Vault 7 Spy Systems: CIA Secrets Spy On All Citizens At Will

Several years ago, the ACLU asked if the government is spying on our borders little knowing that this spying is actually wholesale, everywhere, whenever they wish to spy on citizens.  This is in violation of the fourth amendment:  The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

 

NY Times discusses the Wikileaks Vault 7 news: This ‘paper’ which is really fly paper, has comments to its infantile article about Vault 7.  The NYT staff picks what they imagine are the very best comments.  And the ones here are typical of the choices of the staff.  Namely, they all blame Trump for any bad stuff and ignore the implications of what the CIA and NSA are really doing to citizens that is UNCONSTITUTIONAL.

 

And here is the top NYT choice of ‘reader’s comments:

karma2013 New Jersey 5 hours ago:
If anyone still has doubts that Wikileaks and the Russians are working together to undermine and destabilize our government institutions, erode public confidence in our government, and generally wreak havoc in our country, this latest document dump should erase all doubt. We are under attack by an adversarial nation, with a President here at the helm who seems not to take any of this seriously.

 

Spy agencies spy, this should come as no shock — this is how they infiltrate potential terrorist plots against America and keep us safe. We are less safe today thanks to Wikileaks and Assange’s unholy alliance with Putin..

 

Christopher C. Lovett Topeka, Kansas 5 hours ago:
Just another example that Julian Assange is nothing more than willful tool of Putin and the FSB.

 

There are lots of these sorts of silly comments from good Soviet Citizens.  But then, this is the NYT which has weeded out anyone with any sense of reality.  I am banned there, for example.  Below is a particularly pathetic remark from a lady who can’t imagine the CIA spying on citizens!

 

Gail Florida 3 hours ago:
A few commenters are lamenting intrusions on Americans privacy and celebrating the release of this information. Maybe I missed it, but nothing in this article implies the C.I.A. are using these tools to spy on U.S. citizens within American border. Spies spy. That in itself is not news. That this information is now available on the Internet is sad and disturbing. Who benefits from the release of the C.I.A.’s methods? Certainly not U.S. citizens.

 

Wow.  ‘Who benefits?  Certainly not US citizens,’ shows the utter pathetic destruction of our political rights in this country after half a century of Bilderberg gang rule.  They put out pure propaganda and have convinced liberals that we don’t need any stinking ‘free speech’ or ‘right to privacy’.  Nope.

 

I leafed through the mindless remarks which mainly said, ‘Whatever the DNC and Obama do is OK with us idiots’ to see how dumbed down the left has grown.  They are now mental midgets.

 

A brief look into the recent past, just last year…The Fourth Amendment is Dead after New Supreme Court Ruling and the liberals are blaming the right Republicans for this!

 

Strieff, was illegally detained and searched. However, during the illegal detention, a valid arrest warrant was found. Having already been illegally detained, a search uncovered drugs inside his vehicle. The courts played hot potato with this one, as different decisions flopped around the Utah court circuit. Initially, it was found that the valid search warrant justified the illegal search. The reasoning was unclear, but the court must have been using an “inevitable discovery” mentality when coming to that conclusion. An appeals court overturned the decision and the conviction against Strieff was thrown out. This case then made its way to the U.S. Supreme Court, where the justices’ voted 5-3 to reinstate the conviction against Strieff.

 

One argument for the reinstatement was a concept called the Attenuation Exception to the Exclusionary Rule. This Attenuation Exception, which is nothing new and extraordinarily vague, states that evidence obtained illegally can be used if the “connection between the misconduct and the discovery of the evidence is sufficiently weak.”

 

The Supreme Court did have three dissenting Justices. Justices Sotomayor, Ruth Bader Ginsberg and Elena Kagan all cast dissenting votes, recognizing this travesty of justice for what it is. The dissenting opinion was sharp and dug deep into the heart of the issue at hand; the erosion of the fourth amendment.

 

So…why aren’t all the liberals pissed as all hell that the CIA has destroyed our fourth amendment protections?  Eh?  I knew they would leap out and squeal that Obama didn’t do this and if he did, it was to protect Americans, nothing wrong with it!  Like drone warfare assassination machines, the downside is immense even if the goal is ‘tolerable’.

 

Eventually, when babies are born, they will be implanted with devices that will blow their brains up whenever an operator decides it is time to terminate them.

 

Now, back to Wikileaks as they explain how the computer hacking is used for warfare and spying…

 

A series of standards lay out CIA malware infestation patterns which are likely to assist forensic crime scene investigators as well as Apple, Microsoft, Google, Samsung, Nokia, Blackberry, Siemens and anti-virus companies attribute and defend against attacks.

 

“Tradecraft DO’s and DON’Ts” contains CIA rules on how its malware should be written to avoid fingerprints implicating the “CIA, US government, or its witting partner companies” in “forensic review”. Similar secret standards cover the use of encryption to hide CIA hacker and malware communication (pdf), describing targets & exfiltrated data (pdf) as well as executing payloads (pdf) and persisting (pdf) in the target’s machines over time.

