Unaccounted Power is Dragging Global Society Into An Orwellian Dystopia

By Dr Nozomi Hayase

WikiLeaks dropped a bombshell on the U.S. Central Intelligence Agency. Code-named “Vault 7”, the whistleblowing site began releasing the largest publication of confidential documents, that have come from the top secret security network at the Cyber Intelligence Center.

Long before the Edward Snowden revelations, Julian Assange noted how “The Internet, our greatest tool of emancipation, has been transformed into the most dangerous facilitator of totalitarianism we have ever seen.” He decried the militarisation of the Internet with the penetration by the intelligence agencies like NSA and GCHQ, which created “a military occupation of civilian space”.

Now, WikiLeaks’ latest disclosures shed further light on this cyber-warfare, exposing the role of the CIA.

At a recent press conference from the Ecuadorian embassy in London, Assange explained how the CIA developed its own cyber-weapons arsenal and lost it after storing it all in one place. What is alarming is that the CIA became aware of this loss and didn’t warn the public about it. As a result, this pervasive technology that was designed to hide all traces, can now be used by cyber-mafias, foreign agents, hackers and by anyone for malicious purposes.

Part one of this WikiLeaks publication dubbed “Year Zero”, revealed the CIA’s global hacking force from 2013 to 2016. The thousands of documents released contain visceral revelations of the CIA’s own version of an NSA. With an ability to hack any Android or iPhone, as well as Samsung TVs and even cars, they spy on citizens, bypassing encrypted messaging apps like Signal and Telegram. The Vault 7 leaks that exposed the CIA’s excessive power is of great importance from a point of view of security for individual privacy. But it has larger significance tied to the mission of WikiLeaks.

Opening Government into the Deep State

Describing itself on its site as “a multi-national media organisation and associated library”, WikiLeaks aims to open governments in order to bring justice. In the speech at the SWSX conference in Texas, delivered via Skype in 2014, Assange described the particular environment that spawned the culture of disclosure this organisation helped to create.

He noted how “we were living in some fictitious representation of what we thought was the world” and that the “true history of the world” is “all obscured by some kind of fog”. This founder and editor in chief of innovative journalism explained how disclosures made though their publications break this fog.

The magnitude of this Vault 7 cache, which some say may be bigger than the Snowden revelations, perhaps lies in its effect of clearing the fog to let people around the world see the ground upon which the narratives of true history are written.

Since coming online in 2007, WikiLeaks has published more than 10 million documents. Each groundbreaking disclosure got us closer to where the real power of the world resides. In 2010, WikiLeaks rose to prominence with the publication of the Collateral Murder video. With the release of documents concerning U.S. Wars in Iraq and Afghanistan, they hit on the nerves of the Pentagon —the central nervous system of the Military Industrial Complex. With the release of the U.S. Diplomatic Cables, they angered the State Department and came head to head with this global superpower.

Last year, this unprecedented publisher with its perfect record of document authentication, began to blow the cover off American democracy a step further to clear the fog. WikiLeaks played an important role in the 2016 U.S. Presidential election. The DNC leaks disrupted the prescribed script of corporate sponsored lesser of two evils charade politics. The publication of the Podesta emails that revealed internal workings of the Clinton campaign, gave the American people an opportunity to learn in real time about the function of the electoral arena as a mechanism of control.

With the demise of the Democratic Party, led by its own internal corruption, the cracks in this façade widened, unveiling the existence of a government within a government.

People are beginning to glimpse those who seek to control behind the scenes – anonymous unelected actors who exercise enduring power in Washington by manipulating public perception.

This unraveling that has been slowly unfolding, appeared to have reached a peak last month when Trump’s former National Security Adviser, Michael Flynn resigned. He was forced to do this on the grounds that leaked classified information revealed he was lying about his phone conversation discussing sanctions with the Russian Ambassador.

WikiLeaks now entered its 10th year. The momentum continues, bringing us to a new pinnacle of disclosure. At the end of last year, in anticipation of this new release, WikiLeaks tweeted, “If you thought 2016 was a big WikiLeaks year, 2017 will blow you away.” During the dramatic takedown of General Flynn, the media created a frenzy around unconfirmed claims that Russia was meddling with the U.S. election and Putin’s alleged ties with Trump, creating another fog of obfuscation. It was in this climate that WikiLeaks published documents showing CIA espionage in the last French presidential election.

History Awakening

The idea of a shadow government has been the focus of political activists, while it has also been a subject of ridicule as conspiracy theories. Now, WikiLeaks’ pristine documents provide irrefutable evidence about this hidden sector of society. The term ‘deep state’ that is referenced in the mainstream media, first hit the major airwaves in 2014, in Bill Moyers’ interview with Mike Lofgren. This former congressional staff member discussed his essay titled “Anatomy of the Deep State” and explained it as the congruence of power emerging as a “hybrid of corporate America and national security state”.

We are now watching a deep state sword-fight against the elected Caesar of American plutocracy in this gladiator ring, surrounded by the cheers of liberal intelligentsia, who are maddened with McCarthy era hysteria. As the Republic is falling with its crumbling infrastructure and anemic debt economy, far away from the coliseum, crazed with the out-of-tune national anthem, the silent pulse of hope begins to whisper.

WikiLeaks unlocked the vaults that had swallowed the stolen past. As the doors open into this hidden America, history awakens with dripping blood that runs deep inside the castle. As part of the release of this encrypted treasure-trove of documents, WikiLeaks posted on Twitter the following passphrase; “SplinterItIntoAThousandPiecesAndScatterItIntoTheWinds.” These were actually words spoken by President John F. Kennedy, a month before his assassination. His exact words wereI will splinter the CIA into a thousands pieces and scatter it into the wind” – which shows his attitude toward the CIA as an arm of the deep state and what many believe to be the real reason for his assassination.

The secret stream of history continues, taking control over every aspect of civil life and infecting the heart of democracy. The U.S. has long since lost its way. We have been living in a fictitious representation of the flag and the White House. It is not judicial boundaries drawn by the Constitution or even the enlightenment ideals that once inspired the founders of this country that now guide the course of our lives. Tyranny of the old world casts its shadow, binding Congress, the Supreme Court and the President into a rule of oligarchy. CIA documents revealed that the U.S. Consulate in Frankfurt was used as a covert hacking base, while CIA officers work under the cover of the State Department to penetrate with these intelligence operations. The Wall Street Journal now reports that President Trump has given the CIA expanded authority to carry out drone attacks, which was power that prior to that had only been given to the Pentagon.

Decisions that radically alter the direction of our society are not made in a fair democratic election, a public hearing or the senate floor. They are made in the FISA Court and secret grand juries, bypassing judicial warrants and democratic accountability. This hidden network of power that exists above the law entangles legislators, judges and the press into a web of deception through dirty money and corrupt influence. It controls perception of the past, present and future.

The Internet Generation

As the deep state comes to the surface, we are able to see the real battle on the horizon. What is revealed here is a clash of values and two radically different visions of a future civilization. In his response to the Vault 7 publication, Michael Hayden, the former CIA director was quick to lay blame on the millennials. He said, “This group of millennials and related groups simply have different understandings of the words loyalty, secrecy and transparency than certainly my generation did”. To him, these young people are the problem, as if their different cultural approach and instincts must be tempered and indoctrinated into this hierarchical system, so they know who their masters are.

Who are these people that are treated as a plague on society? This is the Internet generation, immersed with the culture of the free-net, freedom of speech and association. They believe in privacy for individuals, while demanding transparency for those in power. Peter Ludlow, a philosopher who writes under the pseudonym Urizenus Sklar, shared his observation of a cultural shift that happened in 2011. He noted that WikiLeaks had become a catalyst for an underground subculture of hackers that burst into the mainstream as a vital political force.

Assange recognised this development in recent years as a “politicisation of the youth connected to Internet” and acknowledged it as “the most significant thing that happened in the world since the 1960s”.

