World
James George Jatras
March 9, 2017
© Photo: Public domain

The latest release of a massive trove of apparently genuine documents originating with the Central Intelligence Agency comes as Donald Trump’s grudge match with the Deep State and its Mainstream Media (MSM) allies was already reaching the boiling point. It will now get even hotter, if that’s possible.

On the details, so-called «Vault 7» consists of some 8,761 documents evidently originating in the CIA’s Center for Cyber Intelligence. According to Wikileaks, it shows that U.S. intelligence agencies have developed effective methods to break into devices from iPhones and Android phones to Samsung «smart» televisions, allowing them to monitor communications even when devices are turned off. The documents also disclose malware, viruses, and security vulnerabilities known as «zero days» and several hundred million lines of code used by the CIA, as well as the agency’s ability to break into devices and intercept messages before they can be encrypted by applications such as WhatsApp, Signal, Telegram, Confide, and others many people wrongly considered to be secure.

In short, in case anyone had any doubts, privacy is a fiction, for any person or any organization. Not that that’s much of a surprise, but it’s still disquieting to see the details. Only the naïve would believe that several other countries with advanced cyber-technology don’t have similar capabilities as the U.S., if not exactly with the depth and breadth of those now on display.

Trump and his supporters now can point to the pervasiveness and sophistication of these techniques in support of the President’s claim that his predecessor, Barack Obama, bugged his communications at Trump Tower in New York. Deep State and MSM enemies of the President will cite the same evidence as support for the kind of capabilities that Russia likely also has, feeding their unsupported claims that Russian hackers tried to, and perhaps succeeded in, skewing the election in favor or Trump and against Hillary Clinton. The release of these new documents at a time when anti-Trumpers already had claimed Lt. Gen. Mike Flynn’s scalp and are aiming for that of Attorney General Jeff Sessions will be taken as further confirmation of their claim that Wikileaks is a tool of Moscow. 

The new document cache will be picked over for some time and new conclusions drawn, but even now there are some lessons to be learned.

First, Vault 7 completely demolishes the already meager claim in December 2016 from the outgoing Obama administration that evidence of «Russian code» in alleged hacking of the Democratic National Committee proved Moscow’s involvement. That argument was absurd on its face even when it was made, roughly equivalent to suggesting that because a gang of bank robbers used a Volkswagen for a getaway car they must have been Germans. Clearly Russian hackers would use anything but Russian software to avoid pointing back to themselves. Wikileaks now confirms the CIA’s use of Russian software for false-flag effect:

«The CIA's Remote Devices Branch's UMBRAGE group collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation.

«With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the ‘fingerprints’ of the groups that the attack techniques were stolen from.»

Second, Vault 7 should be scrubbed for evidence of coordination between American agencies and those of the other «Five Eyes» Anglosphere countries with which the U.S. closely shares intelligence: the United Kingdom, Canada, Australia, and New Zealand. Why? There’s a saying in Washington: never believe anything until it’s been officially denied. Obama has been lawyerly definitive in his denials of ordering taps on Trump and his team or on any American citizen, ever. More precise in his language has been James Clapper, former Director of National Intelligence (DNI), who states that «there was no wiretap against Trump Tower during the campaign conducted by any part of the national intelligence community». This begs the question of whether Trump was tapped not by a U.S. «national» agency but by one of the Five Eyes sister agencies, which then passed the information back to their American colleagues, a ploy to avoid legal prohibitions on domestic spying or even a pro formawarrant requirement. A U.S. former intelligence official familiar with the practice tells me that such a maneuver was not only a possible means for the espionage against Trump but probable. The most likely agency to have carried out the task is the UK’s Government Communications Headquarters (GCHQ), formal counterpart of the U.S. National Security Agency and its virtual satellite.

The views of individual contributors do not necessarily represent those of the Strategic Culture Foundation.
Wikileaks CIA Document Dump Heats Up Fight Between Trump and Deep State/MSM

The latest release of a massive trove of apparently genuine documents originating with the Central Intelligence Agency comes as Donald Trump’s grudge match with the Deep State and its Mainstream Media (MSM) allies was already reaching the boiling point. It will now get even hotter, if that’s possible.

On the details, so-called «Vault 7» consists of some 8,761 documents evidently originating in the CIA’s Center for Cyber Intelligence. According to Wikileaks, it shows that U.S. intelligence agencies have developed effective methods to break into devices from iPhones and Android phones to Samsung «smart» televisions, allowing them to monitor communications even when devices are turned off. The documents also disclose malware, viruses, and security vulnerabilities known as «zero days» and several hundred million lines of code used by the CIA, as well as the agency’s ability to break into devices and intercept messages before they can be encrypted by applications such as WhatsApp, Signal, Telegram, Confide, and others many people wrongly considered to be secure.

In short, in case anyone had any doubts, privacy is a fiction, for any person or any organization. Not that that’s much of a surprise, but it’s still disquieting to see the details. Only the naïve would believe that several other countries with advanced cyber-technology don’t have similar capabilities as the U.S., if not exactly with the depth and breadth of those now on display.