 
CIA hackers developed successful attacks against most well known anti-virus programs. These are documented in AV defeats, Personal Security Products, Detecting and defeating PSPs and PSP/Debugger/RE Avoidance. For example, Comodo was defeated by CIA malware placing itself in the Window’s “Recycle Bin”. While Comodo 6.x has a “Gaping Hole of DOOM”.

 

This technology is being used overseas but does anyone doubt for even one second, that it isn’t being used here and in particular, in Trump Tower and the White House?  Of course, it is.

 

Wikileaks explains what they have discovered…The U.S. government is not able to assert copyright either, due to restrictions in the U.S. Constitution. This means that cyber ‘arms’ manufactures and computer hackers can freely “pirate” these ‘weapons’ if they are obtained. The CIA has primarily had to rely on obfuscation to protect its malware secrets.

 

Well, an army of interested online kiddies are probing relentlessly to peer into this murk.  And they will be severely punished if they succeed and can be traced.  I will note here after MONTHS of howling that Russians hacked the Podesta computer files and not one smidgin of evidence has appeared.

 

Putin is very angry about this smear campaign.  So is our President.  Liberals think doing crimes like this is OK so long as a Republican is in the White House.  The silly geese cannot understand that it is a two pronged weapon.

 

Conventional weapons such as missiles may be fired at the enemy (i.e into an unsecured area). Proximity to or impact with the target detonates the ordnance including its classified parts. Hence military personnel do not violate classification rules by firing ordnance with classified parts. Ordnance will likely explode. If it does not, that is not the operator’s intent.

 

I found this odd paragraph above while leafing through the Wikileaks site.  I am assuming, ‘classified parts’ of weapons do very oddball and dangerous things the users of the weapons don’t expect.

 

The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized “zero days”, air gap jumping viruses such as “Hammer Drill” which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( “Brutal Kangaroo”) and to keep its malware infestations going.

 

Great, the CIA is full of a bunch of very annoying hackers!  Well, now I know who to blame when I have trouble with my computer! The government has spied on me several times in my life, the most recent being under President Bush Sr., I think.

 

Maybe Bush Jr. did, too, wouldn’t surprise me at all. On with the Wikileaks article:

 

Many of these infection efforts are pulled together by the CIA’s Automated Implant Branch (AIB), which has developed several attack systems for automated infestation and control of CIA malware, such as “Assassin” and “Medusa”.

 

Attacks against Internet infrastructure and webservers are developed by the CIA’s Network Devices Branch (NDB).

 

The CIA has developed automated multi-platform malware attack and control systems covering Windows, Mac OS X, Solaris, Linux and more, such as EDB’s “HIVE” and the related “Cutthroat” and “Swindle” tools, which are described in the examples section below.

 

So, this is where all the junior hackers ended up!

 

In the wake of Edward Snowden’s leaks about the NSA, the U.S. technology industry secured a commitment from the Obama administration that the executive would disclose on an ongoing basis — rather than hoard — serious vulnerabilities, exploits, bugs or “zero days” to Apple, Google, Microsoft, and other US-based manufacturers.

 

So, they secretly told Apple, Google, Microsoft and others, information about weaknesses that they had no interest in exploiting.

 

Serious vulnerabilities not disclosed to the manufacturers places huge swathes of the population and critical infrastructure at risk to foreign intelligence or cyber criminals who independently discover or hear rumors of the vulnerability. If the CIA can discover such vulnerabilities so can others.

 

Yes, all those Russians!  Wikileaks kindly tells the US government, they are vulnerable.

 

The U.S. government’s commitment to the Vulnerabilities Equities Process came after significant lobbying by US technology companies, who risk losing their share of the global market over real and perceived hidden vulnerabilities. The government stated that it would disclose all pervasive vulnerabilities discovered after 2010 on an ongoing basis.

 

The Chinese government does this.  That is, spy on anyone they wish.  Anyone thinking the CIA doesn’t do this is crazy.  Of course, they do this.  All this bounces off of the mangled storyline about how the CIA rigged things so they could get permission to spy on PRESIDENT TRUMP.

 

“Year Zero” documents show that the CIA breached the Obama administration’s commitments. Many of the vulnerabilities used in the CIA’s cyber arsenal are pervasive and some may already have been found by rival intelligence agencies or cyber criminals.

 

As an example, specific CIA malware revealed in “Year Zero” is able to penetrate, infest and control both the Android phone and iPhone software that runs or has run presidential Twitter accounts. The CIA attacks this software by using undisclosed security vulnerabilities (“zero days”) possessed by the CIA but if the CIA can hack these phones then so can everyone else who has obtained or discovered the vulnerability. As long as the CIA keeps these vulnerabilities concealed from Apple and Google (who make the phones) they will not be fixed, and the phones will remain hackable.

 

If the CIA hacked President Trump’s iPhones and other systems, this is a gross violation of their power.