This new generation ran into the deep state and those who confront it are met with intense hostility. Despite his promise of becoming the most transparent government, Obama engaged in unprecedented persecution of whistleblowers. Now this dark legacy seems to be continuing with the present administration. Vice president Mike Pence vowed to “use the full force of the law” to hunt down those who released the Intelligence Agency’s secret material.

As these conflicts heat up, resistance continues in the Internet that has now become a battleground. Despite crackdowns on truthtellers, these whistleblowers won’t go away. From Manning to Snowden, people inside institutions who have come to see subversion of government toward insidious control and want change, have shown extraordinary courage.

According to a statement given to WikiLeaks, the source behind the CIA documents is following the steps of these predecessors. They want this information to be publicly debated and for people to understand the fact that the CIA created its own NSA without any oversight. The CIA claims its mission is to “aggressively collect foreign intelligence overseas to protect America from terrorists, hostile nation states and other adversaries”. With these documents that have now been brought back to the historical archive, the public can examine whether this agency has itself lost control and whose interests they truly serve.

The Future of Civilisation

As the world’s first stateless 4th estate, WikiLeaks has opened up new territory where people can touch the ground of uncensored reality and claim creative power to participate in the history that is happening. In a press conference on Periscope, Assange made reference to a statement by the President of Microsoft, who called for the creation of a digital Geneva Convention to provide protection against nation-states and cyber-attacks. He then affirmed WikiLeaks’s role as a neutral digital Switzerland for people all over the world.

WikiLeaks is taking the first step toward this vision. After they carefully redacted the actual codes of CIA hacking tools, anonymised names and email addresses that were targeted, they announced that they will work with tech companies by giving them some exclusive access to the material. Assange explained that this could help them understand vulnerabilities and produce security fixes, to create a possible antidote to the CIA’s breach of security and offer countermeasures. WikiLeaks tweeted notifying the public that they now have contacted Apple, Microsoft, Google, Mozilla and MicroTik to help protect users against CIA malware.

The Internet unleashed the beast that grows its force in the dark. Unaccounted power is dragging global society down into an Orwellian dystopia. Yet, from this same Internet, a new force is arising. Courage of the common people is breaking through the firewall of secrecy, creating a fortress that becomes ever more resilient, as the network of people around the world fighting for freedom expands.

When democracy dies in darkness, it can be reborn in the light of transparency. The deep state stretches across borders, sucking people into an abyss of totalitarian control. At the same time, the epic publication of Vault 7 that has just begun, reminds us that the greatness in each of us can awaken to take back the power of emancipation and participate in this battle for democracy, the outcome of which could not only determine the future of the Internet, but of our civilisation.

 

Nozomi Hayase, Ph.D., a native of Japan, is a columnist, researcher, and the First Amendment advocate. She is member of The Indicter‘s Editorial Board and a former contributing writer to WL Central and has been covering issues of free speech, transparency and the vital role of whistleblowers in global society.

The Misguided ‘Vault 7’ Whodunit

By Jesselyn Radack

Source: Expose Facts

It is the leakiest of times in the Executive Branch. Last week, Wikileaks published a massive and, by all accounts genuine, trove of documents revealing that the CIA has been stockpiling, and lost control of, hacking tools it uses against targets. Particularly noteworthy were the revelations that the CIA developed a tool to hack Samsung TVs and turn them into recording devices and that the CIA worked to infiltrate both Apple and Google smart phone operating systems since it could not break encryption. No one in government has challenged the authenticity of the documents disclosed.

We do not know the identity of the source or sources, nor can we be 100% certain of his or her motivations. Wikileaks writes that the source sent a statement that policy questions “urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency” and that the source “wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyber-weapons.”

The FBI has already begun hunting down the source as part of a criminal leak investigation. Historically, the criminal justice system has been a particularly inept judge of who is a whistleblower. Moreover, it has allowed the use of the pernicious Espionage Act—an arcane law meant to go after spies—to go after whistleblowers who reveal information the public interest. My client, former NSA senior official Thomas Drake, was prosecuted under the Espionage Act, only to later be widely recognized as a whistleblower. There is no public interest defense to Espionage Act charges, and courts have ruled that a whistleblower’s motive, however salutary, is irrelevant to determining guilt.

The Intelligence Community is an equally bad judge of who is a whistleblower, and has a vested interest in giving no positive reinforcement to those who air its dirty laundry. The Intelligence Community reflexively claims that anyone who makes public secret information is not a whistleblower. Former NSA and CIA Director General Michael V. Hayden speculated that the recent leaks are to be blamed on young millennials harboring some disrespect for the venerable intelligence agencies responsible for mass surveillance and torture. Not only is his speculation speculative, but it’s proven wrong by the fact that whistleblowers who go to the press span the generational spectrum from Pentagon Papers whistleblower Daniel Ellsberg to mid-career and senior level public servants like CIA torture whistleblower John Kiriakou and NSA whistleblower Thomas Drake to early-career millennials like Army whistleblower Chelsea Manning and NSA whistleblower Edward Snowden. The lawbreaker does not get to decide who is a whistleblower.

Not all leaks of information are whistleblowing, and the word “whistleblower” is a loaded term, so whether or not the Vault 7 source conceives of him or herself as a whistleblower is not a particularly pertinent inquiry. The label “whistleblower” does not convey some mythical power or goodness, or some “moral narcissism,” a term used to describe me when I blew the whistle. Rather, whether an action is whistleblowing depends on whether or not the information disclosed is in the public interest and reveals fraud, waste, abuse, illegality or dangers to public health and safety. Even if some of the information revealed does not qualify, it should be remembered that whistleblowers are often faulted with being over- or under-inclusive with their disclosures. Again, it is the quality of the information, not the quantity, nor the character of the source.

Already, the information in the Vault 7 documents revealed that the Intelligence Community has misled the American people. In the wake of Snowden’s revelations, the Intelligence Community committed to avoid the stockpiling of technological vulnerabilities, publicly claiming that its bias was toward “disclosing them” so as to better protect everyone’s privacy. However, the Vault 7 documents reveal just the opposite: not only has the CIA been stockpiling exploits, it has been aggressively working to undermine our Internet security. Even assuming the CIA is using its hacking tools against the right targets, a pause-worthy presumption given the agency’s checkered history, the CIA has empowered the rest of the hacker world and foreign adversaries by hoarding vulnerabilities, and thereby undermined the privacy rights of all Americans and millions of innocent people around the world. Democracy depends on an informed citizenry, and journalistic sources—whether they call themselves whistleblowers or not—are a critical component when the government uses national security as justification to keep so much of its activities hidden from public view.

As we learn more about the Vault 7 source and the disclosures, our focus should be on the substance of the disclosures. Historically, the government’s reflexive instinct is to shoot the messenger, pathologize the whistleblower, and drill down on his or her motives, while the transparency community holds its breath that he or she will turn out to be pure as the driven snow. But that’s all deflection from plumbing the much more difficult questions, which are: Should the CIA be allowed to conduct these activities, and should it be doing so in secret without any public oversight?

These are questions we would not even be asking without the Vault 7 source.

Vault 7: CIA Hacking Tools Revealed

Source: WikiLeaks

Press Release

Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named “Vault 7” by WikiLeaks, it is the largest ever publication of confidential documents on the agency.

The first full part of the series, “Year Zero”, comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA’s Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election.

Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

“Year Zero” introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.

Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA). The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force — its own substantial fleet of hackers. The agency’s hacking division freed it from having to disclose its often controversial operations to the NSA (its primary bureaucratic rival) in order to draw on the NSA’s hacking capacities.

By the end of 2016, the CIA’s hacking division, which formally falls under the agency’s Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other “weaponized” malware. Such is the scale of the CIA’s undertaking that by 2016, its hackers had utilized more code than that used to run Facebook. The CIA had created, in effect, its “own NSA” with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.

