US Seeks to Monopolize Cyberwarfare

By Ulson Gunnar

Source: New Eastern Outlook

The use of information to enhance martial power goes back to the beginning of human civilization itself, where propaganda and psychological warfare went hand-in-hand with slings, arrows, swords and shields.

The most recent iteration of this takes the form of social media and cyberwarfare where tools are being developed and deployed to influence populations at home and abroad, to manipulate political processes of foreign states and even tap into and exploit global economic forces.

In the beginning of the 21st century, the United States held an uncontested monopoly over the tools of cyberwarfare. Today, this is changing quickly, presenting an increasingly balanced cyberscape where nations are able to defend themselves on near parity with America’s ability to attack them.

To reassert America’s control over information and the technology used to broker it, Jared Cohen, current Google employee and former US State Department staff, has proposed a US-created and dominated “international” framework regarding cyberconflict.

His op-ed in the New York Times titled, “How to Prevent a Cyberwar,” begins by admitting the very pretext the US is using to expand its control over cyberwarfare is baseless, noting that “specifics of Russia’s interference in the 2016 America election remain unclear.”

Regardless, Cohen continues by laying out a plan for reasserting American control over cyberwarfare anyway, by claiming:

Cyberweapons won’t go away and their spread can’t be controlled. Instead, as we’ve done for other destructive technologies, the world needs to establish a set of principles to determine the proper conduct of governments regarding cyberconflict. They would dictate how to properly attribute cyberattacks, so that we know with confidence who is responsible, and they would guide how countries should respond.

Cohen, unsurprisingly, nominates the US to lead and direct these efforts:

The United States is uniquely positioned to lead this effort and point the world toward a goal of an enforceable cyberwarfare treaty. Many of the institutions that would be instrumental in informing these principles are based in the United States, including research universities and the technology industry. Part of this effort would involve leading by example, and the United States can and should establish itself as a defender of a free and open internet everywhere.

Cohen never explains how this US-dominated framework will differ from existing “international” frameworks regarding conventional warfare the US regularly abuses to justify a growing collection of devastating conflicts it is waging worldwide.

And as has been repeatedly documented, the United States’ definition of a “free and open internet everywhere” is an Internet dominated by US tech companies seeking to enhance and expand US interests globally.

Cohen ironically notes that:

Cyberweapons have already been used by governments to interfere with elections, steal billions of dollars, harm critical infrastructure, censor the press, manipulate public conversations about crucial issues and harass dissidents and journalists. The intensity of cyberconflict around the world is increasing, and the tools are becoming cheaper and more readily available.

Indeed, cyberweapons have already been used, primarily by the United States.

Jared Cohen himself was directly involved in joint operations between Google, Facebook, the US State Department and a number of other US tech and media enterprises which before and during 2011 set the stage for the so-called “Arab Spring.”

It included the training, funding and equipping of activists years ahead of the the uprisings as well as active participation in the uprisings themselves, including providing assistance to both protesters and militants everywhere from Libya to Syria in overthrowing governments targeted by Washington for regime change.

One such tool used in these efforts was described in a UK Independent article titled, “Google planned to help Syrian rebels bring down Assad regime, leaked Hillary Clinton emails claim,” which would report that:

An interactive tool created by Google was designed to encourage Syrian rebels and help bring down the Assad regime, Hillary Clinton’s leaked emails have reportedly revealed.

By tracking and mapping defections within the Syrian leadership, it was reportedly designed to encourage more people to defect and ‘give confidence’ to the rebel opposition.

The article would continue, mentioning Jared Cohen by name:

The email detailing Google’s defection tracker purportedly came from Jared Cohen, a Clinton advisor until 2010 and now-President of Jigsaw, formerly known as Google Ideas, the company’s New York-based policy think tank.

In a July 2012 email to members of Clinton’s team, which the WikiLeaks release alleges was later forwarded to the Secretary of State herself, Cohen reportedly said: “My team is planning to launch a tool on Sunday that will publicly track and map the defections in Syria and which parts of the government they are coming from.”

Would Cohen’s more recently proposed “framework” have prevented the United States’ use of these cyberweapons against sovereign states to undermine sociopolitical stability, overturn entire governments and plunge them into enduring chaos many still remain in 6 years later? Most likely not.

What Cohen and the interests he represents are truly concerned with is that nations are now not only able to recognize, prepare for and defend against US cyberwarfare, they may be capable of retaliating against the US.

Cohen’s proposal for an international framework to govern cyberwarfare simply seeks to define it in terms that leaves the US with both an uncontested monopoly over cyberwarfare as well as the means to wield it globally with absolute impunity.

It would be not unlike current “international” frameworks used to govern conflicts between nations which the US has used to justify an expansive, global campaign of extraterritorial war stretching from North Africa to Central Asia and beyond.

Such frameworks have become enablers of injustice, not a deterrence to it.

As nations from Iran to North Korea are discovering, the only true means of defending oneself from foreign military aggression is creating a plausible deterrence to dissuade foreign nations from attacking. This is done by creating a price for attacking and invading that is higher than the perceived benefits of doing so.

Nations like Russia and China have already achieved this balance with the United States in terms of conventional and nuclear warfare, and have now nearly established a similar deterrence in terms of cyber and information warfare. For the rest of the world, developing cyberdefense is not as costly as conventional military or nuclear arsenals, making cyberwarfare a corner of the battlefield unlikely to be monopolized by the US as it had done at the turn of the century.

Ensuring that no single nation ever has the opportunity to abuse such a monopoly again means exposing and confronting efforts by those like Google’s Jared Cohen and his proposal for an “international framework” for cyberwarfare that resembles the same sort of enabling the United Nations provides the US in terms of proliferating conventional conflicts across the globe.

Seth Rich, Craig Murray and the Sinister Stewards of the National Security State

By Mike Whitney

Source: Information Clearing House

Why is it a “conspiracy theory” to think that a disgruntled Democratic National Committee staffer gave WikiLeaks the DNC emails, but not a conspiracy theory to think the emails were provided by Russia?

Why?

Which is the more likely scenario: That a frustrated employee leaked damaging emails to embarrass his bosses or a that foreign government hacked DNC computers for some still-unknown reason?

That’s a no-brainer, isn’t it?

Former-DNC employee, Seth Rich, not only had access to the emails, but also a motive. He was pissed about the way the Clinton crowd was “sandbagging” Bernie Sanders. In contrast, there’s neither evidence nor motive connecting Russia to the emails. On top of that,  WikiLeaks founder, Julien Assange (a man of impeccable integrity) has repeatedly denied that Russia gave him the emails which suggests the government investigation is completely misdirected. The logical course of action, would be to pursue the leads that are most likely to bear fruit, not those that originate from one’s own political bias. But, of course, logic has nothing to do with the current investigation, it’s all about politics and geopolitics.

We don’t know who killed Seth Rich and we’re not going to speculate on the matter here.  But we find it very strange that neither the media nor the FBI have pursued leads in the case that challenge the prevailing narrative on the Russia hacking issue. Why is that? Why is the media so eager to blame Russia when Rich looks like the much more probable suspect?

And why have the mainstream news organizations put so much energy into discrediting the latest Fox News report, when– for the last 10 months– they’ve showed absolutely zero interest in Rich’s death at all?

According to Fox News:

“The Democratic National Committee staffer who was gunned down on July 10 on a Washington, D.C., street just steps from his home had leaked thousands of internal emails to WikiLeaks, law enforcement sources told Fox News.

A federal investigator who reviewed an FBI forensic report detailing the contents of DNC staffer Seth Rich’s computer generated within 96 hours after his murder, said Rich made contact with WikiLeaks through Gavin MacFadyen, a now-deceased American investigative reporter, documentary filmmaker, and director of WikiLeaks who was living in London at the time….

Rod Wheeler, a retired Washington homicide detective and Fox News contributor investigating the case on behalf of the Rich family, made the WikiLeaks claim, which was corroborated by a federal investigator who spoke to Fox News….

“I have seen and read the emails between Seth Rich and Wikileaks,” the federal investigator told Fox News, confirming the MacFadyen connection. He said the emails are in possession of the FBI, while the stalled case is in the hands of the Washington Police Department.” (“Family of slain DNC staffer Seth Rich blasts detective over report of WikiLeaks link”, Fox News)

Okay, so where’s the computer? Who’s got Rich’s computer? Let’s do the forensic work and get on with it.

But the Washington Post and the other bogus news organizations aren’t interested in such matters because it doesn’t fit with their political agenda. They’d rather take pot-shots at Fox for running an article that doesn’t square with their goofy Russia hacking story. This is a statement on the abysmal condition of journalism today. Headline news has become the province of perception mandarins who use the venue to shape information to their own malign specifications, and any facts that conflict with their dubious storyline, are savagely attacked and discredited. Journalists are no longer investigators that keep the public informed, but paid assassins who liquidate views that veer from the party-line.

WikiLeaks never divulges the names of the people who provide them with information. Even so, Assange has not only shown an active interest in the Seth Rich case, but also offered a $20,000 reward for anyone providing information leading to the arrest and conviction of Rich’s murder. Why? And why did he post a link to the Fox News article on his Twitter account on Tuesday?

I don’t know, but if I worked for the FBI or the Washington Post, I’d sure as hell be beating the bushes to find out. And not just because it might help in Rich’s murder investigation, but also, because it could shed light on the Russia fiasco which is being used to lay the groundwork for impeachment proceedings. So any information that challenges the government version of events, could actually change the course of history.

Have you ever heard of Craig Murray?

Murray should be the government’s star witness in the DNC hacking scandal, instead, no one even knows who he is. But if we trust what Murray has to say, then we can see that the Russia hacking story is baloney. The emails were “leaked” by insiders not “hacked” by a foreign government. Here’s the scoop from Robert Parry at Consortium News:

“Former British Ambassador to Uzbekistan Craig Murray, has suggested that the DNC leak came from a “disgruntled” Democrat upset with the DNC’s sandbagging of the Sanders campaign and that the Podesta leak came from the U.S. intelligence community….He (Murray) appears to have undertaken a mission for WikiLeaks to contact one of the sources (or a representative) during a Sept. 25 visit to Washington where he says he met with a person in a wooded area of American University. ….

Though Murray has declined to say exactly what the meeting in the woods was about, he may have been passing along messages about ways to protect the source from possible retaliation, maybe even an extraction plan if the source was in some legal or physical danger…Murray also suggested that the DNC leak and the Podesta leak came from two different sources, neither of them the Russian government.

“The Podesta emails and the DNC emails are, of course, two separate things and we shouldn’t conclude that they both have the same source,” Murray said. “In both cases we’re talking of a leak, not a hack, in that the person who was responsible for getting that information out had legal access to that information…

Scott Horton then asked, “Is it fair to say that you’re saying that the Podesta leak came from inside the intelligence services, NSA [the electronic spying National Security Agency] or another agency?”

“I think what I said was certainly compatible with that kind of interpretation, yeah,” Murray responded. “In both cases they are leaks by Americans.”

(“A Spy Coup in America?”, Robert Parry, Consortium News)

With all the hullabaloo surrounding the Russia hacking case, you’d think that Murray’s eyewitness account would be headline news, but not in Homeland Amerika where the truth is kept as far from the front page as humanly possible.

Bottom line: The government has a reliable witness (Murray) who can positively identify the person who hacked the DNC emails and, so far, they’ve showed no interest in his testimony at all.  Doesn’t that strike you as a bit weird?

Did you know that after a 10 month-long investigation, there’s still no hard evidence that Russia hacked the 2016 elections?  In fact, when the Intelligence agencies were pressed on the matter, they promised to release a report that would provide iron-clad proof of Russian meddling.  On January 6, 2017, theDirector of National Intelligence, James Clapper, released that report. It was called The Intelligence Community Assessment (ICA).  Unfortunately, the report fell far-short of the public’s expectations. Instead of a smoking gun, Clapper produced a tedious 25-page compilation of speculation, hearsay, innuendo and gobbledygook.  Here’s how veteran journalist Robert Parry summed it up:

“The report contained no direct evidence that Russia delivered hacked emails from the Democratic National Committee and Hillary Clinton’s campaign chairman John Podesta to WikiLeaks….The DNI report…as presented, is one-sided and lacks any actual proof. Further, the continued use of the word “assesses”….suggests that the underlying classified information also may be less than conclusive because, in intelligence-world-speak, “assesses” often means “guesses.” (“US Report Still Lacks Proof on Russia ‘Hack’”, Robert Parry, Consortium News)

Repeat: “the report contained no direct evidence”, no “actual proof”, and a heckuva a lot of “guessing”. That’s some “smoking gun”, eh?