Trump and his supporters now can point to the pervasiveness and sophistication of these techniques in support of the President’s claim that his predecessor, Barack Obama, bugged his communications at Trump Tower in New York. Deep State and MSM enemies of the President will cite the same evidence as support for the kind of capabilities that Russia likely also has, feeding their unsupported claims that Russian hackers tried to, and perhaps succeeded in, skewing the election in favor or Trump and against Hillary Clinton. The release of these new documents at a time when anti-Trumpers already had claimed Lt. Gen. Mike Flynn’s scalp and are aiming for that of Attorney General Jeff Sessions will be taken as further confirmation of their claim that Wikileaks is a tool of Moscow. 

The new document cache will be picked over for some time and new conclusions drawn, but even now there are some lessons to be learned.

First, Vault 7 completely demolishes the already meager claim in December 2016 from the outgoing Obama administration that evidence of «Russian code» in alleged hacking of the Democratic National Committee proved Moscow’s involvement. That argument was absurd on its face even when it was made, roughly equivalent to suggesting that because a gang of bank robbers used a Volkswagen for a getaway car they must have been Germans. Clearly Russian hackers would use anything but Russian software to avoid pointing back to themselves. Wikileaks now confirms the CIA’s use of Russian software for false-flag effect:

«The CIA's Remote Devices Branch's UMBRAGE group collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation.

«With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the ‘fingerprints’ of the groups that the attack techniques were stolen from.»

Second, Vault 7 should be scrubbed for evidence of coordination between American agencies and those of the other «Five Eyes» Anglosphere countries with which the U.S. closely shares intelligence: the United Kingdom, Canada, Australia, and New Zealand. Why? There’s a saying in Washington: never believe anything until it’s been officially denied. Obama has been lawyerly definitive in his denials of ordering taps on Trump and his team or on any American citizen, ever. More precise in his language has been James Clapper, former Director of National Intelligence (DNI), who states that «there was no wiretap against Trump Tower during the campaign conducted by any part of the national intelligence community». This begs the question of whether Trump was tapped not by a U.S. «national» agency but by one of the Five Eyes sister agencies, which then passed the information back to their American colleagues, a ploy to avoid legal prohibitions on domestic spying or even a pro formawarrant requirement. A U.S. former intelligence official familiar with the practice tells me that such a maneuver was not only a possible means for the espionage against Trump but probable. The most likely agency to have carried out the task is the UK’s Government Communications Headquarters (GCHQ), formal counterpart of the U.S. National Security Agency and its virtual satellite.

n="center"> SIGN UP!!! CLICK HERE TO GET 52 BOOKS FREE!!

SIGN UP!! FOR BOOKS AND REGULAR ARTICLES

https://againstsatanism.com/Prices.htm

 

HOW TO DEFEAT SATANISM AND LUCIFERIANISM AND BOOST YOUR EVOLUTION THROUGH ENERGY ENHANCEMENT MEDITATION

"I have experience of many forms of meditation and practices for self improvement including: Transcendental meditation (TM) 12 years, Kriya Yoga 9 years, Sushila Buddhi Dharma (SUBUD) 7 years, and more recently the Sedona Method and the Course in Miracles.

The Energy Enhancement programme encapsulates and expands all of these systems, it is complete and no questions are left unanswered."

Jean, NUCLEAR ENGINEER

 

Energy Enhancement Level 0 Super Chi Prana, Power, Strength, Immortality

https://www.energyenhancement.org/LEVEL-Energy-Enhancement-Super-Chi-Immortality-Prana-Meditation-Course.htm

Energy Enhancement Meditation LEVEL 1 Immortality - Activate the Antahkarana! Gain Infinite Energy from the Chakras above the Head - Power UP!! Open Your Third Eye, Gain Super Samadhi Kundalini Alchemical VITRIOL Energy. Ground All Negative Energies. Access Quantum Immortality

https://www.energyenhancement.org/Level1.htm

Energy Enhancement Meditation LEVEL 2 - The Energy Enhancement Seven Step Process to Totally Remove Energy Blockages, Totally Remove All Problems, Totally Remove Negative Emotions, Heal Your DNA, Remove your Karma - OPEN YOUR LIFE!!

https://www.energyenhancement.org/Level2.htm

Energy Enhancement Meditation LEVEL 3 - Eliminate even Deeper Energy Blockages - The Removal of Strategies. Quantum Integration. The Karma Cleaning Process to Totally Eliminate All Your Karma, all your Trauma, all your Energy Blockages from All your Past Lifetimes!!

https://www.energyenhancement.org/Level3.htm

Energy Enhancement Meditation LEVEL 4 - Stop the Suck!! Heal All your Relationships!! Find Your Twin Flame!! MASTER ENERGY CONNECTIONS AND RELATIONSHIPS

https://www.energyenhancement.org/Level4.htm

 

OUR SPECIAL MEDITATION REVOLUTION OFFER!!

WE HAVE THE TECHNOLOGY

WE CAN REMOVE YOUR ENERGY BLOCKAGES, ENTITIES AND DEMONS

WE CAN RE-BUILD YOU..