In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.

Julian Assange, WikiLeaks editor stated that “There is an extreme proliferation risk in the development of cyber ‘weapons’. Comparisons can be drawn between the uncontrolled proliferation of such ‘weapons’, which results from the inability to contain them combined with their high market value, and the global arms trade. But the significance of “Year Zero” goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective.”

Wikileaks has carefully reviewed the “Year Zero” disclosure and published substantive CIA documentation while avoiding the distribution of ‘armed’ cyberweapons until a consensus emerges on the technical and political nature of the CIA’s program and how such ‘weapons’ should analyzed, disarmed and published.

Wikileaks has also decided to redact and anonymise some identifying information in “Year Zero” for in depth analysis. These redactions include ten of thousands of CIA targets and attack machines throughout Latin America, Europe and the United States. While we are aware of the imperfect results of any approach chosen, we remain committed to our publishing model and note that the quantity of published pages in “Vault 7” part one (“Year Zero”) already eclipses the total number of pages published over the first three years of the Edward Snowden NSA leaks.

 

Analysis

CIA malware targets iPhone, Android, smart TVs

CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA’s DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details).

The EDG is responsible for the development, testing and operational support of all backdoors, exploits, malicious payloads, trojans, viruses and any other kind of malware used by the CIA in its covert operations world-wide.

The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell’s 1984, but “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.

The attack against Samsung smart TVs was developed in cooperation with the United Kingdom’s MI5/BTSS. After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.

As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.

The CIA’s Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones. Infected phones can be instructed to send the CIA the user’s geolocation, audio and text communications as well as covertly activate the phone’s camera and microphone.

Despite iPhone’s minority share (14.5%) of the global smart phone market in 2016, a specialized unit in the CIA’s Mobile Development Branch produces malware to infest, control and exfiltrate data from iPhones and other Apple products running iOS, such as iPads. CIA’s arsenal includes numerous local and remote “zero days” developed by CIA or obtained from GCHQ, NSA, FBI or purchased from cyber arms contractors such as Baitshop. The disproportionate focus on iOS may be explained by the popularity of the iPhone among social, political, diplomatic and business elites.

A similar unit targets Google’s Android which is used to run the majority of the world’s smart phones (~85%) including Samsung, HTC and Sony. 1.15 billion Android powered phones were sold last year. “Year Zero” shows that as of 2016 the CIA had 24 “weaponized” Android “zero days” which it has developed itself and obtained from GCHQ, NSA and cyber arms contractors.

These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the “smart” phones that they run on and collecting audio and message traffic before encryption is applied.

 

CIA malware targets Windows, OSx, Linux, routers

The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized “zero days”, air gap jumping viruses such as “Hammer Drill” which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( “Brutal Kangaroo”) and to keep its malware infestations going.

Many of these infection efforts are pulled together by the CIA’s Automated Implant Branch (AIB), which has developed several attack systems for automated infestation and control of CIA malware, such as “Assassin” and “Medusa”.

Attacks against Internet infrastructure and webservers are developed by the CIA’s Network Devices Branch (NDB).

The CIA has developed automated multi-platform malware attack and control systems covering Windows, Mac OS X, Solaris, Linux and more, such as EDB’s “HIVE” and the related “Cutthroat” and “Swindle” tools, which are described in the examples section below.

 

CIA ‘hoarded’ vulnerabilities (“zero days”)

In the wake of Edward Snowden’s leaks about the NSA, the U.S. technology industry secured a commitment from the Obama administration that the executive would disclose on an ongoing basis — rather than hoard — serious vulnerabilities, exploits, bugs or “zero days” to Apple, Google, Microsoft, and other US-based manufacturers.

Serious vulnerabilities not disclosed to the manufacturers places huge swathes of the population and critical infrastructure at risk to foreign intelligence or cyber criminals who independently discover or hear rumors of the vulnerability. If the CIA can discover such vulnerabilities so can others.

The U.S. government’s commitment to the Vulnerabilities Equities Process came after significant lobbying by US technology companies, who risk losing their share of the global market over real and perceived hidden vulnerabilities. The government stated that it would disclose all pervasive vulnerabilities discovered after 2010 on an ongoing basis.

“Year Zero” documents show that the CIA breached the Obama administration’s commitments. Many of the vulnerabilities used in the CIA’s cyber arsenal are pervasive and some may already have been found by rival intelligence agencies or cyber criminals.

As an example, specific CIA malware revealed in “Year Zero” is able to penetrate, infest and control both the Android phone and iPhone software that runs or has run presidential Twitter accounts. The CIA attacks this software by using undisclosed security vulnerabilities (“zero days”) possessed by the CIA but if the CIA can hack these phones then so can everyone else who has obtained or discovered the vulnerability. As long as the CIA keeps these vulnerabilities concealed from Apple and Google (who make the phones) they will not be fixed, and the phones will remain hackable.

The same vulnerabilities exist for the population at large, including the U.S. Cabinet, Congress, top CEOs, system administrators, security officers and engineers. By hiding these security flaws from manufacturers like Apple and Google the CIA ensures that it can hack everyone &mdsh; at the expense of leaving everyone hackable.

 

‘Cyberwar’ programs are a serious proliferation risk

Cyber ‘weapons’ are not possible to keep under effective control.

While nuclear proliferation has been restrained by the enormous costs and visible infrastructure involved in assembling enough fissile material to produce a critical nuclear mass, cyber ‘weapons’, once developed, are very hard to retain.

Cyber ‘weapons’ are in fact just computer programs which can be pirated like any other. Since they are entirely comprised of information they can be copied quickly with no marginal cost.

Securing such ‘weapons’ is particularly difficult since the same people who develop and use them have the skills to exfiltrate copies without leaving traces — sometimes by using the very same ‘weapons’ against the organizations that contain them. There are substantial price incentives for government hackers and consultants to obtain copies since there is a global “vulnerability market” that will pay hundreds of thousands to millions of dollars for copies of such ‘weapons’. Similarly, contractors and companies who obtain such ‘weapons’ sometimes use them for their own purposes, obtaining advantage over their competitors in selling ‘hacking’ services.

Over the last three years the United States intelligence sector, which consists of government agencies such as the CIA and NSA and their contractors, such as Booz Allan Hamilton, has been subject to unprecedented series of data exfiltrations by its own workers.

A number of intelligence community members not yet publicly named have been arrested or subject to federal criminal investigations in separate incidents.

Most visibly, on February 8, 2017 a U.S. federal grand jury indicted Harold T. Martin III with 20 counts of mishandling classified information. The Department of Justice alleged that it seized some 50,000 gigabytes of information from Harold T. Martin III that he had obtained from classified programs at NSA and CIA, including the source code for numerous hacking tools.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by peer states, cyber mafia and teenage hackers alike.

 

U.S. Consulate in Frankfurt is a covert CIA hacker base

In addition to its operations in Langley, Virginia the CIA also uses the U.S. consulate in Frankfurt as a covert base for its hackers covering Europe, the Middle East and Africa.

CIA hackers operating out of the Frankfurt consulate ( “Center for Cyber Intelligence Europe” or CCIE) are given diplomatic (“black”) passports and State Department cover. The instructions for incoming CIA hackers make Germany’s counter-intelligence efforts appear inconsequential: “Breeze through German Customs because you have your cover-for-action story down pat, and all they did was stamp your passport”

Your Cover Story (for this trip)
Q: Why are you here?
A: Supporting technical consultations at the Consulate.

Two earlier WikiLeaks publications give further detail on CIA approaches to customs and secondary screening procedures.

Once in Frankfurt CIA hackers can travel without further border checks to the 25 European countries that are part of the Shengen open border area — including France, Italy and Switzerland.