If this ‘thin gruel’ sounds like insufficient grounds for removing a sitting president and his administration, that’s because it is.  But the situation is even worse than it looks,  mainly because the information in the assessment is not reliable. The ICA was corrupted by higher-ups in the Intel food-chain who selected particular analysts who could be trusted to produce a document that served their broader political agenda. Think I’m kidding? Take a look at this excerpt from an article at Fox News:

“On January 6, 2017, the U.S. Intelligence Community issued an “Intelligence Community Assessment” (ICA) that found Russia deliberately interfered in the 2016 presidential election to benefit Trump’s candidacy…  (but) there are compelling reasons to believe this ICA was actually a politicized analysis that violated normal rules for crafting intelligence assessments…… to ensure this one reached the bottom line conclusion that the Obama administration was looking for. …

….Director of National Intelligence James Clapper explained in his testimony that two dozen or so “seasoned experts” were “handpicked” from the contributing agencies” and drafted the ICA “under the aegis of his former office” …  While Clapper claimed these analysts were given “complete independence” to reach their findings, he added that their conclusions “were thoroughly vetted and then approved by the directors of the three agencies and me.”

This process drastically differed from the Intelligence Community’s normal procedures.  Hand-picking a handful of analysts from just three intelligence agencies to write such a controversial assessment went against standing rules to vet such analyses throughout the Intelligence Community within its existing structure.  The idea of using hand-picked intelligence analysts selected through some unknown process to write an assessment on such a politically sensitive topic carries a strong stench of politicization….

A major problem with this process is that it gave John Brennan, CIA’s hyper-partisan former director, enormous influence over the drafting of the ICA.  Given Brennan’s scathing criticism of Mr. Trump before and after the election, he should have had no role whatsoever in the drafting of this assessment.  Instead, Brennan probably selected the CIA analysts who worked on the ICA and reviewed and approved their conclusions….

The unusual way that the January 6, 2017 Intelligence Community Assessment was drafted raises major questions as to whether it was rigged by the Obama administration to produce conclusions that would discredit the election outcome and Mr. Trump’s presidency.”

(“More indications Intel assessment of Russian interference in election was rigged”, Fox News)

Repeat: “A politicized analysis that violated normal rules for crafting intelligence assessments.” That says it all, doesn’t it?

Let’s take a minute and review the main points in the article:

1–Was the Intelligence Community Assessment the summary work of all 17 US Intelligence Agencies?

No, it was not. “In his May 8 testimony to a Senate Judiciary subcommittee hearing, Clapper confirmed …(that) the ICA reflected the views of only three intelligence agencies — CIA, NSA and FBI – not all 17.”

2–Did any of the analysts challenge the findings in the ICA?

No, the document failed to acknowledge any dissenting views, which suggests that the analysts were screened in order to create consensus.

3– Were particular analysts chosen to produce the ICA?

Yes, they were “handpicked from the contributing agencies” and drafted the ICA “under the aegis of his former office” (the Office of the Director of National Intelligence.)

4– Was their collaborative work released to the public in its original form?

No,  their conclusions “were thoroughly vetted and then approved by the directors of the three agencies and me.” (Clapper) This of course suggests that the document was political in nature and crafted to deliver a particular message.

5–Were Clapper’s methods “normal” by Intelligence agency standards?

Definitely not. “This process drastically differed from the Intelligence Community’s normal procedures.”

6–Are Clapper and Brennan partisans who have expressed their opposition to Trump many times in the past calling into question their ability to be objective in executing their duties as heads of their respective agencies?

Absolutely. Check out this clip from Monday’s Arkansas online:

“I think, in many ways, our institutions are under assault, both externally — and that’s the big news here, is the Russian interference in our election system,” said James Clapper, the former director of national intelligence. “I think as well our institutions are under assault internally.”

When he was asked, “Internally, from the president?” Clapper said, “Exactly.” (Clapper calls Trump democracy assailant”, arkansasonline)

Brennan has made numerous similar statements. (Note: It is particularly jarring that Clapper– who oversaw the implementation of the modern surveillance police state– feels free to talk about “the assault on our institutions.”)

7–Does the ICA prove that anyone on the Trump campaign colluded with Russia or that Russia meddled in the 2016 elections?

No, it doesn’t.  What it shows is that –even while Clapper and Brennan may have been trying to produce an assessment that would ‘kill two birds with one stone’, (incriminate Russia and smear Trump at the same time) the ICA achieved neither. So far, there’s no proof of anything.   Now take a look at this list I found in an article at The American Thinker:

“12 prominent public statements by those on both sides of the aisle who reviewed the evidence or been briefed on it confirmed there was no evidence of Russia trying to help Trump in the election or colluding with him:

The New York Times (Nov 1, 2016);
House Speaker Paul Ryan (Feb, 26, 2017);
Former DNI James Clapper , March 5, 2017);
Devin Nunes Chairman of the House Intelligence Committee, March 20, 2017);
James Comey, March 20, 2017;
Rep. Chris Stewart, House Intelligence Committee, March 20, 2017;
Rep. Adam Schiff, House Intelligence committee, April 2, 2017);
Senator Dianne Feinstein, Senate Intelligence Committee, May 3, 2017);
Sen. Joe Manchin  Senate Intelligence Committee, May 8, 2017;
James Clapper (again) (May 8, 2017);
Rep. Maxine Waters, May 9, 2017);
President Donald Trump,(May 9, 2017).
Senator Grassley, Chairman of the Senate Judiciary committee, indicated that his briefing confirmed Dianne Feinstein’s view that the President was not under investigation for colluding with the Russians.”
(“Russian Hacking and Collusion: Put the Cards on the Table”, American Thinker)

Keep in mind, this is a list of the people who actually “reviewed the evidence”, and even they are not convinced. It just goes to show that the media blitz is not based on any compelling proof, but on the determination of  behind-the-scenes elites who want to destroy their political rivals. Isn’t that what’s really going on?

How does former FBI Director James Comey fit into all this?

First of all, we need to set the record straight on Comey so readers don’t get the impression that he’s the devoted civil servant and all-around stand-up guy he’s made out to be in the media. Here’s a short clip from an article by Human Rights First that will help to put things into perspective:

“Five former FBI agents…raised concerns about his (Comey’s) support for a legal memorandum justifying torture and his defense of holding an American citizen indefinitely without charge. They note that Comey concurred with a May 10, 2005, Office of Legal Counsel opinion that authorized torture. While the agents credited Comey for opposing torture tactics in combination and on policy grounds, they note that Comey still approved the legal basis for use of specific torture tactics.

“These techniques include cramped confinement, wall-standing, water dousing, extended sleep deprivation, and waterboarding, all of which constitute torture or cruel, inhuman, or degrading treatment in contravention of domestic and international law,” the letter states.

Those signing the letter to the committee also objected to Comey’s defense of detaining Americans without charge or trial and observed, “Further, Mr. Comey vigorously defended the Bush administration’s decision to hold Jose Padilla, a United States citizen apprehended on U.S. soil, indefinitely without charge or trial for years in a military brig in Charleston, South Carolina.” (“FBI Agents Urge Senate Judiciary Committee to Question Comey on Torture, Indefinite Detention”, Human Rights First)

Get the picture?

Comey is a vicious political opportunist who doesn’t mind breaking a few legs if it’ll advance his career plans. I wouldn’t trust the man as far as I could throw him. Which isn’t far.

American Thinker’s Clarice Feldman explains why Comey launched his counter-intel investigation in July 2016 but failed to notify Congress until March 2017, a full eight months later. Here’s what she said:

“There is only one reasonable explanation for FBI Director James Comey to be launching a counter-intel investigation in July 2016, notifying the White House and Clapper, and keeping it under wraps from congress. Comey was a participant in the intelligence gathering for political purposes — wittingly, or unwittingly.” (“Russian Hacking and Collusion: Put the Cards on the Table”, American Thinker)

Are we suggesting that the heads of the so called Intelligence Community are at war with the Trump Administration and paving the way for impeachment  proceedings?

Yep, we sure are. The Russia hacking fiasco is a regime change operation no different than the CIA’s 50-or-so other oustings in the last 70 years. The only difference is that this operation is on the home field which is why everyone is so flustered. These things are only suppose to happen in those “other” countries.

Does this analysis make me a Donald Trump supporter?

Never.  The idea is ridiculous. Trump might be the worst US president of all time, in fact, he probably is. But that doesn’t mean there aren’t other nefarious forces at work behind the smokescreen of democratic government. There are. In fact, this whole flap suggests that there’s an alternate power-structure that operates completely off the public’s radar and has the elected-government in its death-grip. This largely invisible group of elites controls the likes of  Brennan, Clapper and Comey. And, apparently,  they have enough influence to challenge and maybe even remove an elected president from office. (We’ll see.)

And what’s more surprising, is that the Democrats have aligned themselves with these deep state puppetmasters.  They’ve cast their lot with the sinister stewards of the national security state and hopped on the impeachment bandwagon. But is that a wise choice for the Dems?

Author Michael J. Glennon doesn’t think so. Here’s what he says in the May edition of Harper’s Magazine:

“Those who would counter the illiberalism of Trump with the illiberalism of unfettered bureaucrats would do well to contemplate the precedent their victory would set. …

American history is not silent about the proclivities of unchecked security forces, a short list of which includes the Palmer Raids, the FBI’s blackmailing of civil rights leaders, Army surveillance of the antiwar movement, the NSA’s watch lists, and the CIA’s waterboarding. …. Who would trust the authors of past episodes of repression as a reliable safeguard against future repression?”

(“Security Breach– Trump’s tussle with the bureaucratic state”, Michael J. Glennon, Harper’s Magazine)

“Who?”

The Democrats, that’s who.

 

Mike Whitney lives in Washington state. He is a contributor to Hopeless: Barack Obama and the Politics of Illusion (AK Press). Hopeless is also available in a Kindle edition. He can be reached at fergiewhitney@msn.com.

A Monster Eating the Nation

By James Howard Kunstler

Source: Kunstler.com

Is there any question now that the Deep State is preparing to expel President Donald Trump from the body politic like a necrotic organ? The Golden Golem of Greatness has floundered pretty badly on the job, it’s true, but his mighty adversaries in the highly politicized federal agencies want him to fail spectacularly, and fast, they have a lot of help from the NY Times / WashPo / CNN axis of hysteria, as well as such slippery swamp creatures as Lindsey Graham.

There are more problematic layers in this matter than in a Moldavian wedding cake. America has been functionally ungovernable for quite a while, well before Trump arrived on the scene. His predecessor managed to misdirect the nation’s attention from the cumulative dysfunction with sheer charm and supernatural placidity — NoDrama Obama. But there were a few important things he could have accomplished as chief exec, such as directing his attorney general to prosecute Wall Street crime (or fire the attorney general and replace him with someone willing to do the job). He could have broken up the giant TBTF banks. He could have aggressively sponsored legislation to overcome the Citizens United SOTUS decision (unlimited corporate money in politics) by redefining corporate “citizenship.” Stuff like that. But he let it slide, and the nation slid with him down a greasy chute of political collapse.

Which we find embodied in Trump, a sort of tragicomic figure who manages to compound all of his weaknesses of character with a childish impulsiveness that scares folks. It is debatable whether he has simply been rendered incompetent by the afflictions heaped on by his adversaries, or if he is just plain incompetent in, say, the 25th Amendment way. I think we’ll find out soon enough, because impeachment is a very long and arduous path out of this dark place.

The most curious feature of the current crisis, of course, is the idiotic Russia story that has been the fulcrum for levering Trump out of the White House. This was especially funny the past week with the episode involving Russian Foreign Minister Lavrov and Ambassador Kislyak conferring with Trump in the White House about aviation security around the Middle East. The media and the Lindsey Graham wing of the Deep State acted as if Trump had entertained Focalor and Vepar, the Dukes of Hell, in the oval office.

Why do you suppose nations employ foreign ministers and ambassadors, if not to conduct conversations at the highest level with other national leaders? And might these conversations include matters of great sensitivity, that is, classified information? If you doubt that then you have no understanding of geopolitics or history.

