Several years ago, the ACLU asked if the government is spying on our borders little knowing that this spying is actually wholesale, everywhere, whenever they wish to spy on citizens. This is in violation of the fourth amendment: The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.
NY Times discusses the Wikileaks Vault 7 news: This ‘paper’ which is really fly paper, has comments to its infantile article about Vault 7. The NYT staff picks what they imagine are the very best comments. And the ones here are typical of the choices of the staff. Namely, they all blame Trump for any bad stuff and ignore the implications of what the CIA and NSA are really doing to citizens that is UNCONSTITUTIONAL.
And here is the top NYT choice of ‘reader’s comments:
karma2013 New Jersey 5 hours ago:
If anyone still has doubts that Wikileaks and the Russians are working together to undermine and destabilize our government institutions, erode public confidence in our government, and generally wreak havoc in our country, this latest document dump should erase all doubt. We are under attack by an adversarial nation, with a President here at the helm who seems not to take any of this seriously.
Spy agencies spy, this should come as no shock — this is how they infiltrate potential terrorist plots against America and keep us safe. We are less safe today thanks to Wikileaks and Assange’s unholy alliance with Putin..
Christopher C. Lovett Topeka, Kansas 5 hours ago:
Just another example that Julian Assange is nothing more than willful tool of Putin and the FSB.
There are lots of these sorts of silly comments from good Soviet Citizens. But then, this is the NYT which has weeded out anyone with any sense of reality. I am banned there, for example. Below is a particularly pathetic remark from a lady who can’t imagine the CIA spying on citizens!
Gail Florida 3 hours ago:
A few commenters are lamenting intrusions on Americans privacy and celebrating the release of this information. Maybe I missed it, but nothing in this article implies the C.I.A. are using these tools to spy on U.S. citizens within American border. Spies spy. That in itself is not news. That this information is now available on the Internet is sad and disturbing. Who benefits from the release of the C.I.A.’s methods? Certainly not U.S. citizens.
Wow. ‘Who benefits? Certainly not US citizens,’ shows the utter pathetic destruction of our political rights in this country after half a century of Bilderberg gang rule. They put out pure propaganda and have convinced liberals that we don’t need any stinking ‘free speech’ or ‘right to privacy’. Nope.
I leafed through the mindless remarks which mainly said, ‘Whatever the DNC and Obama do is OK with us idiots’ to see how dumbed down the left has grown. They are now mental midgets.
A brief look into the recent past, just last year…The Fourth Amendment is Dead after New Supreme Court Ruling and the liberals are blaming the right Republicans for this!
Strieff, was illegally detained and searched. However, during the illegal detention, a valid arrest warrant was found. Having already been illegally detained, a search uncovered drugs inside his vehicle. The courts played hot potato with this one, as different decisions flopped around the Utah court circuit. Initially, it was found that the valid search warrant justified the illegal search. The reasoning was unclear, but the court must have been using an “inevitable discovery” mentality when coming to that conclusion. An appeals court overturned the decision and the conviction against Strieff was thrown out. This case then made its way to the U.S. Supreme Court, where the justices’ voted 5-3 to reinstate the conviction against Strieff.
One argument for the reinstatement was a concept called the Attenuation Exception to the Exclusionary Rule. This Attenuation Exception, which is nothing new and extraordinarily vague, states that evidence obtained illegally can be used if the “connection between the misconduct and the discovery of the evidence is sufficiently weak.”
The Supreme Court did have three dissenting Justices. Justices Sotomayor, Ruth Bader Ginsberg and Elena Kagan all cast dissenting votes, recognizing this travesty of justice for what it is. The dissenting opinion was sharp and dug deep into the heart of the issue at hand; the erosion of the fourth amendment.
So…why aren’t all the liberals pissed as all hell that the CIA has destroyed our fourth amendment protections? Eh? I knew they would leap out and squeal that Obama didn’t do this and if he did, it was to protect Americans, nothing wrong with it! Like drone warfare assassination machines, the downside is immense even if the goal is ‘tolerable’.