A number of the CIA’s electronic attack methods are designed for physical proximity. These attack methods are able to penetrate high security networks that are disconnected from the internet, such as police record database. In these cases, a CIA officer, agent or allied intelligence officer acting under instructions, physically infiltrates the targeted workplace. The attacker is provided with a USB containing malware developed for the CIA for this purpose, which is inserted into the targeted computer. The attacker then infects and exfiltrates data to removable media. For example, the CIA attack system Fine Dining, provides 24 decoy applications for CIA spies to use. To witnesses, the spy appears to be running a program showing videos (e.g VLC), presenting slides (Prezi), playing a computer game (Breakout2, 2048) or even running a fake virus scanner (Kaspersky, McAfee, Sophos). But while the decoy application is on the screen, the underlaying system is automatically infected and ransacked.

 

How the CIA dramatically increased proliferation risks

In what is surely one of the most astounding intelligence own goals in living memory, the CIA structured its classification regime such that for the most market valuable part of “Vault 7” — the CIA’s weaponized malware (implants + zero days), Listening Posts (LP), and Command and Control (C2) systems — the agency has little legal recourse.

The CIA made these systems unclassified.

Why the CIA chose to make its cyberarsenal unclassified reveals how concepts developed for military use do not easily crossover to the ‘battlefield’ of cyber ‘war’.

To attack its targets, the CIA usually requires that its implants communicate with their control programs over the internet. If CIA implants, Command & Control and Listening Post software were classified, then CIA officers could be prosecuted or dismissed for violating rules that prohibit placing classified information onto the Internet. Consequently the CIA has secretly made most of its cyber spying/war code unclassified. The U.S. government is not able to assert copyright either, due to restrictions in the U.S. Constitution. This means that cyber ‘arms’ manufactures and computer hackers can freely “pirate” these ‘weapons’ if they are obtained. The CIA has primarily had to rely on obfuscation to protect its malware secrets.

Conventional weapons such as missiles may be fired at the enemy (i.e into an unsecured area). Proximity to or impact with the target detonates the ordnance including its classified parts. Hence military personnel do not violate classification rules by firing ordnance with classified parts. Ordnance will likely explode. If it does not, that is not the operator’s intent.

Over the last decade U.S. hacking operations have been increasingly dressed up in military jargon to tap into Department of Defense funding streams. For instance, attempted “malware injections” (commercial jargon) or “implant drops” (NSA jargon) are being called “fires” as if a weapon was being fired. However the analogy is questionable.

Unlike bullets, bombs or missiles, most CIA malware is designed to live for days or even years after it has reached its ‘target’. CIA malware does not “explode on impact” but rather permanently infests its target. In order to infect target’s device, copies of the malware must be placed on the target’s devices, giving physical possession of the malware to the target. To exfiltrate data back to the CIA or to await further instructions the malware must communicate with CIA Command & Control (C2) systems placed on internet connected servers. But such servers are typically not approved to hold classified information, so CIA command and control systems are also made unclassified.

A successful ‘attack’ on a target’s computer system is more like a series of complex stock maneuvers in a hostile take-over bid or the careful planting of rumors in order to gain control over an organization’s leadership rather than the firing of a weapons system. If there is a military analogy to be made, the infestation of a target is perhaps akin to the execution of a whole series of military maneuvers against the target’s territory including observation, infiltration, occupation and exploitation.

 

Evading forensics and anti-virus

A series of standards lay out CIA malware infestation patterns which are likely to assist forensic crime scene investigators as well as Apple, Microsoft, Google, Samsung, Nokia, Blackberry, Siemens and anti-virus companies attribute and defend against attacks.

“Tradecraft DO’s and DON’Ts” contains CIA rules on how its malware should be written to avoid fingerprints implicating the “CIA, US government, or its witting partner companies” in “forensic review”. Similar secret standards cover the use of encryption to hide CIA hacker and malware communication (pdf), describing targets & exfiltrated data (pdf) as well as executing payloads (pdf) and persisting (pdf) in the target’s machines over time.

CIA hackers developed successful attacks against most well known anti-virus programs. These are documented in AV defeats, Personal Security Products, Detecting and defeating PSPs and PSP/Debugger/RE Avoidance. For example, Comodo was defeated by CIA malware placing itself in the Window’s “Recycle Bin”. While Comodo 6.x has a “Gaping Hole of DOOM”.

CIA hackers discussed what the NSA’s “Equation Group” hackers did wrong and how the CIA’s malware makers could avoid similar exposure.

Examples

The CIA’s Engineering Development Group (EDG) management system contains around 500 different projects (only some of which are documented by “Year Zero”) each with their own sub-projects, malware and hacker tools.

The majority of these projects relate to tools that are used for penetration, infestation (“implanting”), control, and exfiltration.

Another branch of development focuses on the development and operation of Listening Posts (LP) and Command and Control (C2) systems used to communicate with and control CIA implants; special projects are used to target specific hardware from routers to smart TVs.

Some example projects are described below, but see the table of contents for the full list of projects described by WikiLeaks’ “Year Zero”.

 

UMBRAGE

The CIA’s hand crafted hacking techniques pose a problem for the agency. Each technique it has created forms a “fingerprint” that can be used by forensic investigators to attribute multiple different attacks to the same entity.

This is analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible. As soon one murder in the set is solved then the other murders also find likely attribution.

The CIA’s Remote Devices Branch‘s UMBRAGE group collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.

With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from.

UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.

 

Fine Dining

Fine Dining comes with a standardized questionnaire i.e menu that CIA case officers fill out. The questionnaire is used by the agency’s OSB (Operational Support Branch) to transform the requests of case officers into technical requirements for hacking attacks (typically “exfiltrating” information from computer systems) for specific operations. The questionnaire allows the OSB to identify how to adapt existing tools for the operation, and communicate this to CIA malware configuration staff. The OSB functions as the interface between CIA operational staff and the relevant technical support staff.

Among the list of possible targets of the collection are ‘Asset’, ‘Liason Asset’, ‘System Administrator’, ‘Foreign Information Operations’, ‘Foreign Intelligence Agencies’ and ‘Foreign Government Entities’. Notably absent is any reference to extremists or transnational criminals. The ‘Case Officer’ is also asked to specify the environment of the target like the type of computer, operating system used, Internet connectivity and installed anti-virus utilities (PSPs) as well as a list of file types to be exfiltrated like Office documents, audio, video, images or custom file types. The ‘menu’ also asks for information if recurring access to the target is possible and how long unobserved access to the computer can be maintained. This information is used by the CIA’s ‘JQJIMPROVISE’ software (see below) to configure a set of CIA malware suited to the specific needs of an operation.

 

Improvise (JQJIMPROVISE)

‘Improvise’ is a toolset for configuration, post-processing, payload setup and execution vector selection for survey/exfiltration tools supporting all major operating systems like Windows (Bartender), MacOS (JukeBox) and Linux (DanceFloor). Its configuration utilities like Margarita allows the NOC (Network Operation Center) to customize tools based on requirements from ‘Fine Dining’ questionairies.

HIVE

HIVE is a multi-platform CIA malware suite and its associated control software. The project provides customizable implants for Windows, Solaris, MikroTik (used in internet routers) and Linux platforms and a Listening Post (LP)/Command and Control (C2) infrastructure to communicate with these implants.

The implants are configured to communicate via HTTPS with the webserver of a cover domain; each operation utilizing these implants has a separate cover domain and the infrastructure can handle any number of cover domains.

Each cover domain resolves to an IP address that is located at a commercial VPS (Virtual Private Server) provider. The public-facing server forwards all incoming traffic via a VPN to a ‘Blot’ server that handles actual connection requests from clients. It is setup for optional SSL client authentication: if a client sends a valid client certificate (only implants can do that), the connection is forwarded to the ‘Honeycomb’ toolserver that communicates with the implant; if a valid certificate is missing (which is the case if someone tries to open the cover domain website by accident), the traffic is forwarded to a cover server that delivers an unsuspicious looking website.