The General Mike Flynn story is especially a crack-up. Did he accept a twenty thousand dollar speaking fee from the Russian news outlet RT in his interlude as a private citizen? How does that compare to the millions sucked in by the Clinton Foundation in pay-to-play deal when Madame was secretary of state? Or her six-figure speeches to Goldman Sachs and their ilk. Are private citizens forbidden to accept speaking fees or consulting fees from countries that we are not at war with? I’d like to know how many other alumni of the Bill Clinton, Bush-II and Obama admins have hired themselves out on this basis. Scores and scores, I would bet.

Trump’s adversaries might not get any traction on the Russia story, but they may enrage the rogue elephant Trump enough in the process that he will appear sufficiently incompetent to run him over with the 25th Amendment, and I think that is the plan for now. Of course, there are some jokers in the deck. A really striking one is the story of murdered DNC staffer Seth Rich last July. He was shot in the back on the street outside his apartment one night by persons as yet unknown, and twelve days later over 40,000 DNC emails landed at Wikileaks. His laptop is reportedly in the possession of the DC cops — if it hasn’t been dumped in the Potomac. I’m generally allergic to conspiracy theories, but this looks like an especially ugly story, which might ultimately be clarified if-or-when Julian Assange of Wikileaks ever divulges the source of that data dump. Anyway, the new Special Counsel at the DOJ, former FBI Director Robert Mueller, may have to venture down that dark trail.

One way or another, though, the Deep State is determined to drive Trump from office. In the final rounds of this struggle, Trump might conceivably undertake a sudden swamp-draining operation: the firing of a great many politicized Intelligence Community officers, especially the ones legally culpable for leaking classified information to media — another area that Mr. Mueller could also shine a light on. The colossal security apparatus of this country — especially the fairly new giant NSA — has become a monster eating America. Somebody needs to literally cut it down to size. Perhaps that’s the Deep State’s main motive in moving heaven and earth to dump Trump.

When they do, of course, they are libel to foment an insurrection every bit as ugly as the dust-up that followed the shelling of Fort Sumter. Trump, whatever you think of him — and I’ve never been a fan, to put it mildly — was elected for a reason: the ongoing economic collapse of the nation, and the suffering of a public without incomes or purposeful employment. That part of the common weal is liable to completely whirl down the drain later this year in something like a currency crisis or a depressionary market meltdown engineered by yet another Deep State player, the Federal Reserve. That and the ejection of Trump could coincide with disastrous results.

Unaccounted Power is Dragging Global Society Into An Orwellian Dystopia

By Dr Nozomi Hayase

WikiLeaks dropped a bombshell on the U.S. Central Intelligence Agency. Code-named “Vault 7”, the whistleblowing site began releasing the largest publication of confidential documents, that have come from the top secret security network at the Cyber Intelligence Center.

Long before the Edward Snowden revelations, Julian Assange noted how “The Internet, our greatest tool of emancipation, has been transformed into the most dangerous facilitator of totalitarianism we have ever seen.” He decried the militarisation of the Internet with the penetration by the intelligence agencies like NSA and GCHQ, which created “a military occupation of civilian space”.

Now, WikiLeaks’ latest disclosures shed further light on this cyber-warfare, exposing the role of the CIA.

At a recent press conference from the Ecuadorian embassy in London, Assange explained how the CIA developed its own cyber-weapons arsenal and lost it after storing it all in one place. What is alarming is that the CIA became aware of this loss and didn’t warn the public about it. As a result, this pervasive technology that was designed to hide all traces, can now be used by cyber-mafias, foreign agents, hackers and by anyone for malicious purposes.

Part one of this WikiLeaks publication dubbed “Year Zero”, revealed the CIA’s global hacking force from 2013 to 2016. The thousands of documents released contain visceral revelations of the CIA’s own version of an NSA. With an ability to hack any Android or iPhone, as well as Samsung TVs and even cars, they spy on citizens, bypassing encrypted messaging apps like Signal and Telegram. The Vault 7 leaks that exposed the CIA’s excessive power is of great importance from a point of view of security for individual privacy. But it has larger significance tied to the mission of WikiLeaks.

Opening Government into the Deep State

Describing itself on its site as “a multi-national media organisation and associated library”, WikiLeaks aims to open governments in order to bring justice. In the speech at the SWSX conference in Texas, delivered via Skype in 2014, Assange described the particular environment that spawned the culture of disclosure this organisation helped to create.

He noted how “we were living in some fictitious representation of what we thought was the world” and that the “true history of the world” is “all obscured by some kind of fog”. This founder and editor in chief of innovative journalism explained how disclosures made though their publications break this fog.

The magnitude of this Vault 7 cache, which some say may be bigger than the Snowden revelations, perhaps lies in its effect of clearing the fog to let people around the world see the ground upon which the narratives of true history are written.

Since coming online in 2007, WikiLeaks has published more than 10 million documents. Each groundbreaking disclosure got us closer to where the real power of the world resides. In 2010, WikiLeaks rose to prominence with the publication of the Collateral Murder video. With the release of documents concerning U.S. Wars in Iraq and Afghanistan, they hit on the nerves of the Pentagon —the central nervous system of the Military Industrial Complex. With the release of the U.S. Diplomatic Cables, they angered the State Department and came head to head with this global superpower.

Last year, this unprecedented publisher with its perfect record of document authentication, began to blow the cover off American democracy a step further to clear the fog. WikiLeaks played an important role in the 2016 U.S. Presidential election. The DNC leaks disrupted the prescribed script of corporate sponsored lesser of two evils charade politics. The publication of the Podesta emails that revealed internal workings of the Clinton campaign, gave the American people an opportunity to learn in real time about the function of the electoral arena as a mechanism of control.

With the demise of the Democratic Party, led by its own internal corruption, the cracks in this façade widened, unveiling the existence of a government within a government.

People are beginning to glimpse those who seek to control behind the scenes – anonymous unelected actors who exercise enduring power in Washington by manipulating public perception.

This unraveling that has been slowly unfolding, appeared to have reached a peak last month when Trump’s former National Security Adviser, Michael Flynn resigned. He was forced to do this on the grounds that leaked classified information revealed he was lying about his phone conversation discussing sanctions with the Russian Ambassador.

WikiLeaks now entered its 10th year. The momentum continues, bringing us to a new pinnacle of disclosure. At the end of last year, in anticipation of this new release, WikiLeaks tweeted, “If you thought 2016 was a big WikiLeaks year, 2017 will blow you away.” During the dramatic takedown of General Flynn, the media created a frenzy around unconfirmed claims that Russia was meddling with the U.S. election and Putin’s alleged ties with Trump, creating another fog of obfuscation. It was in this climate that WikiLeaks published documents showing CIA espionage in the last French presidential election.

History Awakening

The idea of a shadow government has been the focus of political activists, while it has also been a subject of ridicule as conspiracy theories. Now, WikiLeaks’ pristine documents provide irrefutable evidence about this hidden sector of society. The term ‘deep state’ that is referenced in the mainstream media, first hit the major airwaves in 2014, in Bill Moyers’ interview with Mike Lofgren. This former congressional staff member discussed his essay titled “Anatomy of the Deep State” and explained it as the congruence of power emerging as a “hybrid of corporate America and national security state”.

We are now watching a deep state sword-fight against the elected Caesar of American plutocracy in this gladiator ring, surrounded by the cheers of liberal intelligentsia, who are maddened with McCarthy era hysteria. As the Republic is falling with its crumbling infrastructure and anemic debt economy, far away from the coliseum, crazed with the out-of-tune national anthem, the silent pulse of hope begins to whisper.

WikiLeaks unlocked the vaults that had swallowed the stolen past. As the doors open into this hidden America, history awakens with dripping blood that runs deep inside the castle. As part of the release of this encrypted treasure-trove of documents, WikiLeaks posted on Twitter the following passphrase; “SplinterItIntoAThousandPiecesAndScatterItIntoTheWinds.” These were actually words spoken by President John F. Kennedy, a month before his assassination. His exact words wereI will splinter the CIA into a thousands pieces and scatter it into the wind” – which shows his attitude toward the CIA as an arm of the deep state and what many believe to be the real reason for his assassination.

The secret stream of history continues, taking control over every aspect of civil life and infecting the heart of democracy. The U.S. has long since lost its way. We have been living in a fictitious representation of the flag and the White House. It is not judicial boundaries drawn by the Constitution or even the enlightenment ideals that once inspired the founders of this country that now guide the course of our lives. Tyranny of the old world casts its shadow, binding Congress, the Supreme Court and the President into a rule of oligarchy. CIA documents revealed that the U.S. Consulate in Frankfurt was used as a covert hacking base, while CIA officers work under the cover of the State Department to penetrate with these intelligence operations. The Wall Street Journal now reports that President Trump has given the CIA expanded authority to carry out drone attacks, which was power that prior to that had only been given to the Pentagon.

Decisions that radically alter the direction of our society are not made in a fair democratic election, a public hearing or the senate floor. They are made in the FISA Court and secret grand juries, bypassing judicial warrants and democratic accountability. This hidden network of power that exists above the law entangles legislators, judges and the press into a web of deception through dirty money and corrupt influence. It controls perception of the past, present and future.

The Internet Generation

As the deep state comes to the surface, we are able to see the real battle on the horizon. What is revealed here is a clash of values and two radically different visions of a future civilization. In his response to the Vault 7 publication, Michael Hayden, the former CIA director was quick to lay blame on the millennials. He said, “This group of millennials and related groups simply have different understandings of the words loyalty, secrecy and transparency than certainly my generation did”. To him, these young people are the problem, as if their different cultural approach and instincts must be tempered and indoctrinated into this hierarchical system, so they know who their masters are.

Who are these people that are treated as a plague on society? This is the Internet generation, immersed with the culture of the free-net, freedom of speech and association. They believe in privacy for individuals, while demanding transparency for those in power. Peter Ludlow, a philosopher who writes under the pseudonym Urizenus Sklar, shared his observation of a cultural shift that happened in 2011. He noted that WikiLeaks had become a catalyst for an underground subculture of hackers that burst into the mainstream as a vital political force.

Assange recognised this development in recent years as a “politicisation of the youth connected to Internet” and acknowledged it as “the most significant thing that happened in the world since the 1960s”.

This new generation ran into the deep state and those who confront it are met with intense hostility. Despite his promise of becoming the most transparent government, Obama engaged in unprecedented persecution of whistleblowers. Now this dark legacy seems to be continuing with the present administration. Vice president Mike Pence vowed to “use the full force of the law” to hunt down those who released the Intelligence Agency’s secret material.

As these conflicts heat up, resistance continues in the Internet that has now become a battleground. Despite crackdowns on truthtellers, these whistleblowers won’t go away. From Manning to Snowden, people inside institutions who have come to see subversion of government toward insidious control and want change, have shown extraordinary courage.

According to a statement given to WikiLeaks, the source behind the CIA documents is following the steps of these predecessors. They want this information to be publicly debated and for people to understand the fact that the CIA created its own NSA without any oversight. The CIA claims its mission is to “aggressively collect foreign intelligence overseas to protect America from terrorists, hostile nation states and other adversaries”. With these documents that have now been brought back to the historical archive, the public can examine whether this agency has itself lost control and whose interests they truly serve.

The Future of Civilisation

As the world’s first stateless 4th estate, WikiLeaks has opened up new territory where people can touch the ground of uncensored reality and claim creative power to participate in the history that is happening. In a press conference on Periscope, Assange made reference to a statement by the President of Microsoft, who called for the creation of a digital Geneva Convention to provide protection against nation-states and cyber-attacks. He then affirmed WikiLeaks’s role as a neutral digital Switzerland for people all over the world.

WikiLeaks is taking the first step toward this vision. After they carefully redacted the actual codes of CIA hacking tools, anonymised names and email addresses that were targeted, they announced that they will work with tech companies by giving them some exclusive access to the material. Assange explained that this could help them understand vulnerabilities and produce security fixes, to create a possible antidote to the CIA’s breach of security and offer countermeasures. WikiLeaks tweeted notifying the public that they now have contacted Apple, Microsoft, Google, Mozilla and MicroTik to help protect users against CIA malware.