Eventually, when babies are born, they will be implanted with devices that will blow their brains up whenever an operator decides it is time to terminate them.
A series of standards lay out CIA malware infestation patterns which are likely to assist forensic crime scene investigators as well as Apple, Microsoft, Google, Samsung, Nokia, Blackberry, Siemens and anti-virus companies attribute and defend against attacks.
“Tradecraft DO’s and DON’Ts” contains CIA rules on how its malware should be written to avoid fingerprints implicating the “CIA, US government, or its witting partner companies” in “forensic review”. Similar secret standards cover the use of encryption to hide CIA hacker and malware communication (pdf), describing targets & exfiltrated data (pdf) as well as executing payloads (pdf) and persisting (pdf) in the target’s machines over time.
CIA hackers developed successful attacks against most well known anti-virus programs. These are documented in AV defeats, Personal Security Products, Detecting and defeating PSPs and PSP/Debugger/RE Avoidance. For example, Comodo was defeated by CIA malware placing itself in the Window’s “Recycle Bin”. While Comodo 6.x has a “Gaping Hole of DOOM”.
This technology is being used overseas but does anyone doubt for even one second, that it isn’t being used here and in particular, in Trump Tower and the White House? Of course, it is.
Wikileaks explains what they have discovered…The U.S. government is not able to assert copyright either, due to restrictions in the U.S. Constitution. This means that cyber ‘arms’ manufactures and computer hackers can freely “pirate” these ‘weapons’ if they are obtained. The CIA has primarily had to rely on obfuscation to protect its malware secrets.
Well, an army of interested online kiddies are probing relentlessly to peer into this murk. And they will be severely punished if they succeed and can be traced. I will note here after MONTHS of howling that Russians hacked the Podesta computer files and not one smidgin of evidence has appeared.
Putin is very angry about this smear campaign. So is our President. Liberals think doing crimes like this is OK so long as a Republican is in the White House. The silly geese cannot understand that it is a two pronged weapon.
Conventional weapons such as missiles may be fired at the enemy (i.e into an unsecured area). Proximity to or impact with the target detonates the ordnance including its classified parts. Hence military personnel do not violate classification rules by firing ordnance with classified parts. Ordnance will likely explode. If it does not, that is not the operator’s intent.
I found this odd paragraph above while leafing through the Wikileaks site. I am assuming, ‘classified parts’ of weapons do very oddball and dangerous things the users of the weapons don’t expect.
The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized “zero days”, air gap jumping viruses such as “Hammer Drill” which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( “Brutal Kangaroo”) and to keep its malware infestations going.
Great, the CIA is full of a bunch of very annoying hackers! Well, now I know who to blame when I have trouble with my computer! The government has spied on me several times in my life, the most recent being under President Bush Sr., I think.
Maybe Bush Jr. did, too, wouldn’t surprise me at all. On with the Wikileaks article:
Many of these infection efforts are pulled together by the CIA’s Automated Implant Branch (AIB), which has developed several attack systems for automated infestation and control of CIA malware, such as “Assassin” and “Medusa”.
Attacks against Internet infrastructure and webservers are developed by the CIA’s Network Devices Branch (NDB).
The CIA has developed automated multi-platform malware attack and control systems covering Windows, Mac OS X, Solaris, Linux and more, such as EDB’s “HIVE” and the related “Cutthroat” and “Swindle” tools, which are described in the examples section below.
So, this is where all the junior hackers ended up!
In the wake of Edward Snowden’s leaks about the NSA, the U.S. technology industry secured a commitment from the Obama administration that the executive would disclose on an ongoing basis — rather than hoard — serious vulnerabilities, exploits, bugs or “zero days” to Apple, Google, Microsoft, and other US-based manufacturers.
So, they secretly told Apple, Google, Microsoft and others, information about weaknesses that they had no interest in exploiting.