The Honeycomb toolserver receives exfiltrated information from the implant; an operator can also task the implant to execute jobs on the target computer, so the toolserver acts as a C2 (command and control) server for the implant.

Similar functionality (though limited to Windows) is provided by the RickBobby project.

See the classified user and developer guides for HIVE.

Frequently Asked Questions

Why now?

WikiLeaks published as soon as its verification and analysis were ready.

In Febuary the Trump administration has issued an Executive Order calling for a “Cyberwar” review to be prepared within 30 days.

While the review increases the timeliness and relevance of the publication it did not play a role in setting the publication date.

Redactions

Names, email addresses and external IP addresses have been redacted in the released pages (70,875 redactions in total) until further analysis is complete.

  1. Over-redaction: Some items may have been redacted that are not employees, contractors, targets or otherwise related to the agency, but are, for example, authors of documentation for otherwise public projects that are used by the agency.
  2. Identity vs. person: the redacted names are replaced by user IDs (numbers) to allow readers to assign multiple pages to a single author. Given the redaction process used a single person may be represented by more than one assigned identifier but no identifier refers to more than one real person.
  3. Archive attachments (zip, tar.gz, …) are replaced with a PDF listing all the file names in the archive. As the archive content is assessed it may be made available; until then the archive is redacted.
  4. Attachments with other binary content are replaced by a hex dump of the content to prevent accidental invocation of binaries that may have been infected with weaponized CIA malware. As the content is assessed it may be made available; until then the content is redacted.
  5. The tens of thousands of routable IP addresses references (including more than 22 thousand within the United States) that correspond to possible targets, CIA covert listening post servers, intermediary and test systems, are redacted for further exclusive investigation.
  6. Binary files of non-public origin are only available as dumps to prevent accidental invocation of CIA malware infected binaries.

Organizational Chart

The organizational chart corresponds to the material published by WikiLeaks so far.

Since the organizational structure of the CIA below the level of Directorates is not public, the placement of the EDG and its branches within the org chart of the agency is reconstructed from information contained in the documents released so far. It is intended to be used as a rough outline of the internal organization; please be aware that the reconstructed org chart is incomplete and that internal reorganizations occur frequently.

Wiki pages

“Year Zero” contains 7818 web pages with 943 attachments from the internal development groupware. The software used for this purpose is called Confluence, a proprietary software from Atlassian. Webpages in this system (like in Wikipedia) have a version history that can provide interesting insights on how a document evolved over time; the 7818 documents include these page histories for 1136 latest versions.

The order of named pages within each level is determined by date (oldest first). Page content is not present if it was originally dynamically created by the Confluence software (as indicated on the re-constructed page).

What time period is covered?

The years 2013 to 2016. The sort order of the pages within each level is determined by date (oldest first).

WikiLeaks has obtained the CIA’s creation/last modification date for each page but these do not yet appear for technical reasons. Usually the date can be discerned or approximated from the content and the page order. If it is critical to know the exact time/date contact WikiLeaks.

What is “Vault 7”

“Vault 7” is a substantial collection of material about CIA activities obtained by WikiLeaks.

When was each part of “Vault 7” obtained?

Part one was obtained recently and covers through 2016. Details on the other parts will be available at the time of publication.

Is each part of “Vault 7” from a different source?

Details on the other parts will be available at the time of publication.

What is the total size of “Vault 7”?

The series is the largest intelligence publication in history.

How did WikiLeaks obtain each part of “Vault 7”?

Sources trust WikiLeaks to not reveal information that might help identify them.

Isn’t WikiLeaks worried that the CIA will act against its staff to stop the series?

No. That would be certainly counter-productive.

Has WikiLeaks already ‘mined’ all the best stories?

No. WikiLeaks has intentionally not written up hundreds of impactful stories to encourage others to find them and so create expertise in the area for subsequent parts in the series. They’re there. Look. Those who demonstrate journalistic excellence may be considered for early access to future parts.

Won’t other journalists find all the best stories before me?

Unlikely. There are very considerably more stories than there are journalists or academics who are in a position to write them.

The Second Phase of the propaganda Fake News War: Economic Strangulation. What Comes Next?

index

Frustrated and outraged at how reality has turned out, the ruling class denizens of Hillary Clinton’s failed presidential tent are lashing out at truth-tellers. “Fake news” is whatever contradicts their lies, and Russia is their all-purpose boogeyman. “Google and Facebook have joined theri corporate media compatriots in an attempt to limit the public’s access to alternative news analysis and independent investigative reporting.”

By Dr. Marsha Adebayo

Source: Black Agenda Report

The public has determined that the corporate media is actually the purveyor of “fake news” and turned to media organizations, such as BAR, Truthout and other outlets for information.”

Within the last 14 days, two phases of the “fake news” strategy has been rolled out for public consumption.  Phase I of the fake news strategy was to demonize news organizations, such as Black Agenda Report (BAR) through McCarthy-era red-baiting and intimidation that included government officials pondering whether the FBI should investigate alternative media on “the list” or hinting that such organizations could be subject to legal prosecution under foreign espionage laws.  The corporate media’s thinly veiled intimidation tactics are intended to depress readership of “fake” news organizations and to link these media outlets with an alleged Russian strategy to elect Donald Trump president of the US.

Corporate media gatekeepers determine which stories are labeled fake news dependent upon which stories serve US foreign and domestic interests and which stories expose US corruption. The corporate media obsession with “fake news” would be laughable if not for the individuals committed to truth-telling who will be sacrificed in the process. Where was the corporate news obsession with fake news when Secretary of State (General) Colin Powell beat the war drums for America’s war adventures in Iraq based on fictitious intelligence that Iraq had weapons of mass destruction?

However, anyone familiar with duopoly propaganda strategy against progressive news organizations would expect an escalation in their intimidation tactics. A covert strategy that would move from a campaign of mere words to direct and consequential actions with corporate coalition members poised to play their part.  Phase 2 of this strategy would exact a higher cost to the intended progressive media targets and by extension to their supporters.

This week, it was revealed that the escalation to Phase 2 will be economic sanctions or economic strangulation. This will be the pressure point in an attempt to force progressive news organizations to heel.  Two of the largest internet companies have joined their counterparts in government to squeeze legitimate investigative reporting into compliance.

Google was the first media giant to announce that it would ban websites that “peddle fake news” from using its online advertising service. In other words, media organizations, such as BAR, Truthout, Truthdig, etc could no longer advertise on Google in order to reach a larger audience or raise funds.

Hours later, Facebook, the social network, updated its policy and announced that “it will not display ads in sites that contains content considered by the duopoly as “fake news” according to corporate news gatekeepers.

The Facebook statement asserted:

“We have updated the policy to explicitly clarify that this applies to fake news…Our team will continue to closely vet all prospective publishers and monitor existing ones to ensure compliance.”

What was “explicitly” clear was that Google and Facebook have joined their corporate media compatriots in an attempt to limit the public’s access to alternative news analysis and independent investigative reporting.

The bait and switch corporate media/government strategy recognizes that the public no longer trusts corporate media, such as the Washington Post and New York Times, to investigate government corruption. There is a growing public recognition that a conflict of interest exists between corporate media investigating government since these two groups are inextricably linked by class and economic interests.  The public has determined that the corporate media is actually the purveyor of “fake news” and turned to media organizations, such as BAR, Truthout and other outlets for information.

This is not the first time corporate power has joined with the political duopoly to undermine the media’s ability to engage in truth-telling.  Julian Assange accused right-wing US politicians of imposing a “death penalty’ on WikiLeaks after major US credit cards blocked its card holders from making contributions to the organization. Assange asserted that six US payment firms blocked WikiLeaks from receiving contributions at a cost of £30 million.