The Internet unleashed the beast that grows its force in the dark. Unaccounted power is dragging global society down into an Orwellian dystopia. Yet, from this same Internet, a new force is arising. Courage of the common people is breaking through the firewall of secrecy, creating a fortress that becomes ever more resilient, as the network of people around the world fighting for freedom expands.

When democracy dies in darkness, it can be reborn in the light of transparency. The deep state stretches across borders, sucking people into an abyss of totalitarian control. At the same time, the epic publication of Vault 7 that has just begun, reminds us that the greatness in each of us can awaken to take back the power of emancipation and participate in this battle for democracy, the outcome of which could not only determine the future of the Internet, but of our civilisation.

 

Nozomi Hayase, Ph.D., a native of Japan, is a columnist, researcher, and the First Amendment advocate. She is member of The Indicter‘s Editorial Board and a former contributing writer to WL Central and has been covering issues of free speech, transparency and the vital role of whistleblowers in global society.

From Russia, with Panic

Cozy bears, unsourced hacks—and a Silicon Valley shakedown

By Yasha Levine

Source: The Baffler

The Russians hacked America.

After Donald Trump’s surprise victory in November, these four words reverberated across the nation. Democratic Party insiders, liberal pundits, economists, members of Congress, spies, Hollywood celebrities, and neocons of every stripe and classification level—all these worthy souls reeled in horror at the horribly compromised new American electoral order. In unison, the centers of responsible opinion concurred that Vladimir Putin carried off a brazen and successful plan to throw the most important election in the most powerful democracy in the world to a candidate of his choosing.

It seemed like a plotline from a vintage James Bond film. From his Moscow lair, Vladimir Putin struck up an alliance with Julian Assange to mount a massive cyber-offensive to discredit Hillary Clinton and her retinue of loyal Democratic Party operatives in the eyes of the American public.

The plot was full of twists and turns and hair-raising tangents, including tales of Russian-American retiree-agents sunning in Miami while collecting payoffs from Russia’s impoverished pension system. But the central ruse, it appears, was to enter the email server of the Democratic National Committee and then tap into the Gmail account belonging to John Podesta, founder of the Center for American Progress and premier D.C. Democratic insider.

As the long 2016 general election campaign unwound, WikiLeaks released a steady stream of embarrassing revelations from the DNC—though the disclosures were no more compromising than what you’d find in the correspondence of any mid-sized private-sector company: dumb boardroom gossip, petty press intrigues, and sleazy attempts to undermine a well-placed executive rival (namely Bernie Sanders). Truly, it would have been astonishing to learn that the DNC went about its business in any other way. But the sheer fact of the data breach was dispositive in the eyes of Democratic operatives and their many defenders in the liberal press. After all, WikiLeaks also reportedly collected data from the Republican National Committee, and did nothing with it. Clearly this was cyber-espionage of the most sophisticated variety.

On the Trump side of the ledger, things were murkier. Trump’s political advisers indeed had ties to Russia and Ukraine—but this was hardly surprising given the authoritarian-friendly lobbying climate within Washington. During the campaign the GOP nominee was disinclined to say anything critical about Putin. Indeed, breaking with decades of Republican tradition, Trump openly praised the Russian leader as a powerful, charismatic figure who got things done. But since the candidate also refused to disclose his tax returns, a commercial alliance with the Russian autocrat was necessarily a matter of conjecture. That didn’t stop theories from running wild, culminating in January with the titillating report from BuzzFeed that U.S. intelligence agencies believed that Putin had compromising footage of Trump cavorting with prostitutes at a Moscow hotel previously patronized by Barack and Michelle Obama. Not only was the Yank stooge defiling the very room where the first couple had stayed, but he allegedly had his rented amorous companions urinate in the bed. Behold, virtuous American republic, the degradation Vladimir Putin has in store for you!

Taking the Piss

The dossier published by BuzzFeed had been circulating for a while; on closer inspection, it appeared to be repurposed opposition research from the doomed Jeb Bush campaign. Its author was a former British intelligence operative apparently overeager to market salacious speculation. By the end of this latest lurid installment of the Russian hacking saga, no one knew anything more than they had when the heavy-breathing allegations first began to make their way through the political press. Nevertheless, the Obama White House had expelled Russian diplomats and expanded sanctions against Putin’s regime, while the FBI continued to investigate reported contacts between Trump campaign officials and Russian intelligence operatives during the campaign.

This latter development doesn’t exactly inspire confidence. As allegations of Russian responsibility for the DNC hack flew fast and furious, we learned that the FBI never actually carried out an independent investigation of the claims. Instead, agency officials carelessly signed off on the findings of CrowdStrike, a private cybersecurity firm retained by the Democratic National Committee. Far from establishing an airtight case for Russian espionage, CrowdStrike made a point of telling its DNC clients what it already knew they wanted to hear: after a cursory probe, it pronounced the Russians the culprits. Mainstream press outlets, primed for any faint whiff of great-power scandal and poorly versed in online threat detection, likewise treated the CrowdStrike report as all but incontrovertible.

Other intelligence players haven’t fared much better. The Director of National Intelligence produced a risible account of an alleged Russian disinformation campaign to disrupt the 2016 presidential process, which hinged on such revelations as the state-sponsored TV news outlet Russia Today airing uncomplimentary reports on the Clinton campaign and reporting critically on the controversial U.S. oil-industry practice of fracking as a diabolical plot to expand the market for Russian natural gas exports. In a frustratingly vague statement to Congress on the report, then-DNI director James Clapper hinted at deeper and more definitive findings that proved serious and rampant Russian interference in America’s presidential balloting—but insisted that all this underlying proof must remain classified. For observers of the D.C. intelligence scene, Clapper’s performance harkened back to his role in touting definitive proof of the imminent threat of Saddam Hussein’s WMD arsenal in the run-up to the U.S. invasion of Iraq.

It’s been easy, amid the accusations and counteraccusations, to lose sight of the underlying seriousness of the charges. If the hacking claims are true, we are looking at a truly dangerous crisis that puts America’s democratic system at risk.

The gravity of the allegation calls for a calm, measured, meticulously documented inquiry—pretty much the opposite of what we’ve seen so far. The level of wild assertion has gotten to the point that some of the most respected pro-Western voices in Russia’s opposition have expressed alarm. As much as they despise Putin, they don’t buy the bungled investigations. “In the real world outside of soap operas and spy novels . . . any conclusions concerning the hackers’ identity, motives and goals need to be based on solid, demonstrable evidence,” wrote Leonid Bershidsky. “At this point, it’s inadequate. This is particularly unfortunate given that the DNC hacks were among the defining events of the raging propaganda wars of 2016.”

The lack of credible evidence, the opaque nature of cyber attacks, the partisan squabbles and smears, and the national-security fearmongering have all made this particular scandal very difficult to navigate. It may be years before we find out what really happened. Meanwhile, I’d like to tell a cautionary tale. It’s a story about the last time American and European cyber experts accused Russia of launching an attack against another country—and nearly provoked a war with a nuclear power. The moral of the tale is that cyberwarfare is a fraught and high-stakes theater of conflict, in which the uncertain nature of cyber-attack attribution can be exploited to support any politicized version of events that one chooses.

All Georgians Now

On August 8, 2008, war broke out between Georgia and Russia. Backed up by heavy artillery, truck-mounted Grad rockets, and tanks, Georgia launched a surprise invasion of South Ossetia, a tiny mountainous breakaway republic on its northern flank that had been at the center of a long-simmering regional territorial dispute. A prolonged artillery barrage reduced parts of Tskhinvali, South Ossetia’s capital, to rubble. Civilians were given no warning—those not killed in the initial assault hid in basements or fled on foot. A Russian peacekeeping force, which had been stationed in South Ossetia under an Organization for Security and Cooperation in Europe agreement since 1992, was targeted in the attack. By the end of the first day, Georgian troops were on the verge of taking the whole city.

Mikheil Saakashvili, Georgia’s charismatic nationalist president, had campaigned on a nationalistic platform, promising to reabsorb the country’s breakaway regions. His initial success did not last long. Russian jets pounded Georgian military command posts and communications, while Russian troops streamed into South Ossetia. By the end of day two, the tide had turned: Georgian forces began retreating. By day five, Russian forces had control over South Ossetia and huge swaths of northern Georgia. Tanks and infantry entered several northern towns and moved around unimpeded just an hour away from Tbilisi, Georgia’s capital, where euphoria and jubilation turned to sickly fear. News footage showed Saakashvili cowering as Russian jets flew overhead. He appeared on television nervously chewing his tie, prompting the BBC to ask wryly: “The Georgian president chews over his next move. Is he weaker or stronger than before?”

Weaker, definitely. But in the war’s aftermath, Russia and Georgia were each determined to claim victim status. Russia pointed out that Georgia had started the war; Georgia blamed Russia for launching a full-scale invasion. President Saakashvili appealed to the United States, hoping it would intervene militarily on Georgia’s behalf.

The Bush White House was firmly aligned with Georgia. For years, Georgia had been an important neocon project in a grander scheme to peel away former Soviet Republics from Moscow’s influence. American NGOs and soft-power outfits like USAID backed Saakashvili’s rise to power during the country’s “Rose Revolution.” Since 2004, the Bush administration had lavished military aid on Saakashvili’s government, outfitted its army, and trained its soldiers. John McCain and Hillary Clinton jointly nominated Saakashvili for the Nobel Peace Prize in 2005. Support for Georgia was bipartisan and continued right up to Georgia’s attack on South Ossetia; more than a thousand American troops held a joint exercise with Georgia near the South Ossetian border in July.

As a complement to the Georgia PR offensive, the Bush White House continued to hammer away at its stable of anti-Putin talking points. For years, the United States had portrayed Vladimir Putin as a strongman leader bent on world domination. The invasion of Georgia seemed to confirm the official narrative: Russia would stop at nothing to crush the democratic aspirations of its neighbors.

It was a dangerous moment. Vice president Dick Cheney pushed for directly engaging the Russians in “limited military options”—including aerial bombardment to seal the Roki Tunnel linking North Ossetia and South Ossetia that was being used to transport reinforcements. Luckily, president George W. Bush, who had a street in Tbilisi named after him, wavered, sensibly fearing a real war with Russia.

The episode occurred during a U.S. presidential election. Senator John McCain used the conflict to showcase his hawkish foreign policy bona fides, arguing that America needed to intervene to protect Georgia’s budding democratic society from the authoritarian Putin. Claiming that “today, we are all Georgians,” McCain called for NATO forces to be deployed against Russia, which would have triggered a war with a nuclear power.

I was in Moscow at the time, reporting on the war. Those who had covered the region understood that Georgia was no innocent. The ethnic conflict between Ossetians and Georgians has old, festering roots—indeed, Georgia’s invasion of South Ossetia was centuries in the making. The Ossetians consider the territory of South Ossetia to be native lands they have occupied for centuries, while Georgians view Ossetians as relatively recent interlopers. When South Ossetia declared its independence after the breakup of the Soviet Union, Georgia’s ultra-nationalistic first president attempted to quash the independence movement by force. After a short war, South Ossetia stood its ground—and Georgia and South Ossetia squared off in an uneasy peace administered by Russian, Georgian, and South Ossetian peacekeepers. Two-thirds of the breakaway republic were ethnic Ossetians. They feared Georgia and favored Russia as a military bulwark. Russia handed out Russian passports to South Ossetians and provided military protection, making the territory a de facto member of the Russian Federation.

Seasoned observers of the region’s tangled geopolitics understood that Russia shared amply in the blame but that the fault lay primarily with President Saakashvili. When he came to power, he took on the mantle of a medieval Georgian king who had unified the country. “Today Georgia is split and humiliated. We should unite to restore Georgia’s territorial integrity. Georgia has existed and will exist. Georgia will become a united strong country,” he declared in 2004. With deteriorating political support at home, Saakashvili was itching for a popular war. Skirmishes increased along Georgia’s border with Abkhazia and South Ossetia; finally, Georgia fired the first shot.

Suddenly, America found itself at the edge of a precipice: a war over a complex sectarian conflict in a remote part of the world. American policymakers wanted a simple explanation, and conveniently, they were offered one: cyber-aggression.

