedly conducting testimony before grand juries linking indicted
former Bush CIA Executive Director Kyle a**Dustya** Foggo and convicted
Republican lobbyist Jack Abramoff to the sex ring, Israeli espionage, GOP
Under Secretary of Defense for policy Douglas J. Feith, a forged British
intelligence dossier used by Mr. Bush to deceive Americans into supporting
war against Iraq and an attempt to plant weapons of mass destruction (WMD)
in Iraq before the war via an intelligence pipeline through Dubai and
Turkey. READ MORE

 

Original story:

U.S. intelligence: Sen. Leader William Frist and reporter Robert Novak alleged as regular clients

by Tom Flocco

Washington—May 5, 2006—TomFlocco.com—A long-time top-level government agency official joined a national security expert in confirming grand jury testimony last month, revealing that male and female heterosexual, homosexual, lesbian, bisexual and child prostitutes provided sexual services to numerous congressmen, senators, national media hosts and other federal officials who were compromised and made susceptible to blackmail at three Washington hotels.

“The whole Republican Party was for sale—the House, Senate and the White House,” said a well-respected federal agency official with impeccable credentials who declined to be named but who is familiar with testimony and sources close to the grand jury probing Jack Abramoff.

Patrick Fitzgerald

Patrick Fitzgerald

Special Prosecutor Patrick Fitzgerald’s grand jury heard several agents testify in April that the “Watergate, Ritz-Carlton and Sheraton Hotels in Washington, DC were used to compromise legislators and news-people with prostitution services, the financing of which is directly linked to the American Israeli Public Affairs Committee (AIPAC), former Israeli Prime Minister Benjamin Netanyahu, Marc Rich and Abramoff,” said national security expert Thomas Heneghan.There are no corporate media reports as to which White House officials participated in the hotel sex ring activities with House and Senate members; however, Heneghan said U.S. Senate Leader and 2008 presidential candidate William Frist was alleged to be a frequent visitor to the hotels according to U.S. intelligence agents.

Frist is reportedly a close friend of alleged Bush 43 male consort and former Knoxville, Tennessee mayor Victor Ashe according to federal agents.

Heneghan also alleged additional prostitute customers as British Prime Minister Tony Blair and former CNN host-reporter Robert Novak, both of whom were introduced into the sex-ring by GOP reporter and male prostitute Jeff Gannon, who visited the Bush White House living quarters 200 times without the assignations being recorded in visitor logs.

Jack Abramoff

Jack Abramoff

The genesis of the Valerie Plame CIA leak allegedly took place during one of Novak’s visits with an Abramoff hooker at one of the hotels according to the sources.The corruption and crimes surrounding the indicted Republican lobbyist were widespread and far-reaching enough to cause Fitzgerald to impanel a separate grand jury, often referred to by intelligence officials as the “Franklin grand jury,” which is hearing testimony and examining Abramoff linked evidence tied to the Iraq War, September 11 and related issues.

Pentagon analyst Larry Franklin was arrested for leaking classified U.S. government information to AIPAC officials Steve Rosen and Keith Weissman who reportedly leaked information to Israel concerning a controversial proposal by Department of Defense hardliners to destabilize Iran.

The federal source wishing to remain anonymous said that additional government officials are currently testifying this month before the Franklin grand jury about Abramoff, the GOP-linked prostitution ring and its ties to AIPAC.

“Photographs of politicians in compromising positions have reportedly already been used as blackmail to silence politicians who would speak the truth about the 2000 election fraud in Florida, 9-11, Iraq/yellowcake/WMD and how Jack Abramoff and Netanyahu were the pimps for the operation,” said Heneghan.

President Bush has emphatically denied that he personally knows Abramoff, despite CIA records indicating the indicted lobbyist visited the White House 200 times during the first ten months of the Bush presidency—often enough for a personal visit on every business day of each month, according to wide news reports.

Despite the daily White House visits, Bush said “I’ve never sat down with him and had a discussion with the guy,” adding, “I’m also mindful that we live in a world in which those pictures will be used for pure political purposes,” attempting to justify his unwillingness at first to release photos of him chatting amicably with Abramoff.

Fitzgerald is reportedly convinced that the Bush administration wanted Valerie Plame-Wilson’s identity as a CIA official leaked because her intelligence team had identified Israeli Mossad operatives inside Iran who were to receive weapons of mass destruction (WMD) to be delivered through Turkey and planted in Iraq to further the president’s case for war, said the intelligence expert.