Visa and Mastercard started the financial stranglehold after WikiLleaks published some 250,000 secret State Department cables in December 2010.  WikiLeaks presented documents that proved these financial decisions were made at the instigation of “right-wing” members of Congress. This attack against WikiLeaks forced the staff to take a 40% pay cut.  However, the financial “war” was just the beginning. The unforeseen Phase III of this attack would eventually find Assange and Chelsea Manning incarcerated; Assange taking refuge in an Ecuadorian Embassy in London and Manning sentenced to serve time at Ft. Leavenworth in Kansas.

This is the time to support BAR, Truthout and other progressive media organizations under attack by forces that attempt to obfuscate and distort US domestic and foreign policy. Frederick Douglass during his 1857 address on “West India Emancipation” at Canandaigua, New York, on the 23rd anniversary of the event said:

“The general sentiment of mankind is that a man who will not fight for himself, when he has the means of doing so, is not worth being fought for by others, and this sentiment is just. For a man who does not value freedom for himself will never value it for others, or put himself to any inconvenience to gain it for others.”

Phases I and II forebode a challenging Phase III for truth-tellers in the current iteration of a corporate “fake news” strategy.  This is our time to fight for press freedom and the right to blow the whistle on government corruption. The future of our families and our planet depend on our uncompromising passion for justice.

Dr. Marsha Adebayo is the author of the Pulitzer Prize nominated: No FEAR: A Whistleblowers Triumph over Corruption and Retaliation at the EPA. She worked at the EPA for 18 years and blew the whistle on a US multinational corporation that endangered South African vanadium mine workers. Marsha’s successful lawsuit led to the introduction and passage of the first civil rights and whistleblower law of the 21st century: the Notification of Federal Employees Anti-discrimination and Retaliation Act of 2002 (No FEAR Act). She is Director of Transparency and Accountability for the Green Shadow Cabinet and serves on the Advisory Board of ExposeFacts.com.

 

Related Video:

Freedom Rider: Dump the Democrats for Good

gettyimages-621673240

By Margaret Kimberly

Source: Black Agenda Report

“The Democrats were so entrenched in their corruption and self-dealing that they didn’t see the Bernie Sanders campaign for modest reform as the savior it might have been.”

This columnist did not see a Donald Trump victory coming. The degree of disgust directed at an awful candidate was more than I had predicted. Neither the corporate media, nor Wall Street nor the pundits nor the pollsters saw this coming either. Their defeat and proof of their uselessness is total. Those of us who rejected the elite consensus and didn’t support Hillary Clinton should be proud.

Black people are now in fear and in shock when we ought to be spoiling for a fight. All is not lost. Even the victory of the openly bigoted Trump poses an opportunity to right our political ship. Not the electoral ship, the political one. For decades black Americans have been voting for people who have done them wrong. Bill Clinton got rid of public assistance as a right, and undid regulations that kept Wall Street in check. He put black people in jail and yet black people didn’t turn on him until he and his wife tried to defeat Obama. But Obama gave us more of the same. Bailouts of Wall Street, interventions and death for people all over the world, and a beat down of black people who still loved him. Despite the fear of Republican victory we end up losing whenever a Democratic presidential candidate wins.

“Obama bailed out banks, insurance companies, Big Pharma and even Ukraine.”

Victory is ours if we dump the Democrat Party and their black misleaders. The Democrats were so entrenched in their corruption and self-dealing that they didn’t see the Bernie Sanders campaign for modest reform as the savior it might have been. Instead they marched in lock step with a woman who was heartily disliked. Sanders went along as the sheep dog who led his flock straight over the cliff. The Democrats inadvertently galvanized people who had stopped participating in the system and who want change from top to bottom.

One of our biggest problems lies not in facts but in perceptions. What did Democrats do for black people? The Democrats ship living wage jobs off shore in corrupt trade deals like NAFTA and TTP. They don’t prosecute killer cops or raise the minimum wage. Trump will be hard pressed to deport more people than Obama did. The list of treachery is very long.

When Donald Trump asked black people, “What have you got to lose?” his words were met with derision. But in reality he posed a good question. What do we have to show for years of Democratic votes? Obama bailed out banks, insurance companies, Big Pharma and even Ukraine. But he didn’t rebuild Detroit or New Orleans. The water in Flint, Michigan is still poisoned and the prisons are still full.

“There may be opportunity in this crisis if we dare to seize it.”

The outpouring of love for Barack Obama was purely symbolic. In state after state, black people who gave him victory in 2008 and 2012 stayed home. They loved seeing him and his wife dressed up at state dinners but they were never fully engaged in politics because that is not what Democrats want. The love was phony and void of any political intent. Donald Trump will be president because of that veneer of political activism.

As for white people who voted for Trump, of course many of them are racists. However they are not without valid complaints. They don’t want neoliberalism but black people don’t either. They don’t want wars around the world and neither do black people. We corrupt our own heritage of radicalism in favor of shallow symbolism. While we slept walk in foolish nostalgia for Obama and cried at the thought of him leaving office, white people kept their hatred of Hillary to themselves or lied to pollsters. They want America to be great again, great for them. White nostalgic yearnings are dangerous for black people, and we must be vigilant. But there may be opportunity in this crisis if we dare to seize it.

Republicans have been the white people’s party for nearly 50 years. Trump just made it more obvious. He didn’t tell us anything we didn’t already know. We don’t have to be the losers in this election. Let us remember what we have achieved in our history. Half of black Americans didn’t even have the right to vote in the 1960s yet made earth shattering progress in a short time. But we must understand the source of that progress. It came from struggle and daring to create the crises that always bring about change.

“The dread of redneck celebration should not be our primary motivation right now.”

Yes white people will strut for president Trump but that doesn’t mean we must submit as if we are in the Jim Crow days of old. We have ourselves to rely on and we can reclaim our history of fighting for self-determination. The dread of redneck celebration should not be our primary motivation right now. Before we quake in fear at white America we must send the scoundrels packing.

The black politicians and the Democratic National Committee and the civil rights organizations that don’t help the masses must all be kicked to the proverbial curb. The rejection must be complete and blame must be laid squarely at their feet.

Those of us who voted for the green party ticket of Jill Stein and Ajamu Baraka must stand firmly and proudly for our choice. We must strategize on building a progressive party to replace the Democrats who never help us. We must applaud Julian Assange and Wikileaks for exposing their corruption. There should be no back tracking on the fight to build left wing political power.

“We must strategize on building a progressive party to replace the Democrats who never help us.”

The black people who didn’t return to the polls shouldn’t be blamed either. Those individuals must have personal introspection that is meaningful and political. Their lack of enthusiasm speaks to Democratic Party and black misleadership incompetence. We should refrain from personal blame and help one another in this process as we fight for justice and peace.

The end of the duopoly is the first step in liberation. Staying with a party that literally did nothing was a slow and agonizing death. Sometimes shock therapy is needed to improve one’s condition. If we don’t take the necessary steps to free ourselves this election outcome will be a disaster. Instead, why not bring the disaster to the people who made it happen? The destruction of the Democratic Party and creation of a truly progressive political movement is the only hope for black America.

Washington moves to silence WikiLeaks

germanywikileaks-12d90

By Bill Van Auken

Source: WSWS.org

The cutting off of Internet access for Julian Assange, the founder of WikiLeaks, is one more ugly episode in a US presidential election campaign that has plumbed the depths of political degradation.

Effectively imprisoned in the Ecuadorian embassy in London for over four years, Assange now is faced with a further limitation on his contact with the outside world.

On Tuesday, the Foreign Ministry of Ecuador confirmed WikiLeaks’ charge that Ecuador itself had ordered the severing of Assange’s Internet connection under pressure from the US government. In a statement, the ministry said that WikiLeaks had “published a wealth of documents impacting on the US election campaign,” adding that the government of Ecuador “respects the principle of non-intervention in the internal affairs of other states” and “does not interfere in external electoral processes.” On that grounds, the statement claimed, the Ecuadorian government decided to “restrict access” to the communications network at its London embassy.