The Sites Go Out in Georgia

When war broke out, a slew of Georgian websites came under attack. The Central Bank of Georgia was hacked, according to Russian reports. Its internal networks were not penetrated, but the hackers tinkered with the homepage to give the Georgian unit of currency, the lari, a less than favorable exchange rate, forcing the government to issue an order that suspended all electronic banking services. Georgia’s Ministry of Foreign Affairs was hacked, its homepage replaced with a slideshow depicting Mikhail Saakashvili as Hitler. “And he will suffer the same fate,” read an ominous message beside it.

A Russian-language forum called “Stop Georgia” suddenly came online, hosted in, of all places, the United States. Against a green camouflage-inspired background, its creators decried Georgia’s propaganda war against Russia. “We, as representatives of the Russian hacker-underground, will not tolerate provocations from Georgia.” The forum was crude and looked like it had been put together in a few hours. Its primary function was to distribute a simple, easily available program permitting anyone with a computer and an internet connection to become part of a denial-of-service attack swarm. The forum conveniently provided a list of Georgian target websites and helped organize and direct the cyber-mob action.

Georgian officials proclaimed these cyber attacks a strategic maneuver by the Russian military designed to take out the country’s communication system, facilitating the Russians’ armed invasion. The coordinated nature of the attacks, they insisted, showed that Russia had planned the invasion long in advance. “The opening shots of the Russian invasion of Georgia were fired over the Internet, proving Russian online aggression predated Georgian actions,” declared an official report by the Georgian government. The government called the people behind the attack “cyber terrorists.”

Cybersecurity experts came out of the woodwork to confirm and expand on Georgia’s allegations. Some implicated a shadowy cybercrime group from St. Petersburg that analysts had dubbed the “Russian Business Network” and linked it to the FSB, Russia’s secret police. Others claimed that Nashi, a Kremlin-backed young nationalist group, was involved. American military officials weighed in, agreeing that Russia had used cyber attacks to confuse and disorient the Georgian government. “The Russians just shot down the government command nets so they could cover their incursion,” Michael Wynne, former U.S. Air Force Secretary, told the AP on August 13.

One hack in particular became a sort of poster action for the sinister Russian cyber-offensive and conveniently doubled as a warning signal for greater Russian-authored threats ahead. In July, just after secretary of state Condoleezza Rice had visited Georgia and reaffirmed America’s support for the country’s desire to exit Russia’s sphere of influence, President Saakashvili’s site had been taken down by a stream of junk requests with a string of text that read: “win+love+in+Rusia.”

What did it all mean? The war had barely ended, but John Markoff, longtime technology reporter for the New York Times, offered an answer: “As it turns out, the July attack may have been a dress rehearsal for an all-out cyberwar once the shooting started between Georgia and Russia. According to Internet technical experts, it was the first time a known cyber attack had coincided with a shooting war.” Other journalists chimed in as well: the Wall Street Journal, CNN, the Washington Post. The consensus, according to cyber experts, was that Russia was indeed behind the attacks—and the rhetoric was getting more and more belligerent.

And so, within the space of a news cycle or two, internet analysts turned into warmongers and cyber-hawks, comparing rudimentary internet attacks to atomic weapons. “These attacks in effect had the same effect that a military attack would have. That suddenly means that in cyberspace anyone can build an A-bomb,” Rafal Rohozinski, a respected cyber analyst with Citizen Lab, told the Washington Post. The Financial Times concurred: “The crisis in Georgia has not only stoked fears of a belligerent Russia. It has also served as a reminder that a new style of warfare—potentially as devastating as those that terrified previous generations—is almost upon us: cyberwar.”

That’s right: defacing a government website with a repetitive string of crude slogans was now the twenty-first-century equivalent of a nuclear first strike. The hysteria sloshed around and spilled over into fears that America was defenseless against similar attacks from Russia. “It’s a grave concern be the same thing could happen here in America,” CNN host John Roberts exclaimed.

Point, Click, Panic

I began investigating the cyberwar as soon as it erupted. I knew something about the way computers, websites, and the internet worked, having spent two years studying computer science at UC Berkeley, and I had serious doubts about the cyber dimension of the Russia-Georgia War. The hacks and attacks all seemed rather crude and for the most part targeted non-critical cyber portals: ceremonial government websites, several news sites, the public-facing website of a central bank. This was hardly the ruinous infrastructure offensive that cybersecurity experts were warning people about. As I got deeper into the story—interrogating my contacts in Moscow, traveling to Georgia, interviewing hackers, politicians, and cyber experts in Europe, Russia, and the United States—the cyberwar battle cries sounded more and more like ideologically manufactured hysteria.

To be sure, the assaults were troubling. Hacks against Georgian websites took place, they were in some way connected to the war, and Russia’s cyber criminal world had ties to the country’s security establishment. But it was an enormous—and dangerous—leap to interpret these attacks as a pre-planned Russian intelligence operation, possibly justifying an American military response. What’s more, it seemed clear that most of the people doing the investigating were working backward. They started from the premise that Russia started the war and then proceeded to show that the cyber attacks were an element of this premeditated invasion.

Living in Moscow, I saw a striking split-screen effect taking hold around the Georgia crisis. America was freaking out about the danger of Russian cyber attacks, while people I talked to in Russia mocked the hysteria. Looking at my reporting notes from that time, I can’t find a single Russian source who took it seriously. Nikita Kislitsin, former editor of Russia’s Hacker magazine, laughed at Western cybersecurity experts who suggested that the Georgian attacks were the entering wedge of a sophisticated plan for complete Russian takeover, explaining that hackers can have all sorts of unconventional motives for taking part in a political web war. One regular contributor to his magazine’s how-to break-in section, for example, had hacked into a few Georgian sites just so he had something to write—and brag—about. Kris Kaspersky, a well-known Russian hacker and security expert, also ridiculed the notion that the Georgia hacks were hatched as part of a military intelligence campaign. “A prepubescent kid could have carried out the attacks,” Kaspersky told me. “A well-funded organization like the FSB can pull off much more effective Web site attacks.” Bringing down a few rinky-dink government and newspaper websites is a far cry from network warfare, Kaspersky argued. Indeed, it was at least as plausible that the hacks could have been self-inflicted: “In these kinds of conflicts, you have to look at who benefits,” he said. “If I was Georgia, I would attack myself.”

The Fog of the Data Log

There was a second, underreported side to the conflict: the cyber attacks went in both directions.

Even before the war broke out in August, South Ossetian websites came under attack. A few days before the shelling of South Ossetia began, someone skillfully broke into the website of the Republic’s television station, replacing news items on the number of Georgian troops killed in a shootout with South Ossetian troops with ones that claimed Russian mercenary fighters were among the casualties. As Georgian tanks rolled across the border, other South Ossetian news sites—some of which were hosted in Moscow—came under cyber attack. The website of South Ossetia’s Ministry of Information, a clearinghouse for South Ossetian news, buckled under a denial-of-service attack. At the same time, Russian news sites—including the Kremlin-funded Russia Today—were hit and suffered downtime during the war.

If you squinted at the conflict and looked at it from Russia’s and South Ossetia’s perspective, you could use the cyber attacks to prove the opposite of what Georgia and Western cyber experts were claiming: the cyber attacks proved that Georgia had planned its military invasion. And that was exactly what the South Ossetians were telling me. “They hoped that a media blackout of the atrocities they were committing against a civilian population would reduce resistance to the invasion, both locally and globally,” Yuri Beteyev, the founder and editor in chief of OsInform, South Ossetia’s only news agency, told me. He had been in Tskhinvali when Georgia’s heavy artillery rolled into town.

I traveled to Tbilisi, looking for evidence of the alleged Russian attack. I had scheduled interviews with newspapers, government agencies, and internet service providers. They all made grand claims about Russian cyber attacks, all of them short on specific evidence. Caucasus Online, one of Georgia’s largest ISPs, claimed the attacks started the day before the military action—which served in the company’s view as undeniable proof that the Russian government was coordinating them. But ISP officials could not provide any supporting data, and when I requested a sample of their logs from that day, company spokesmen claimed the data had been deleted.

I was shown a former Soviet government compound in the center of Tbilisi. The building was a modernist fortress: a slab of granite and concrete perched at the top of a steep hill. The seventh floor housed Georgia’s National Security Council, the coordinating body for the country’s military and intelligence agencies. In this ultrasecure location, Georgian officials spun a series of talking points about how the cyberwar proved Russian aggression. “For a small country like ours, information is the most powerful tool with which you can protect yourself. The Russians knew this,” Security Council director Alexander Lomaia told me. “One day, we find out that we are cut off from the world. All major websites—including government and media—were attacked. Their aim was to limit our ability to electronically communicate, and they succeeded.”

But Georgia is a poor, largely rural country with low internet connectivity outside the capital. Its level of cyber-activity ranked below that of countries like Nigeria, Bangladesh, Bolivia, and El Salvador. You could hardly launch a real cyber attack if you wanted too, since few Georgians outside Tbilisi used the internet at all, let alone for anything important. It was all hype and bluster—and very superficial.

Indeed, as in Moscow, critical journalists and techies in Georgia dismissed much of the hype. Yes, there were cyber attacks. Yes, they could have been directed by the Russian government. But they were so amateur and inconsequential that they had little effect. Their biggest contribution, in fact, was to bolster Georgian counter-propaganda claims, as each little hack was taken up by the Georgian government and broadcast as proof of Russian aggression. One journalist told me his colleagues had cheered news of Georgia-based cyber attacks against Russia. “A wave of jubilation spread through the forum when they managed to take down Russia Today for a few hours.” Patriotic hackers doing their part to fight Russia? This is exactly what cyber experts accused Russian security services of orchestrating against Georgia as part of the military invasion.

Following the Money

By the time I left Georgia in October, the cyberwar story was no longer obsessing political leaders and media producers in the West. Congress had voted to bail out Wall Street. The Georgia-Russia War dropped out of America’s collective memory almost as quickly as it had appeared, eclipsed by a scarier and much more direct threat to America: the meltdown of our financial system and the threat of a new Great Depression.

A year later, a European Union commission issued a detailed report that showed just how empty all the talk about cyber attacks and premeditated Russian war really was. The report put the blame for starting the war squarely on Georgia. But by then the Georgia-Russia War was ancient news. No one cared, and the report barely got a mention in the press. But Silicon Valley noticed.

While the financial industry was teetering on the brink of oblivion, another industry was being born: the cybersecurity complex. By now it is a multibillion-dollar boondoggle, employing shoddy forensic techniques and politicized investigations. But it is highly profitable. The boom has been driven by the grim leaky reality of our digital world. Not a month goes by without some huge corporation or government agency getting hacked, its data splattered across the internet or siphoned off for the exclusive use of scammers, corporate spies, and intelligence agencies.

Cybersecurity firms have stepped up to the challenge. They’ve attracted funding from the biggest and most powerful venture capital houses: Sequoia, Google Capital, and the like. Not surprisingly, the CIA’s in-house VC outfit, In-Q-Tel, has been a leading investor in this space. All these firms position themselves as objective forensic investigators, patiently sifting through the evidence to find the guilty party and then figuring out how to defend against it. They have been involved with diagnosing and attributing big hacks for shamefaced clients like Target, J.P. Morgan, and Sony Pictures. Investors and intelligence agencies sing the praises of the critical services these outfits offer in an online environment teeming with hostile threats.

But in private conversations, as well as little-noticed public discussions, security professionals take a dimmer view of the cybersecurity complex. And the more I’ve looked at the hysteria surrounding Russia’s supposed hacking of our elections, the more I’ve come to see it as a case study of everything wrong and dangerous about the cyber-attribution business.

Fancy Bears, Cozy Bears—Oh My!

Take CrowdStrike, the hottest cybersecurity firm operating today. Based in Irvine, California, CrowdStrike was launched in 2012 by two veterans of the cyber-attribution business: George Kurtz and Dmitri Alperovitch. Both previously worked for McAfee, an antivirus-turned-massive-cybersecurity firm now partially owned by Intel. But Kurtz and Alperovitch saw a market opportunity for a new boutique type of cyber-defense outfit and decided to strike out on their own. They also brought on board Shawn Henry, a top FBI official who had been in charge of running the agency’s worldwide cyber investigations.

CrowdStrike positioned itself as a next-generation full-service cybersecurity firm. Company officials argued that cybersecurity was no longer just about defense—there was too much data and too many ways of getting at it to protect everything all the time. You had to know your attacker. “Knowing their capabilities, objectives, and the way they go about executing on them is the missing piece of the puzzle in today’s defensive security technologies,” wrote CrowdStrike cofounder George Kurtz. “By identifying the adversary . . . we can hit them where it counts.”

