Predictably, the lying media is acting as though this foreign policy shift is more evidence of a Russkie conspiracy.
As the CIA continues to defend their investment in the Muslim Brotherhood to bring “moderate Islamist democracy” to the Middle East, much of the Middle East and our European allies are moving against the group.
CIA Director Mike Pompeo says he thinks disclosure of America’s secret intelligence is on the rise, fuelled partly by the “worship” of leakers like Edward Snowden.
“In some ways, I do think it’s accelerated,” Mr Pompeo told MSNBC. “I think there is a phenomenon, the worship of Edward Snowden, and those who steal American secrets for the purpose of self-aggrandisement or money or for whatever their motivation may be, does seem to be on the increase.”
Mr Pompeo said the United States needs to redouble its efforts to stem leaks of classified information.
Leaked CIA documents have revealed the agency has been hacking people’s Wi-Fi routers and using them as covert listening points.
Infected routers are used to spy on the activity of internet-connected device, according to decade-old secret documents leaked on Thursday by Wikileaks.
Home routers from 10 US manufacturers, including Linksys, DLink, and Belkin, have been used by the CIA to monitor internet traffic.
The Berlin-based European Center for Constitutional and Human Rights (ECCHR) has called on German federal prosecutors to issue an arrest warrant against Gina Haspel, the deputy director of the CIA, who was appointed on February 2.
The ECCHR first pressed charges against unknown CIA operatives in December 2014, after the US Senate Select Committee published its report on the CIA’s detention and interrogation program. Though she was a clandestine agent at the time, Haspel’s appointment as deputy director meant that she could be identified.
According to the ECCHR writ sent to the prosecutors and published on the group’s website on Wednesday, “some of the already known events can now be attributed to her.” A spokeswoman for the federal prosecutor confirmed to DW that it had received the writ and said it would be evaluating it carefully.
WikiLeaks’ latest batch of documents, named ‘Marble’, details CIA hacking tactics and how they can hamper forensic investigators from attributing viruses, trojans and hacking attacks to the spy agency. The tool was in use as recently as 2016.
The third release, which contains 676 source code files for the agency’s secret anti-forensics framework, is part of the CIA’s Core Library of malware, according to a statement from WikiLeaks.
Russia, eh? Interesting.
h/t mauser 98
Latest WikiLeaks release shows how the CIA uses computer code to hide the origins of its hacking attacks and ‘disguise them as Russian or Chinese activity’
WikiLeaks has published hundreds more files today which it claims show the CIA went to great lengths to disguise its own hacking attacks and point the finger at Russia, China, North Korea and Iran.
The 676 files released today are part of WikiLeaks’ Vault 7 tranche of files and they claim to give an insight into the CIA’s Marble software, which can forensically disguise viruses, trojans and hacking attacks.
WikiLeaks says the source code suggests Marble has test examples in Chinese, Russian, Korean, Arabic and Farsi (the Iranian language).
Amazon’s Echo, a voice activated smart home device, does not appear in the leaked information. However, a video posted to Twitter appearing to show the personnel device shirking a simple question about whether it has links to the CIA is provoking debate and humor online.
In the week that WikiLeaks revealed the CIA and MI5 have an armoury of surveillance tools that can spy on people through their smart TVs, cars and cellphones, FBI director James Comey has said that Americans should not have expectations of “absolute privacy”.
“There is no such thing as absolute privacy in America: there is no place outside of judicial reach,” Comey said at a Boston College conference on cybersecurity. The remark came as he was discussing the rise of encryption since Edward Snowden’s 2013 revelations of the NSA’s mass surveillance tools, used on citizens around the world.
View the documents here.
A total of 8,761 documents have been published as part of ‘Year Zero’, the first in a series of leaks the whistleblower organization has dubbed ‘Vault 7.’ WikiLeaks said that ‘Year Zero’ revealed details of the CIA’s “global covert hacking program,” including “weaponized exploits” used against company products including “Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.”
WikiLeaks tweeted the leak, which it claims came from a network inside the CIA’s Center for Cyber Intelligence in Langley, Virginia.
— Jeremy Nolt (@RealJeremyNolt) March 7, 2017
More… CIA can and does hack almost EVERY device: Giant Wikileak of agency’s secrets reveals it infiltrates iPhones, smart TVs and Whatsapp and can even take over self-driving cars which could be programmed to kill
National Security Advisor Gen. Michael T. Flynn (ret.) — who resigned Monday — was the victim of a “hit job” launched by intelligence operatives, Obama government holdovers and former Obama national security officials, according to former intelligence officials who spoke with The Daily Caller News Foundation’s Investigative Group.
The talk within the tight-knit community of retired intelligence officers was that Flynn’s sacking was a result of intelligence insiders at the CIA, NSA and National Security Council using a sophisticated “disinformation campaign” to create a crisis atmosphere. The former intel officers say the tactics hurled against Flynn over the last few months were the type of high profile hard-ball accusations previously reserved for top figures in enemy states, not for White House officials.
The Central Intelligence Agency is putting its clandestine history out in the open with a declassified trove of 12 million pages that’s available online.
Documents covering the agency’s work from the 1940s through 1990s were previously accessible — but only by visiting the National Archives in College Park, Maryland. The CIA is required to declassify most records that are 25 years or older.
Brennan called the comparison of the CIA, NSA, FBI and the director of national intelligence offensive to American officers.
“What I do find outrageous is equating an intelligence community with Nazi Germany,” he said. “I do take great umbrage at that, and there is no basis for Mr Trump to point fingers at the intelligence community for leaking information that was already available publicly.”
- The information was not available publicly.
- The sting of an insult is proportional to its accuracy.
President-elect Donald Trump, after growing suspicious that intelligence officials were leaking news about their classified briefings with him, says he conducted a sting operation to try to prove top spies were behind the leaks.
Trump revealed the extraordinary scheme to try to entrap the senior spies in a furious press conference where he suggested the intelligence community had been behind salacious and totally unproven allegations against him.
In the course of research for my two-volume history of Ronald Reagan I read through a lot of declassified CIA assessments and reports, and was amazed at how consistently bad, and most often wrong, the analysis was…