This statement from the bourgeois government of Ecuadorian President Rafael Correa is a study in hypocrisy and cowardice. By abetting the US government’s suppression of WikiLeaks, Quito has intervened in the US elections on the side of the ruling establishment and against the rights of the American people. If Correa expects that his professed sensitivity toward the “principle of non-intervention” will be reciprocated, he should recall the fate of Honduran President Manuel Zelaya, who was toppled in a coup orchestrated by then-Secretary of State Hillary Clinton in 2009.

WikiLeaks cited reports that Secretary of State John Kerry had demanded that the government of Ecuador carry out the action “on the sidelines of the negotiations” surrounding the abortive Colombian peace accord last month in Bogota. The US government intervened to prevent any further exposures that could damage the campaign of Clinton, who has emerged as the clear favorite of the US military and intelligence complex as well as the Wall Street banks.

Whether the State Department was the only entity placing pressure on Ecuador on behalf of the Clinton campaign, or whether Wall Street also intervened directly, is unclear. The timing of the Internet cutoff, in the immediate aftermath of the release of Clinton’s Goldman Sachs speeches, may be more than coincidental.

In the spring of 2014, the government of Ecuador agreed to transfer more than half of its gold reserves to Goldman Sachs Group Inc. for three years, in an attempt to raise cash to cover a growing deficit brought on by the collapse in oil prices. It reportedly sent 466,000 ounces of gold to Goldman Sachs, worth about $580 million at the time, in return for “high security” financial instruments and an anticipated profit on its investment. It is hardly a stretch of the imagination to believe that such a relationship would give Goldman Sachs considerable leverage in relation to the Ecuadorian government.

In any case, it is evident that the US ruling establishment is growing increasingly desperate to stanch the flow of previously secret emails and documents that are exposing the real character not only of Clinton, but of capitalist politics as a whole. While WikiLeaks has released over 17,000 emails from the account of Clinton campaign manager and top establishment Democrat John Podesta, it is believed that there are more than 33,000 still to come.

The transcripts of Clinton’s speeches to Goldman Sachs and other top banks and employers’ groups, for which she was paid on average $200,000 per appearance, are the most incriminating. They expose the workings of the oligarchy that rules America and the thinking and actions of a politician prepared to do anything to advance the interests of this ruling stratum, while simultaneously accruing ever greater riches and power for herself.

While on the campaign trail, Clinton has postured as a “progressive,” determined to hold Wall Street’s feet to the fire. But in her speeches to Goldman Sachs, she made clear her unconditional defense of the banks and financial houses. Under conditions of popular outrage against the bankers and their role in dragging millions into crisis in the financial meltdown of 2008, Clinton gave speeches praising the Wall Street financiers and insisting that they were best equipped to regulate themselves. She apologized to them for supporting the toothless Dodd-Frank financial regulatory law, saying that it had to be enacted for “political reasons.”

In front of her Wall Street audiences, Clinton made clear she had no inhibitions about ordering mass slaughter abroad. While telling her public audiences that she supports a “no-fly zone” in Syria as a humanitarian measure to save lives, she confidentially acknowledged to her Goldman Sachs audience that such an action is “going to kill a lot of Syrians” and become “an American and NATO involvement where you take a lot of civilians.” In the same speech she declared her willingness to bomb Iran.

The emails have laid bare the nexus of corrupt connections between the State Department, the Clinton Foundation, her various campaigns and her network of financial and corporate donors, which together constitute a quasi-criminal influence-peddling enterprise that could best be described as “Clinton, Inc.”

The revelations contained in the WikiLeaks material have been ignored or downplayed by the corporate media, which instead has focused unrelentingly on the charges of sexual misconduct leveled against Clinton’s Republican rival, Donald Trump.

The Clinton camp itself has sought to deflect any questions regarding what the candidate said in her speeches or the corrupt operations of her campaign by claiming, with no evidence whatsoever, that the material released by WikiLeaks had been hacked by the Russian government and therefore cannot be trusted.

This line of argumentation serves not only to divert attention from the WikiLeaks material, but also to further the Clinton campaign’s neo-McCarthyite claims of Kremlin intervention on behalf of Trump and advance a propaganda campaign aimed at preparing popular opinion for a direct military confrontation with Russia.

There is an air of desperation in the attempt to quash the WikiLeaks material. CNN news anchor Chris Cuomo, an open supporter of Clinton, went so far as to lie to his audience, claiming it was illegal for them to access the emails and insisting they could obtain any information on them only through the filter of the corporate media.

Well before the release of documents related to the Democratic Party, the determination of ruling circles to suppress WikiLeaks had found repeated and violent expression. State Department officials have come forward with a report that in 2010, in the midst of WikiLeaks’ mass release of State Department cables exposing US imperialist operations around the world, Clinton, then secretary of state, asked subordinates, “Can’t we just drone this guy?” She recently said she could not remember the remark, but if she made it, it was a joke.

During the same period, however, Clinton supporter and longtime Democratic campaign operative Bob Beckel declared in a television interview in relation to Assange: “A dead man can’t leak stuff. This guy’s a traitor, he’s treasonous, and he has broken every law of the United States… there’s only one way to do it: illegally shoot the son of a bitch.”

To this point, the American ruling class has limited itself to judicial frame-ups and character assassination, counting on the help of its servants within both the media and the pseudo-left, large sections of which have either joined the witch-hunt against Assange or downplayed his victimization.

The principal vehicle for this campaign of persecution had been fabricated allegations of sexual misconduct pursued by Swedish authorities acting in league with the US and British governments. Earlier this year, the UN’s Working Group on Arbitrary Detention issued findings that Assange had been “deprived of his liberty in an arbitrary manner,” meaning the body had reached the conclusion that the Swedish case constituted a politically motivated frame-up.

In the midst of the current attempt to silence Assange, an even more bizarre and filthy frame-up has been concocted, attempting to smear the WikiLeaks founder with charges of taking Russian money as well as pedophilia.

At the center of these allegations is a little known online dating service, Toddandclare.com, which first attempted to lure Assange into a supposed deal to film an ad for the site, for which he supposedly would be paid $1 million, to be provided by the Russian government. When WikiLeaks rejected this preposterous provocation, the same site claimed that Assange had been charged with inappropriate contact through the site with an eight-year-old Canadian child visiting the Bahamas. This accusation was then invoked in an attempt to pressure the UN to drop its demand for an end to the persecution of Assange.

Even a cursory investigation makes clear that these allegations constitute a grotesque fabrication. Bahamian police have stated that there are no charges or any case whatsoever against Assange. The dating service has no business address, working phone number or corporate presence anywhere in the US, having all the earmarks of a dummy company created by US intelligence for the purpose of hounding Assange.

The use of such tactics is a measure of how terrified the US ruling class has become in the face of growing mass hostility to both major political parties and their two abhorrent candidates. Their fear is that the relentless exposure of the inner workings of a government of the rich, by the rich and for the rich is robbing the existing political setup of what little legitimacy it had left within the population, and creating the conditions for a political radicalization within the working class and social upheavals, whoever is elected on November 8.

 

Related Article:

Real Reason Trump’s Being Treated Like He’s Crazy for Refusing to Accept Election Results by Rob Kall

The Cyber-War on Wikileaks

By

Source: CounterPunch

When the ruling class is in panic, their first reaction is to hide the panic.

They react out of cynicism: when their masks are revealed, instead of running around naked, they usually point the finger at the mask they wear. These days the whole world could witness a postmodern version of the infamous quote “Let them eat cake”, attributed to Marie-Antoinette, queen of France during the French Revolution.

As a reaction to WikiLeaks publishing his emails, John Podesta, the man behind Hillary Clinton’s campaign, posted a photo of a dinner preparation, saying “I bet the lobster risotto is better than the food at the Ecuadorian Embassy”.