“The financing for these whorehouses is linked directly to AIPAC, Benjamin Netanyahu, Marc Rich and Jack Abramoff; and the money trail ties back to American International Group (AIG), Hank Greenberg and Doug Alexander—former British Minister of E-Commerce,” said Heneghan.
In an ominous prediction, Heneghan said, “It won’t be long before the un-compromised U.S. military may have to declare a State of Emergency and re-implementation of the Constitution under a special provision of the Naval Code, which would lead to the arrest and removal of the criminal government residing at 1600 Pennsylvania Avenue.”(Bush and his thugs)

According to Heneghan, the Abramoff congressional sex ring is tied to the SunCruz Casino scandal, secret accounts at Riggs Bank and Crozier Bank, the 9-11 “hijacker” Venice, Florida flight schools, and former U.S. ambassador to Italy Mel Sembler and Doug Alexander—both of whom have been linked to the reported Florida 2000 election fraud—all of which is tied to a financial trail that connects narcotics trafficking to Al Qaeda and the congressional sex ring.

MSNBC host and former congressman Joe Scarborough, subject of a recent TomFlocco.com story, “is now cooperating with federal investigators in the Abramoff matter which has led the probe to the doorsteps of the AIPAC whorehouses now operating in Washington, DC,” said Heneghan.

The intelligence expert told us “Scarborough told federal investigators that he now believes his female staff member was murdered in his congressional office to silence her regarding knowledge of Alexander, Sembler, Katherine Harris, Jeb Bush and the Florida election 2000 coup d’ etat.”

 
via

FLASHBACK – CIA Director David Petraeus: “We’ll Spy on You Through Your Dishwasher”

 Political  Comments Off on FLASHBACK – CIA Director David Petraeus: “We’ll Spy on You Through Your Dishwasher”
Mar 112017
 
In a 2012 Wired article, entitled, “CIA Chief: We’ll Spy on You Through Your Dishwasher,” then CIA Director David Petraeus heralded emerging technologies in relation to spying.
FLASHBACK - CIA Director David Petraeus: "We’ll Spy on You Through Your Dishwasher"

CIA Director David Petraeus unwinds with some Wii Golf, 2008. Photo: Wikimedia

With Wikileaks latest, largest dump of confidential CIA files ever published, the world is beginning to realize just how far gone our privacy rights are. They have become virtually nonexistent thanks to Obama’s two terms in office.

As far back as a five years ago, then CIA Director General David Petraeus was touting how hi-tech advances offered countless ways Americans can be spied on.

With the rise of the “Smart Home,” you are sending tagged, Geo-located data that the CIA can intercept in real-time when you use the lighting app on your phone to adjust your living room’s ambiance.

The CIA had a plan that smart meters, smart phones, smart TVs and other smart household devices installed in every hopelessly “Dumbed Down” American’s home would permit the Deep State complete invasive access to you in the un-private, unsafe sanctuary you call home.

From Wired March 2012:

MORE AND MORE personal and household devices are connecting to the internet, from your television to your car navigation systems to your light switches. CIA Director David Petraeus cannot wait to spy on you through them.

Earlier this month, Petraeus mused about the emergence of an “Internet of Things” — that is, wired devices — at a summit for In-Q-Tel, the CIA’s venture capital firm. “‘Transformational’ is an overused word, but I do believe it properly applies to these technologies,” Petraeus enthused, “particularly to their effect on clandestine tradecraft.”

All those new online devices are a treasure trove of data if you’re a “person of interest” to the spy community. Once upon a time, spies had to place a bug in your chandelier to hear your conversation. With the rise of the “smart home,” you’d be sending tagged, geolocated data that a spy agency can intercept in real time when you use the lighting app on your phone to adjust your living room’s ambiance.

“Items of interest will be located, identified, monitored, and remotely controlled through technologies such as radio-frequency identification, sensor networks, tiny embedded servers, and energy harvesters — all connected to the next-generation internet using abundant, low-cost, and high-power computing,” Petraeus said, “the latter now going to cloud computing, in many areas greater and greater supercomputing, and, ultimately, heading to quantum computing.”

Petraeus allowed that these household spy devices “change our notions of secrecy” and prompt a rethink of “our notions of identity and secrecy.” All of which is true — if convenient for a CIA director.

The CIA has a lot of legal restrictions against spying on American citizens. But collecting ambient geolocation data from devices is a grayer area, especially after the 2008 carve-outs to the Foreign Intelligence Surveillance Act. Hardware manufacturers, it turns out, store a trove of geolocation data; and some legislators have grown alarmed at how easy it is for the government to track you through your phone or PlayStation.

That’s not the only data exploit intriguing Petraeus. He’s interested in creating new online identities for his undercover spies — and sweeping away the “digital footprints” of agents who suddenly need to vanish.

“Proud parents document the arrival and growth of their future CIA officer in all forms of social media that the world can access for decades to come,” Petraeus observed. “Moreover, we have to figure out how to create the digital footprint for new identities for some officers.”

It’s hard to argue with that. Online cache is not a spy’s friend. But Petraeus has an inadvertent pal in Facebook.

Why? With the arrival of Timeline, Facebook made it super-easy to backdate your online history. Barack Obama, for instance, hasn’t been on Facebook since his birth in 1961. Creating new identities for CIA non-official cover operatives has arguably never been easier. Thank Zuck, spies. Thank Zuck.