Serious vulnerabilities not disclosed to the manufacturers places huge swathes of the population and critical infrastructure at risk to foreign intelligence or cyber criminals who independently discover or hear rumors of the vulnerability. If the CIA can discover such vulnerabilities so can others.
Yes, all those Russians! Wikileaks kindly tells the US government, they are vulnerable.
The U.S. government’s commitment to the Vulnerabilities Equities Process came after significant lobbying by US technology companies, who risk losing their share of the global market over real and perceived hidden vulnerabilities. The government stated that it would disclose all pervasive vulnerabilities discovered after 2010 on an ongoing basis.
The Chinese government does this. That is, spy on anyone they wish. Anyone thinking the CIA doesn’t do this is crazy. Of course, they do this. All this bounces off of the mangled storyline about how the CIA rigged things so they could get permission to spy on PRESIDENT TRUMP.
“Year Zero” documents show that the CIA breached the Obama administration’s commitments. Many of the vulnerabilities used in the CIA’s cyber arsenal are pervasive and some may already have been found by rival intelligence agencies or cyber criminals.
As an example, specific CIA malware revealed in “Year Zero” is able to penetrate, infest and control both the Android phone and iPhone software that runs or has run presidential Twitter accounts. The CIA attacks this software by using undisclosed security vulnerabilities (“zero days”) possessed by the CIA but if the CIA can hack these phones then so can everyone else who has obtained or discovered the vulnerability. As long as the CIA keeps these vulnerabilities concealed from Apple and Google (who make the phones) they will not be fixed, and the phones will remain hackable.
If the CIA hacked President Trump’s iPhones and other systems, this is a gross violation of their power.
The same vulnerabilities exist for the population at large, including the U.S. Cabinet, Congress, top CEOs, system administrators, security officers and engineers. By hiding these security flaws from manufacturers like Apple and Google the CIA ensures that it can hack everyone else at the expense of leaving everyone hackable.
They are doing this in Germany, too. Even as foreign mobs of angry Muslim males infiltrate Europe and attack, they are spying on the rest of us.
In addition to its operations in Langley, Virginia the CIA also uses the U.S. consulate in Frankfurt as a covert base for its hackers covering Europe, the Middle East and Africa.
CIA hackers operating out of the Frankfurt consulate ( “Center for Cyber Intelligence Europe” or CCIE) are given diplomatic (“black”) passports and State Department cover. The instructions for incoming CIA hackers make Germany’s counter-intelligence efforts appear inconsequential: “Breeze through German Customs because you have your cover-for-action story down pat, and all they did was stamp your passport”
As someone who crossed borders illegally, it isn’t all that very hard, the only one that I failed to cross illegally back in my wild youth was the border of East Germany. And that was only because I stupidly boasted in public, I was going to do this.
Once in Frankfurt CIA hackers can travel without further border checks to the 25 European countries that are part of the Shengen open border area — including France, Italy and Switzerland.
Yes, the Bilderberg gang finds spying extra easy if there are open borders. Doing this in Saudi Arabia, North Korea, etc. is much harder.
A number of the CIA’s electronic attack methods are designed for physical proximity. These attack methods are able to penetrate high security networks that are disconnected from the internet, such as police record database. In these cases, a CIA officer, agent or allied intelligence officer acting under instructions, physically infiltrates the targeted workplace. The attacker is provided with a USB containing malware developed for the CIA for this purpose, which is inserted into the targeted computer. The attacker then infects and exfiltrates data to removable media. For example, the CIA attack system Fine Dining, provides 24 decoy applications for CIA spies to use. To witnesses, the spy appears to be running a program showing videos (e.g VLC), presenting slides (Prezi), playing a computer game (Breakout2, 2048) or even running a fake virus scanner (Kaspersky, McAfee, Sophos). But while the decoy application is on the screen, the underlaying system is automatically infected and ransacked.
All these toys and this is what they are using to attack Trump right now.