A similar version of vulgar cynicism emerged earlier this month when Hillary Clinton reacted to the claim that she reportedly wanted to “drone” WikiLeaks founder Julian Assange (“Can’t we just drone this guy?”) when she was the US Secretary of State. Instead of denying her comments, Clinton said that she doesn’t recall any such joke, “It would have been a joke if it had been said, but I don’t recall that”.

One doesn’t have to read between the lines to understand that if Hillary Clinton had said that, she would have considered it a joke. But when emperors joke, it usually has dire consequences for those who are the objects of their “humor.”

Cyber-war Not with Russia…but WikiLeaks

During the last few months I have visited Julian Assange in the Ecuadorian Embassy in London several times and each time I came out of the Embassy, where he is spending his fifth year in political asylum under legitimate fear he might be extradited to the US, my thought was the following one: although he lives, without his family, in a postmodern version of solitary confinement (even prisoners are allowed to walk for up to one hour a day), although he has no access to fresh air or sunlight for more than 2000 days, although the UK government recently denied him safe passage to a hospital for an MRI scan, if his access to the internet would be cut off this would be the most severe attack on his physical and mental freedom.

The last time I saw him, which was only two weeks ago, he expressed the fear that, because he had already published leaks concerning US elections and with more to come, the US might find various ways to silence him, including pressuring Ecuador or even shutting down the internet.

What seemed a distant possibility only two weeks ago, soon became a self-fulfilling prophecy.

When the Obama administration recently announced that it is, as Biden said, planing an “unprecedented cyber covert action against Russia”, the first victim was not Putin, but precisely Julian Assange whose internet was cut off just a day after Biden’s self-contradictory proclamation.

No wonder Edward Snowden reacted immediately by saying that “nobody told Joe Biden what ‘covert operation’ means.

According to the U.S. Department of Defense’s Dictionary of Military and Associated Terms, a covert operation is “an operation that is so planned and executed as to conceal the identity of or permit plausible denial by the sponsor.”

It is no secret anymore that the Ecuadorian government has come under extreme pressure since Assange leaked the Democratic National Committee email database. We don’t know yet whether the US pressured Ecuador to shut down the internet, but it is clear that the present US government and the government to come is fighting a war with WikiLeaks which is all but “covert”. Is it really a coincidence that Julian Assange’s internet access was cut off shortly after publication of Clinton’s Goldman Sachs speeches?

If at the beginning we still had a “soft” version of postmodern McCarthyism, with Hillary calling everyone opposed to her campaign a Russian spy (not only Assange, but also Donald Trump and Jill Stein), then with Obama’s recent intervention it became more serious.

With Obama’s threat of a cyber-war, the “soft” McCarthyism didn’t only acquire geopolitical significance, but at the same time a new mask was revealed: Obama is obviously trying to cement the public debate and make the Russian threat “real”, or at least to use it as a weapon in order to help Clinton to get elected. Moreover, this new twist in something that has already become much more than only US elections (US elections are never only US elections!), shows not only how Obama is ready to strengthen Hillary’s campaign, but it also reveals that a cyber war is already in the making.

It is not a cyber war with Russia, but with WikiLeaks.

And it is not the first time.

What would Clausewitz say?

In 2010, when the Collateral Murder video was published, the Afghan and Iraq war logs were released, and we witnessed one of the most sinister attacks on freedom of speech in recent history. VISA, Mastercard, Diners, American Express and Paypal imposed a banking blockade on WikiLeaks, although WikiLeaks had not been charged with any crime at either state, federal or international level. So if the US government successfully convinced payment companies representing more than 97% of the global market to shut down an independent publisher, why wouldn’t they pressure Ecuador or any other state or company to cut off the internet?

The US is not only rhetorically trying to “get” Assange (it is worth to check out the Assassinate Assange video for evidence of the verbal masturbation of US officials), he poses a serious threat to the major elite factions in the US to remain in power. No wonder panic is rising in the US, which is now going even so far that a 16-year-old boy in Britain has been arrested on criminal charges related to the alleged hacking of email accounts used by CIA director John Brennan, which WikiLeaks published in October 2016.

What WikiLeaks obviously successfully challenged–and maybe one day (“history is written by the victors”, remember?) it will be learned in military strategy– is what the Prussian general and military theorist Carl von Clausewitz would call the “centre of gravity” (Schwerpunkt), which is the “central feature of the enemy’s power”.

Instead of speaking about the Russians, we should start speaking about the Schwerpunkt of the actual leaks, their real essence. Just take the following quotes by Hillary Clinton exposed by WikiLeaks, which reveal her true nature and the politics behind her campaign: “We are going to ring China with missile defence”, “I want to defend fracking” and climate change environmentalists “should get a life”, “you need both a public and a private position”, “my dream is a hemispheric common market, with open trade and open borders”.

What WikiLeaks has shown is not only that Hillary is a hawkish war-monger, first it was Libya (over 1,700 of the 33,000 Clinton emails published by WikiLeaks reference Libya), then it was Syria (at a Goldman Sachs conference she explicitly stated she would like to intervene in Syria), tomorrow it will be another war.

It is now clear – and this is the real “centre of gravity” where we should focus our attention – that the future Clinton cabinet may already been filled with Wall Street people like Obama’s was. No wonder WikiLeaks revelations create utter panic not only in the Democratic Party itself but also the Obama administration.

One question remains, isn’t WikiLeaks, by leaking all these dirty secrets, influencing the US elections? Yes, it certainly is, but the current criticism misses its point: isn’t the very point of organisations such as WikiLeaks to publish the material they have and to influence public opinion?

The question should finally be turned around: isn’t the US mainstream media the one influencing the US elections? And isn’t Obama, by announcing a cyber-war with Russia, influencing the elections?

WikiLeaks is not only influencing the US elections, but transforming the US elections – as they should have been from the very beginning – into a global debate with serious geopolitical consequences at stake. What WikiLeaks is doing is revealing this brutal fight for power, but, as the old saying goes, “when a wise man points at the Moon, the idiot looks at the finger”. Instead of looking at the finger pointing to Russia, we should take a look at the leaks themselves.

If democracy and transparency means anything today, we should say: let them leak!

 

Srećko Horvat is a philosopher and activist. He is co-author, with Slavoj Žižek, of What Does Europe Want? (Columbia University Press, 2014) and author of The Radicality of Love (Polity Press, 2015). Together with Yanis Varoufakis he co-created the movement DiEM 25. https://diem25.org/

A Redditor Just Proved Clinton Proxies Tried to Frame Julian Assange

sweden_assange222

(Editor’s note: While the case presented by the research isn’t hard evidence, it it highly suspicious and deserving of further investigation. But don’t expect any investigation from corporate media, many members of which have been outed by Wikileaks as shills for Hillary Clinton.)

By Gary Barnes

Source: TruthKings.com

Redditor account Bopbopi posted an image this morning which follows the deceitful tale of the website, ToddandClare.com.

What you should know about the website:

This website is a supposed dating site whereas Julian Assange was allegedly offered $1 million to help create a video. It is supposedly owned by an Indiana couple, but has ties to the Bahamas. The UN opened a case on Assange and it is suspected this specific case is the fuel behind getting him extradited, possibly to the United States. But when you have a look at the site (which I encourage you to do), you will notice it is an extremely amateur website (search dating sites on Google and compare). How did an unknown dating site suddenly come up with $1 million dollars and why did they happen to choose Julian Assange as their desired contract worker?

Assange is now being accused of having cybersex with an 8-year old on the website. To be honest, most of the profiles appear to be fake (again, compare with other dating sites and draw your own conclusions).

Now check out the timeline posted on the previously cited Reddit account:

frameUpdate:

As of 10/21/16, ToddAndClare.com has posted the following message on their landing page:

Company Statement 10/21/2016

Following a serious hack of our website, to protect our members we’ve taken the decision to close the network until further notice. If you are a member of Todd and Clare requiring support, please contact us.

Further updates will be published on our blog.

We thank all our members, business partners, and associates for your support.

The Todd and Clare team