CrowdStrike hit the big time in 2015 with a $100 million infusion from Google Capital (now Capital G), Google’s first-ever investment in a cybersecurity company. It was good timing, because CrowdStrike was about to be catapulted into the front ranks of cyber-threat assessors. Sometime in April or May, CrowdStrike got a call from the Democratic National Committee to investigate a possible intrusion into their servers. The company’s investigators worked with surprising efficiency. As one DNC insider explained to the New York Times, the company was able to make a definite attribution within a day. There was no doubt, CrowdStrike told its DNC clients—the Russian government did it.

The results of CrowdStrike’s investigation were first broken by the Washington Post and then followed up in greater detail by CrowdStrike itself. In a post entitled “Bears in the Midst,” Dmitri Alperovitch attributed the hack to two distinct and very nefarious “Russian espionage” groups: Cozy Bear and Fancy Bear, among the most sophisticated cyber-operators CrowdStrike had ever come across. “In fact, our team considers them some of the best adversaries out of all the numerous nation-state, criminal and hacktivist/terrorist groups we encounter on a daily basis,” he wrote. “Their tradecraft is superb, operational security second to none and the extensive usage of ‘living-off-the-land’ techniques enables them to easily bypass many security solutions they encounter.”

These cyberspooks were allegedly behind a string of recent attacks on American corporations and think tanks, as well as recent penetrations of the unclassified networks of the State Department, the White House, and the U.S. Joint Chiefs of Staff. According to CrowdStrike, Cozy Bear was most likely the FSB, while Fancy Bear was linked to the “GRU, Russia’s premier military intelligence service.”

Here, the cyber experts were telling us, was conclusive evidence that both the FSB and the GRU targeted the central apparatus of the Democratic Party. CrowdStrike’s findings didn’t just cause a sensation; they carpet-bombed the news cycle. Reports that Vladimir Putin had tried to hack America’s democratic process raced around the world, making newspaper front pages and setting off nonstop cable news chatter.

The story got even hotter after a hacker who called himself Guccifer 2.0 suddenly appeared. He took credit for the DNC hack, called CrowdStrike’s investigation a fraud, and began leaking select documents pilfered from the DNC—including a spreadsheet containing names and addresses of the DNC’s biggest donors. The story finally started going nuclear when WikiLeaks somehow got hold of the entire DNC email archive and began dribbling the data out to the public.

A Terrible System

CrowdStrike stuck to its guns, and other cybersecurity firms and experts likewise clamored to confirm its findings: Russia was behind the attack. Most journalists took these security savants at their word, not bothering to investigate or vet their forensic methods or look at the way CrowdStrike arrived at its conclusions. And how could they? They were the experts. If you couldn’t trust CrowdStrike and company, who could you trust?

Unfortunately, there were big problems with CrowdStrike’s account. For one thing, the names of the two Russian espionage groups that CrowdStrike supposedly caught, Cozy Bear and Fancy Bear, were a fiction. Cozy Bear and Fancy Bear are what cyber monitors call “Advanced Persistent Threats,” or APTs. When investigators analyze an intrusion, they look at the tools and methods that the hackers used to get inside: source code, language settings, compiler times, time zones, IP settings, and so on. They then compare all these things against a database of previously recorded hacks that is shared among cyber professionals. If the attack fits an old profile, they assign it to an existing APT. If they find something new, they create a group and give it an official name (say, APT911) and then a cooler moniker they can throw around in their reports (say, TrumpDump).

CrowdStrike followed the protocols for existing APTs. Its investigation of DNC servers turned up two known threat actor groups: APT28 and APT29. Depending on the cybersecurity firm doing the analysis, these two APTs have been called by all sorts of names: Pawn Storm, Sofacy, Sednit, CozyCar, The Dukes, CozyDuke, Office Monkeys. Neither of them has ever been linked by any cybersecurity firm to the Russian government with certainty. Some firms have tried—most notably FireEye, CrowdStrike’s bigger and wealthier competitor. But FireEye’s evidence was ridiculously thin and inferential—in nearly any other industry, it would have been an embarrassment. Consider, for example, FireEye’s report on APT29:

We suspect the Russian government sponsors the group because of the organizations it targets and the data it steals. Additionally, APT29 appeared to cease operations on Russian holidays, and their work hours seem to align with the UTC +3 time zone, which contains cities such as Moscow and St. Petersburg.

Or consider FireEye’s report on APT28—which, among other things, attributes this attack group to a Russian intelligence unit active in Russia’s “invasion of Georgia,” an invasion that we know never took place.

They compile malware samples with Russian language settings during working hours consistent with the time zone of Russia’s major cities, including Moscow and St. Petersburg.While we don’t have pictures of a building, personas to reveal, or a government agency to name, what we do have is evidence of long-standing, focused operations that indicate a government sponsor—specifically, a government based in Moscow.

So, FireEye knows that these two APTs are run by the Russian government because a few language settings are in Russian and because of the telltale timestamps on the hackers’ activity? First off, what kind of hacker—especially a sophisticated Russian spy hacker—keeps to standard 9-to-5 working hours and observes official state holidays? Second, just what other locations are in Moscow’s time zone and full of Russians? Let’s see: Israel, Belarus, Estonia, Latvia, Moldova, Romania, Lithuania, Ukraine. If non-Russian-speaking countries are included (after all, language settings could easily be switched as a decoy tactic), that list grows longer still: Greece, Finland, Turkey, Jordan, Lebanon, Syria, Iraq, Saudi Arabia, Somalia, Yemen, Ethiopia, Kenya—the countries go on and on.

The flimsiness of this evidence didn’t stop CrowdStrike. Its analysts matched some of the tools and methods used in the DNC hack to APT28 and APT29, slapped a couple of Russian-sounding names with “bear” in them on their report, and claimed that the FSB and GRU did it. And most journalists covering this beat ate it all up without gagging.

“You don’t know there is anybody there. It’s not like it’s a club and everyone has a membership card that says Fancy Bear on it. It’s just a made-up name for a group of attacks and techniques and technical indicators associated with these attacks,” author and cybersecurity expert Jeffrey Carr told me. “There is rarely if ever any confirmation that these groups even exist or that the claim was proven as correct.”

Carr has been in the industry a long time. During the Russia-Georgia war, he led an open-source intelligence effort—backed by Palantir—in an attempt to attribute and understand the actors behind the cyberwar. I read his reports on the conflict back then and, even though I disagreed with some of his conclusions, I found his analysis nuanced and informative. His findings at the time tracked with those of the general cybersecurity industry and bent toward implicating the Russian government in the cyber attacks on Georgia. But these days Carr has broken with the cyberworld consensus:

Any time a cyber attack occurs nowadays you have cybersecurity companies looking back and seeing a historical record and seeing assignments on responsibility and attribution and they just keep plowing ahead. Whether they are right or wrong, nobody knows, and probably will never know. That’s how it works. It’s a terrible system.

This is forensic science in reverse: first you decide on the guilty party, then you find the evidence that confirms your belief.

Not for Attribution

Over time, bad evidence was piled on top of unsubstantiated claims and giant inductive leaps of logic to the point that, if you tried to figure out what was actually happening, you’d lose all sense of direction.

Matt Tait, a former GCHQ analyst and founder of Capital Alpha Security who blogs under the influential Twitter handle @pwnallthethings, found a Word document pilfered from the DNC and leaked by Guccifer 2.0. As he examined its data signatures, he discovered that it had been edited by Felix Edmundovich—a.k.a. Felix Dzerzhinsky, founder of the Cheka. To him, it was proof that Guccifer 2.0 was part of the same Russian intelligence operation. He really believed that the super sophisticated spy group trying to hide its Russian ties would register its Microsoft Word processor in the name of the leader of the infamously brutal Soviet security service.

Meanwhile, Thomas Rid, a cyber expert based in London, drew a straight line from the DNC hacks to the attempted hacking of the Germans and TV5 to attacks on Georgia and Baltic States—even though on closer inspection none of those efforts had been linked to the Russian government.

John Podesta’s Gmail account was hacked with a rudimentary spear-phishing attack that tricked him into entering his password with a fake Google login page. His emails ended up on WikiLeaks, too. All sorts of people linked this to Russian military intelligence, with no concrete evidence to speak of.

Sensing its moment had arrived, CrowdStrike went into frenetic PR mode. The company released a series of cyber-attribution reports illustrated with sexy communist robots wearing fur hats, using visual marketing techniques in lieu of solid evidence.

After Donald Trump won the presidency, all these outlandish claims were accepted as unassailable truth. The “hacking” of the 2016 presidential election was the ultimate damning conclusion that cybersecurity experts were now working backward from. Just as Georgia’s compromised net infrastructure provided conclusive proof of Russia’s concerted plan to invade Georgia, Trump’s improbably successful presidential run demonstrated that Russian subterfuge, rather than the collapse of American political institutions, had elected a dangerous outsider president.

Watching this new round of cyber-attribution hysteria, I got a queasy feeling. Even Dmitri Alperovitch’s name sounded familiar. I looked through my notes and remembered why: he was one of the minor online voices supporting the idea that the cyber attacks against Georgia were some kind of Russian plot. Back then, he was in charge of intelligence analysis at Secure Computing Corporation, a cybersecurity company that also made censorship tools used by countries like Saudi Arabia. He was now not only running his own big shop, but also playing a central role in a dangerous geopolitical game.

In other words, the election-hacking panic was a stateside extension of the battle first joined on the ISP frontiers of the Georgia-Russia war. Impressionable journalists and Democratic party hacks who ignore this background do so at their peril—and ours.

The Misguided ‘Vault 7’ Whodunit

By Jesselyn Radack

Source: Expose Facts

It is the leakiest of times in the Executive Branch. Last week, Wikileaks published a massive and, by all accounts genuine, trove of documents revealing that the CIA has been stockpiling, and lost control of, hacking tools it uses against targets. Particularly noteworthy were the revelations that the CIA developed a tool to hack Samsung TVs and turn them into recording devices and that the CIA worked to infiltrate both Apple and Google smart phone operating systems since it could not break encryption. No one in government has challenged the authenticity of the documents disclosed.

We do not know the identity of the source or sources, nor can we be 100% certain of his or her motivations. Wikileaks writes that the source sent a statement that policy questions “urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency” and that the source “wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyber-weapons.”

The FBI has already begun hunting down the source as part of a criminal leak investigation. Historically, the criminal justice system has been a particularly inept judge of who is a whistleblower. Moreover, it has allowed the use of the pernicious Espionage Act—an arcane law meant to go after spies—to go after whistleblowers who reveal information the public interest. My client, former NSA senior official Thomas Drake, was prosecuted under the Espionage Act, only to later be widely recognized as a whistleblower. There is no public interest defense to Espionage Act charges, and courts have ruled that a whistleblower’s motive, however salutary, is irrelevant to determining guilt.

The Intelligence Community is an equally bad judge of who is a whistleblower, and has a vested interest in giving no positive reinforcement to those who air its dirty laundry. The Intelligence Community reflexively claims that anyone who makes public secret information is not a whistleblower. Former NSA and CIA Director General Michael V. Hayden speculated that the recent leaks are to be blamed on young millennials harboring some disrespect for the venerable intelligence agencies responsible for mass surveillance and torture. Not only is his speculation speculative, but it’s proven wrong by the fact that whistleblowers who go to the press span the generational spectrum from Pentagon Papers whistleblower Daniel Ellsberg to mid-career and senior level public servants like CIA torture whistleblower John Kiriakou and NSA whistleblower Thomas Drake to early-career millennials like Army whistleblower Chelsea Manning and NSA whistleblower Edward Snowden. The lawbreaker does not get to decide who is a whistleblower.

Not all leaks of information are whistleblowing, and the word “whistleblower” is a loaded term, so whether or not the Vault 7 source conceives of him or herself as a whistleblower is not a particularly pertinent inquiry. The label “whistleblower” does not convey some mythical power or goodness, or some “moral narcissism,” a term used to describe me when I blew the whistle. Rather, whether an action is whistleblowing depends on whether or not the information disclosed is in the public interest and reveals fraud, waste, abuse, illegality or dangers to public health and safety. Even if some of the information revealed does not qualify, it should be remembered that whistleblowers are often faulted with being over- or under-inclusive with their disclosures. Again, it is the quality of the information, not the quantity, nor the character of the source.