 

The same vulnerabilities exist for the population at large, including the U.S. Cabinet, Congress, top CEOs, system administrators, security officers and engineers. By hiding these security flaws from manufacturers like Apple and Google the CIA ensures that it can hack everyone else at the expense of leaving everyone hackable.

 

They are doing this in Germany, too.  Even as foreign mobs of angry Muslim males infiltrate Europe and attack, they are spying on the rest of us.

 

In addition to its operations in Langley, Virginia the CIA also uses the U.S. consulate in Frankfurt as a covert base for its hackers covering Europe, the Middle East and Africa.

 

CIA hackers operating out of the Frankfurt consulate ( “Center for Cyber Intelligence Europe” or CCIE) are given diplomatic (“black”) passports and State Department cover. The instructions for incoming CIA hackers make Germany’s counter-intelligence efforts appear inconsequential: “Breeze through German Customs because you have your cover-for-action story down pat, and all they did was stamp your passport”

 

As someone who crossed borders illegally, it isn’t all that very hard, the only one that I failed to cross illegally back in my wild youth was the border of East Germany.  And that was only because I stupidly boasted in public, I was going to do this.

 

Once in Frankfurt CIA hackers can travel without further border checks to the 25 European countries that are part of the Shengen open border area — including France, Italy and Switzerland.

 

Yes, the Bilderberg gang finds spying extra easy if there are open borders.  Doing this in Saudi Arabia, North Korea, etc. is much harder.

 

A number of the CIA’s electronic attack methods are designed for physical proximity. These attack methods are able to penetrate high security networks that are disconnected from the internet, such as police record database. In these cases, a CIA officer, agent or allied intelligence officer acting under instructions, physically infiltrates the targeted workplace. The attacker is provided with a USB containing malware developed for the CIA for this purpose, which is inserted into the targeted computer. The attacker then infects and exfiltrates data to removable media. For example, the CIA attack system Fine Dining, provides 24 decoy applications for CIA spies to use. To witnesses, the spy appears to be running a program showing videos (e.g VLC), presenting slides (Prezi), playing a computer game (Breakout2, 2048) or even running a fake virus scanner (Kaspersky, McAfee, Sophos). But while the decoy application is on the screen, the underlaying system is automatically infected and ransacked.

 

All these toys and this is what they are using to attack Trump right now.

13 Comments

Filed under .money matters

13 responses to “Vault 7 Spy Systems: CIA Secrets Spy On All Citizens At Will

  1. Jim R

    The modern spooks no longer need to cart a lot of cumbersome hardware into your building and clomp onto the phone lines with alligator clips like they did in the ’70s.

    They can simply take over your computer, phone, and whatever device is around. All sorts of appliances now contain microphones, and have network connections. Some even contain cameras..

    In the future, a luxury condo or hotel will resemble one of the 19th century. No electronics, no electricity. Buildings will be shielded with a lossy faraday cage (which would also discourage lightning by the way) to prevent any signals from getting in or out.

    (I say discourage because there is really no way to completely stop lightning from going wherever it wants)

    ΩΩΩ

    ELAINE: ALL five times I have been directly hit by lightning were indoors!

  2. JimmyJ

    The “Russia did it” meme is so far advanced this will get deflected like everything else. McCain is already sounding off that this is a hack not an inside leak.

    Excerpt: Asked if he thought Russia had any role in the CIA hack, McCain sarcastically responded: “No, never, never… somebody in the basement of his house smoking cigarettes in his underwear was responsible. I can’t say that [the Russians are responsible], but it’s clear that WikiLeaks has had a Russian connection,” he said.

    http://www.washingtonexaminer.com/mccain-more-steps-needed-to-stop-cia-hacking/article/2616705

    Maybe the folks that support Trump can now see how far advanced the corruption cancer is throughout the system and the radiation therapy will have to be all out and very soon. Let’s hope the radiation therapy prescribed isn’t WWIII,

  3. emsnews

    McCain is insane.

  4. Jim R

    Lou, it wouldn’t shock me.

    Might it shock the American dindu?

    (Both Bushes and WJ Clinton are war criminals, too, by the way.)

  5. Jim R

    As is HR Clinton.

    But these people are almost never locked up. I’d say it won’t happen.

  6. Petruchio

    @#3 Elaine: And the senile old geezers of Arizona who continue to re-elect that warmongering a##hole McCain are even more insane! It’s a mystery to me how people can be so isolated from reality that they continue to ignore McCain’s true record. And worst of all, these Senior Citizen voters ALWAYS vote.

  7. tio

    Accountability is so yesterday.

  8. emsnews

    What is infinitely funny is, like with the Podesta leaks, they are now claiming this new information about CIA spying on us is…no big deal! HAHAHA.

  9. Lou

    new information about CIA spying on us is…no big deal! —

    Do most households get a government check?
    Many people [getting $ from gov] may have a different view of ‘Uncle Nanny’
    than I do.

  10. Lou

    Elaine, what about A Weiners lap top?
    Any word on what was found there?

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s