Already, the information in the Vault 7 documents revealed that the Intelligence Community has misled the American people. In the wake of Snowden’s revelations, the Intelligence Community committed to avoid the stockpiling of technological vulnerabilities, publicly claiming that its bias was toward “disclosing them” so as to better protect everyone’s privacy. However, the Vault 7 documents reveal just the opposite: not only has the CIA been stockpiling exploits, it has been aggressively working to undermine our Internet security. Even assuming the CIA is using its hacking tools against the right targets, a pause-worthy presumption given the agency’s checkered history, the CIA has empowered the rest of the hacker world and foreign adversaries by hoarding vulnerabilities, and thereby undermined the privacy rights of all Americans and millions of innocent people around the world. Democracy depends on an informed citizenry, and journalistic sources—whether they call themselves whistleblowers or not—are a critical component when the government uses national security as justification to keep so much of its activities hidden from public view.

As we learn more about the Vault 7 source and the disclosures, our focus should be on the substance of the disclosures. Historically, the government’s reflexive instinct is to shoot the messenger, pathologize the whistleblower, and drill down on his or her motives, while the transparency community holds its breath that he or she will turn out to be pure as the driven snow. But that’s all deflection from plumbing the much more difficult questions, which are: Should the CIA be allowed to conduct these activities, and should it be doing so in secret without any public oversight?

These are questions we would not even be asking without the Vault 7 source.

Let’s Give the CIA the Credit It Deserves

By Norman Solomon

Source: OpEdNews.com

For months now, our country has endured the tacit denigration of American ingenuity. Countless statements — from elected officials, activist groups, journalists and many others — have ignored our nation’s superb blend of dazzling high-tech capacities and statecraft mendacities.

Fortunately, this week the news about release of illuminating CIA documents by WikiLeaks has begun to give adequate credit where due. And not a moment too soon. For way too long, Russia has been credited with prodigious hacking and undermining of democracy in the United States.

Many Americans have overlooked the U.S. government’s fantastic hacking achievements. This is most unfair and disrespectful to the dedicated men and women of intelligence services like the CIA and NSA. Far from the limelight, they’ve been working diligently to undermine democracy not just overseas but also here at home.

Today, the massive new trove of CIA documents can help to put things in perspective. Maybe now people will grasp that our nation’s undermining of democracy is home-grown and self-actualized. It’s an insult to the ingenious capacities of the United States of America to think that we can’t do it ourselves.

Contrary to all the public relations work that U.S. intelligence agencies have generously done for them, the Russians don’t even rank as peripheral to the obstacles and prospects for American democracy. Rest assured, throughout the long history of the United States, we haven’t needed foreigners to get the job done.

In our current era, can Vladimir Putin take any credit for purging huge numbers of African Americans, Latinos and other minority citizens from the voter rolls? Of course not.

Did Putin create and maintain the barriers that prevented many low-income people from voting on November 8? Only in his dreams.

Can the Kremlin hold a candle to the corporate-owned cable TV channels that gave Donald Trump umpteen free hours of uninterrupted air time for speeches at his campaign rallies? Absolutely not.

Could any Russian operation claim more than a tiny sliver of impact compared to the handiwork of FBI Director James Comey as he boosted Donald Trump’s prospects with a pair of gratuitous announcements about a gratuitously re-opened probe of Hillary Clinton’s emails during the last days of the 2016 campaign? No way.

Is Putin anything but a miniscule lightweight in any efforts to manipulate the U.S. electorate compared to “dark money” American billionaires like the Koch brothers? Give us a break.

And how about the Fourth Amendment of the U.S. Constitution? The Kremlin can only marvel at the way that the CIA, the NSA and the bipartisan leadership in Washington have shredded the Fourth Amendment while claiming to uphold it.

To sum up: The CIA’s efforts to tout Russia add up to jaw-dropping false modesty! The humility of “deep state” leaders in Langley is truly awesome.

Let’s get a grip. Overwhelmingly, the achievements of thwarting democracy in America have been do-it-yourself operations. It’s about time that we give adequate credit to the forces perpetuating this country’s self-inflicted wounds to American democracy.

To loosely paraphrase the beloved comic-strip character Pogo, when the subject is grievous damage to democracy at home, “We have met the ingenuity and it is U.S.” But we’re having a terrible time recognizing ourselves.

Vault 7: CIA Hacking Tools Revealed

Source: WikiLeaks

Press Release

Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named “Vault 7” by WikiLeaks, it is the largest ever publication of confidential documents on the agency.

The first full part of the series, “Year Zero”, comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA’s Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election.

Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

“Year Zero” introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.

Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA). The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force — its own substantial fleet of hackers. The agency’s hacking division freed it from having to disclose its often controversial operations to the NSA (its primary bureaucratic rival) in order to draw on the NSA’s hacking capacities.

By the end of 2016, the CIA’s hacking division, which formally falls under the agency’s Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other “weaponized” malware. Such is the scale of the CIA’s undertaking that by 2016, its hackers had utilized more code than that used to run Facebook. The CIA had created, in effect, its “own NSA” with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.

In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.

Julian Assange, WikiLeaks editor stated that “There is an extreme proliferation risk in the development of cyber ‘weapons’. Comparisons can be drawn between the uncontrolled proliferation of such ‘weapons’, which results from the inability to contain them combined with their high market value, and the global arms trade. But the significance of “Year Zero” goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective.”

Wikileaks has carefully reviewed the “Year Zero” disclosure and published substantive CIA documentation while avoiding the distribution of ‘armed’ cyberweapons until a consensus emerges on the technical and political nature of the CIA’s program and how such ‘weapons’ should analyzed, disarmed and published.

Wikileaks has also decided to redact and anonymise some identifying information in “Year Zero” for in depth analysis. These redactions include ten of thousands of CIA targets and attack machines throughout Latin America, Europe and the United States. While we are aware of the imperfect results of any approach chosen, we remain committed to our publishing model and note that the quantity of published pages in “Vault 7” part one (“Year Zero”) already eclipses the total number of pages published over the first three years of the Edward Snowden NSA leaks.

 

Analysis

CIA malware targets iPhone, Android, smart TVs

CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA’s DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details).

The EDG is responsible for the development, testing and operational support of all backdoors, exploits, malicious payloads, trojans, viruses and any other kind of malware used by the CIA in its covert operations world-wide.

The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell’s 1984, but “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.

The attack against Samsung smart TVs was developed in cooperation with the United Kingdom’s MI5/BTSS. After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.

As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.

The CIA’s Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones. Infected phones can be instructed to send the CIA the user’s geolocation, audio and text communications as well as covertly activate the phone’s camera and microphone.

Despite iPhone’s minority share (14.5%) of the global smart phone market in 2016, a specialized unit in the CIA’s Mobile Development Branch produces malware to infest, control and exfiltrate data from iPhones and other Apple products running iOS, such as iPads. CIA’s arsenal includes numerous local and remote “zero days” developed by CIA or obtained from GCHQ, NSA, FBI or purchased from cyber arms contractors such as Baitshop. The disproportionate focus on iOS may be explained by the popularity of the iPhone among social, political, diplomatic and business elites.

A similar unit targets Google’s Android which is used to run the majority of the world’s smart phones (~85%) including Samsung, HTC and Sony. 1.15 billion Android powered phones were sold last year. “Year Zero” shows that as of 2016 the CIA had 24 “weaponized” Android “zero days” which it has developed itself and obtained from GCHQ, NSA and cyber arms contractors.

These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the “smart” phones that they run on and collecting audio and message traffic before encryption is applied.

 

CIA malware targets Windows, OSx, Linux, routers

The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized “zero days”, air gap jumping viruses such as “Hammer Drill” which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( “Brutal Kangaroo”) and to keep its malware infestations going.

Many of these infection efforts are pulled together by the CIA’s Automated Implant Branch (AIB), which has developed several attack systems for automated infestation and control of CIA malware, such as “Assassin” and “Medusa”.

Attacks against Internet infrastructure and webservers are developed by the CIA’s Network Devices Branch (NDB).

The CIA has developed automated multi-platform malware attack and control systems covering Windows, Mac OS X, Solaris, Linux and more, such as EDB’s “HIVE” and the related “Cutthroat” and “Swindle” tools, which are described in the examples section below.

 

CIA ‘hoarded’ vulnerabilities (“zero days”)

In the wake of Edward Snowden’s leaks about the NSA, the U.S. technology industry secured a commitment from the Obama administration that the executive would disclose on an ongoing basis — rather than hoard — serious vulnerabilities, exploits, bugs or “zero days” to Apple, Google, Microsoft, and other US-based manufacturers.

Serious vulnerabilities not disclosed to the manufacturers places huge swathes of the population and critical infrastructure at risk to foreign intelligence or cyber criminals who independently discover or hear rumors of the vulnerability. If the CIA can discover such vulnerabilities so can others.

The U.S. government’s commitment to the Vulnerabilities Equities Process came after significant lobbying by US technology companies, who risk losing their share of the global market over real and perceived hidden vulnerabilities. The government stated that it would disclose all pervasive vulnerabilities discovered after 2010 on an ongoing basis.

“Year Zero” documents show that the CIA breached the Obama administration’s commitments. Many of the vulnerabilities used in the CIA’s cyber arsenal are pervasive and some may already have been found by rival intelligence agencies or cyber criminals.

As an example, specific CIA malware revealed in “Year Zero” is able to penetrate, infest and control both the Android phone and iPhone software that runs or has run presidential Twitter accounts. The CIA attacks this software by using undisclosed security vulnerabilities (“zero days”) possessed by the CIA but if the CIA can hack these phones then so can everyone else who has obtained or discovered the vulnerability. As long as the CIA keeps these vulnerabilities concealed from Apple and Google (who make the phones) they will not be fixed, and the phones will remain hackable.

The same vulnerabilities exist for the population at large, including the U.S. Cabinet, Congress, top CEOs, system administrators, security officers and engineers. By hiding these security flaws from manufacturers like Apple and Google the CIA ensures that it can hack everyone &mdsh; at the expense of leaving everyone hackable.

 

‘Cyberwar’ programs are a serious proliferation risk

Cyber ‘weapons’ are not possible to keep under effective control.

While nuclear proliferation has been restrained by the enormous costs and visible infrastructure involved in assembling enough fissile material to produce a critical nuclear mass, cyber ‘weapons’, once developed, are very hard to retain.

Cyber ‘weapons’ are in fact just computer programs which can be pirated like any other. Since they are entirely comprised of information they can be copied quickly with no marginal cost.

Securing such ‘weapons’ is particularly difficult since the same people who develop and use them have the skills to exfiltrate copies without leaving traces — sometimes by using the very same ‘weapons’ against the organizations that contain them. There are substantial price incentives for government hackers and consultants to obtain copies since there is a global “vulnerability market” that will pay hundreds of thousands to millions of dollars for copies of such ‘weapons’. Similarly, contractors and companies who obtain such ‘weapons’ sometimes use them for their own purposes, obtaining advantage over their competitors in selling ‘hacking’ services.

Over the last three years the United States intelligence sector, which consists of government agencies such as the CIA and NSA and their contractors, such as Booz Allan Hamilton, has been subject to unprecedented series of data exfiltrations by its own workers.

A number of intelligence community members not yet publicly named have been arrested or subject to federal criminal investigations in separate incidents.

Most visibly, on February 8, 2017 a U.S. federal grand jury indicted Harold T. Martin III with 20 counts of mishandling classified information. The Department of Justice alleged that it seized some 50,000 gigabytes of information from Harold T. Martin III that he had obtained from classified programs at NSA and CIA, including the source code for numerous hacking tools.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by peer states, cyber mafia and teenage hackers alike.

 

U.S. Consulate in Frankfurt is a covert CIA hacker base

In addition to its operations in Langley, Virginia the CIA also uses the U.S. consulate in Frankfurt as a covert base for its hackers covering Europe, the Middle East and Africa.

CIA hackers operating out of the Frankfurt consulate ( “Center for Cyber Intelligence Europe” or CCIE) are given diplomatic (“black”) passports and State Department cover. The instructions for incoming CIA hackers make Germany’s counter-intelligence efforts appear inconsequential: “Breeze through German Customs because you have your cover-for-action story down pat, and all they did was stamp your passport”

Your Cover Story (for this trip)
Q: Why are you here?
A: Supporting technical consultations at the Consulate.

Two earlier WikiLeaks publications give further detail on CIA approaches to customs and secondary screening procedures.

Once in Frankfurt CIA hackers can travel without further border checks to the 25 European countries that are part of the Shengen open border area — including France, Italy and Switzerland.

A number of the CIA’s electronic attack methods are designed for physical proximity. These attack methods are able to penetrate high security networks that are disconnected from the internet, such as police record database. In these cases, a CIA officer, agent or allied intelligence officer acting under instructions, physically infiltrates the targeted workplace. The attacker is provided with a USB containing malware developed for the CIA for this purpose, which is inserted into the targeted computer. The attacker then infects and exfiltrates data to removable media. For example, the CIA attack system Fine Dining, provides 24 decoy applications for CIA spies to use. To witnesses, the spy appears to be running a program showing videos (e.g VLC), presenting slides (Prezi), playing a computer game (Breakout2, 2048) or even running a fake virus scanner (Kaspersky, McAfee, Sophos). But while the decoy application is on the screen, the underlaying system is automatically infected and ransacked.

 

How the CIA dramatically increased proliferation risks

In what is surely one of the most astounding intelligence own goals in living memory, the CIA structured its classification regime such that for the most market valuable part of “Vault 7” — the CIA’s weaponized malware (implants + zero days), Listening Posts (LP), and Command and Control (C2) systems — the agency has little legal recourse.

The CIA made these systems unclassified.

Why the CIA chose to make its cyberarsenal unclassified reveals how concepts developed for military use do not easily crossover to the ‘battlefield’ of cyber ‘war’.

To attack its targets, the CIA usually requires that its implants communicate with their control programs over the internet. If CIA implants, Command & Control and Listening Post software were classified, then CIA officers could be prosecuted or dismissed for violating rules that prohibit placing classified information onto the Internet. Consequently the CIA has secretly made most of its cyber spying/war code unclassified. The U.S. government is not able to assert copyright either, due to restrictions in the U.S. Constitution. This means that cyber ‘arms’ manufactures and computer hackers can freely “pirate” these ‘weapons’ if they are obtained. The CIA has primarily had to rely on obfuscation to protect its malware secrets.

Conventional weapons such as missiles may be fired at the enemy (i.e into an unsecured area). Proximity to or impact with the target detonates the ordnance including its classified parts. Hence military personnel do not violate classification rules by firing ordnance with classified parts. Ordnance will likely explode. If it does not, that is not the operator’s intent.

Over the last decade U.S. hacking operations have been increasingly dressed up in military jargon to tap into Department of Defense funding streams. For instance, attempted “malware injections” (commercial jargon) or “implant drops” (NSA jargon) are being called “fires” as if a weapon was being fired. However the analogy is questionable.

Unlike bullets, bombs or missiles, most CIA malware is designed to live for days or even years after it has reached its ‘target’. CIA malware does not “explode on impact” but rather permanently infests its target. In order to infect target’s device, copies of the malware must be placed on the target’s devices, giving physical possession of the malware to the target. To exfiltrate data back to the CIA or to await further instructions the malware must communicate with CIA Command & Control (C2) systems placed on internet connected servers. But such servers are typically not approved to hold classified information, so CIA command and control systems are also made unclassified.

A successful ‘attack’ on a target’s computer system is more like a series of complex stock maneuvers in a hostile take-over bid or the careful planting of rumors in order to gain control over an organization’s leadership rather than the firing of a weapons system. If there is a military analogy to be made, the infestation of a target is perhaps akin to the execution of a whole series of military maneuvers against the target’s territory including observation, infiltration, occupation and exploitation.

 

Evading forensics and anti-virus

A series of standards lay out CIA malware infestation patterns which are likely to assist forensic crime scene investigators as well as Apple, Microsoft, Google, Samsung, Nokia, Blackberry, Siemens and anti-virus companies attribute and defend against attacks.

“Tradecraft DO’s and DON’Ts” contains CIA rules on how its malware should be written to avoid fingerprints implicating the “CIA, US government, or its witting partner companies” in “forensic review”. Similar secret standards cover the use of encryption to hide CIA hacker and malware communication (pdf), describing targets & exfiltrated data (pdf) as well as executing payloads (pdf) and persisting (pdf) in the target’s machines over time.

CIA hackers developed successful attacks against most well known anti-virus programs. These are documented in AV defeats, Personal Security Products, Detecting and defeating PSPs and PSP/Debugger/RE Avoidance. For example, Comodo was defeated by CIA malware placing itself in the Window’s “Recycle Bin”. While Comodo 6.x has a “Gaping Hole of DOOM”.

CIA hackers discussed what the NSA’s “Equation Group” hackers did wrong and how the CIA’s malware makers could avoid similar exposure.

Examples

The CIA’s Engineering Development Group (EDG) management system contains around 500 different projects (only some of which are documented by “Year Zero”) each with their own sub-projects, malware and hacker tools.

The majority of these projects relate to tools that are used for penetration, infestation (“implanting”), control, and exfiltration.

Another branch of development focuses on the development and operation of Listening Posts (LP) and Command and Control (C2) systems used to communicate with and control CIA implants; special projects are used to target specific hardware from routers to smart TVs.

Some example projects are described below, but see the table of contents for the full list of projects described by WikiLeaks’ “Year Zero”.

 

UMBRAGE

The CIA’s hand crafted hacking techniques pose a problem for the agency. Each technique it has created forms a “fingerprint” that can be used by forensic investigators to attribute multiple different attacks to the same entity.

This is analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible. As soon one murder in the set is solved then the other murders also find likely attribution.

The CIA’s Remote Devices Branch‘s UMBRAGE group collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.

With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from.

UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.

 

Fine Dining

Fine Dining comes with a standardized questionnaire i.e menu that CIA case officers fill out. The questionnaire is used by the agency’s OSB (Operational Support Branch) to transform the requests of case officers into technical requirements for hacking attacks (typically “exfiltrating” information from computer systems) for specific operations. The questionnaire allows the OSB to identify how to adapt existing tools for the operation, and communicate this to CIA malware configuration staff. The OSB functions as the interface between CIA operational staff and the relevant technical support staff.

Among the list of possible targets of the collection are ‘Asset’, ‘Liason Asset’, ‘System Administrator’, ‘Foreign Information Operations’, ‘Foreign Intelligence Agencies’ and ‘Foreign Government Entities’. Notably absent is any reference to extremists or transnational criminals. The ‘Case Officer’ is also asked to specify the environment of the target like the type of computer, operating system used, Internet connectivity and installed anti-virus utilities (PSPs) as well as a list of file types to be exfiltrated like Office documents, audio, video, images or custom file types. The ‘menu’ also asks for information if recurring access to the target is possible and how long unobserved access to the computer can be maintained. This information is used by the CIA’s ‘JQJIMPROVISE’ software (see below) to configure a set of CIA malware suited to the specific needs of an operation.

 

Improvise (JQJIMPROVISE)

‘Improvise’ is a toolset for configuration, post-processing, payload setup and execution vector selection for survey/exfiltration tools supporting all major operating systems like Windows (Bartender), MacOS (JukeBox) and Linux (DanceFloor). Its configuration utilities like Margarita allows the NOC (Network Operation Center) to customize tools based on requirements from ‘Fine Dining’ questionairies.

HIVE

HIVE is a multi-platform CIA malware suite and its associated control software. The project provides customizable implants for Windows, Solaris, MikroTik (used in internet routers) and Linux platforms and a Listening Post (LP)/Command and Control (C2) infrastructure to communicate with these implants.

The implants are configured to communicate via HTTPS with the webserver of a cover domain; each operation utilizing these implants has a separate cover domain and the infrastructure can handle any number of cover domains.

Each cover domain resolves to an IP address that is located at a commercial VPS (Virtual Private Server) provider. The public-facing server forwards all incoming traffic via a VPN to a ‘Blot’ server that handles actual connection requests from clients. It is setup for optional SSL client authentication: if a client sends a valid client certificate (only implants can do that), the connection is forwarded to the ‘Honeycomb’ toolserver that communicates with the implant; if a valid certificate is missing (which is the case if someone tries to open the cover domain website by accident), the traffic is forwarded to a cover server that delivers an unsuspicious looking website.

The Honeycomb toolserver receives exfiltrated information from the implant; an operator can also task the implant to execute jobs on the target computer, so the toolserver acts as a C2 (command and control) server for the implant.

Similar functionality (though limited to Windows) is provided by the RickBobby project.

See the classified user and developer guides for HIVE.

Frequently Asked Questions

Why now?

WikiLeaks published as soon as its verification and analysis were ready.

In Febuary the Trump administration has issued an Executive Order calling for a “Cyberwar” review to be prepared within 30 days.

While the review increases the timeliness and relevance of the publication it did not play a role in setting the publication date.

Redactions

Names, email addresses and external IP addresses have been redacted in the released pages (70,875 redactions in total) until further analysis is complete.

  1. Over-redaction: Some items may have been redacted that are not employees, contractors, targets or otherwise related to the agency, but are, for example, authors of documentation for otherwise public projects that are used by the agency.
  2. Identity vs. person: the redacted names are replaced by user IDs (numbers) to allow readers to assign multiple pages to a single author. Given the redaction process used a single person may be represented by more than one assigned identifier but no identifier refers to more than one real person.
  3. Archive attachments (zip, tar.gz, …) are replaced with a PDF listing all the file names in the archive. As the archive content is assessed it may be made available; until then the archive is redacted.
  4. Attachments with other binary content are replaced by a hex dump of the content to prevent accidental invocation of binaries that may have been infected with weaponized CIA malware. As the content is assessed it may be made available; until then the content is redacted.
  5. The tens of thousands of routable IP addresses references (including more than 22 thousand within the United States) that correspond to possible targets, CIA covert listening post servers, intermediary and test systems, are redacted for further exclusive investigation.
  6. Binary files of non-public origin are only available as dumps to prevent accidental invocation of CIA malware infected binaries.

Organizational Chart

The organizational chart corresponds to the material published by WikiLeaks so far.

Since the organizational structure of the CIA below the level of Directorates is not public, the placement of the EDG and its branches within the org chart of the agency is reconstructed from information contained in the documents released so far. It is intended to be used as a rough outline of the internal organization; please be aware that the reconstructed org chart is incomplete and that internal reorganizations occur frequently.

Wiki pages

“Year Zero” contains 7818 web pages with 943 attachments from the internal development groupware. The software used for this purpose is called Confluence, a proprietary software from Atlassian. Webpages in this system (like in Wikipedia) have a version history that can provide interesting insights on how a document evolved over time; the 7818 documents include these page histories for 1136 latest versions.

The order of named pages within each level is determined by date (oldest first). Page content is not present if it was originally dynamically created by the Confluence software (as indicated on the re-constructed page).

What time period is covered?

The years 2013 to 2016. The sort order of the pages within each level is determined by date (oldest first).

WikiLeaks has obtained the CIA’s creation/last modification date for each page but these do not yet appear for technical reasons. Usually the date can be discerned or approximated from the content and the page order. If it is critical to know the exact time/date contact WikiLeaks.

What is “Vault 7”

“Vault 7” is a substantial collection of material about CIA activities obtained by WikiLeaks.

When was each part of “Vault 7” obtained?

Part one was obtained recently and covers through 2016. Details on the other parts will be available at the time of publication.

Is each part of “Vault 7” from a different source?

Details on the other parts will be available at the time of publication.

What is the total size of “Vault 7”?

The series is the largest intelligence publication in history.

How did WikiLeaks obtain each part of “Vault 7”?

Sources trust WikiLeaks to not reveal information that might help identify them.

Isn’t WikiLeaks worried that the CIA will act against its staff to stop the series?

No. That would be certainly counter-productive.

Has WikiLeaks already ‘mined’ all the best stories?

No. WikiLeaks has intentionally not written up hundreds of impactful stories to encourage others to find them and so create expertise in the area for subsequent parts in the series. They’re there. Look. Those who demonstrate journalistic excellence may be considered for early access to future parts.

Won’t other journalists find all the best stories before me?

Unlikely. There are very considerably more stories than there are journalists or academics who are in a position to write them.