Monday, March 20, 2017

Wikileaks CIA dump reveals how the Deep State can hack databases and make it SEEM like the Russians did it





 
Let me explain something.  There is almost zero motive for the Russians to be hacking except for military technology.  There is ample political motive for the CIA and only China when it comes to foreign players for both commercial and military advantage.  China is driven for selective commercial advantage and this has been seriously damaging over the past two decades.  That may now be abating because the playing field is a lot leveler.
 
For Russia to deploy assets on a political agenda makes scant sense, not least because it is almost certain to backfire.  No one stays bought or loyal.  so why bother?
 
That really leaves us with the CIA and the so called Deep State trying so hard to manage internal political outcomes. Thus this blast of disclosure fully confirms the origins of the false story line regarding the Russian hacking.
 
Any actual contact with Russians reported was most certainly completely innocent and never a concern to national security.  Unless you believe a patriot will suddenly become overwhelmed with desire to betray his country when meeting an important Russian.  I am sorry, but it does not work that way. 


.
Wikileaks CIA dump reveals how the Deep State can hack databases and make it SEEM like the Russians did it

 
http://www.naturalnews.com/2017-03-08-wikileaks-cia-dump-reveals-how-the-deep-state-can-hack-databases-and-make-it-seem-like-the-russians-did-it.html
 
(Natural News) Questions surrounding the latest revelations by Wikileaks that the CIA has developed the capability to hack into any smart TV, phone or other “Internet of Things” devices continue to swirl, but one thing perhaps inadvertently revealed in the whistleblower site’s press release announcing the data dump is that the agency also has the capability to mask itself when hacking.
 
Think about that for a moment. Using encryption and other software hacked/stolen from foreign entities, including Russia, CIA hackers can make it appear as though another country was responsible for the hacking.
 
That’s an incredible revelation. And knowing that could go a long way towards explaining just who may have hacked the Democratic National Committee, Democratic candidate Hillary Clinton’s campaign, and the emails of John Podesta.
 
I’ll explain, but first, some background.
 
In a statement to the press and the public, Wikileaks provided great insight into the treasure trove of information it had been given by a source within the intelligence community who believes, apparently, that the CIA’s immense spying powers should be subject to public discussion and democratic controls.
Included in the statement was this passage:
 
The CIA’s hand crafted hacking techniques pose a problem for the agency. Each technique it has created forms a “fingerprint” that can be used by forensic investigators to attribute multiple different attacks to the same entity.

The CIA’s Remote Devices Branch‘s UMBRAGE group collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.
With UMBRAGE and related projects, the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from.
 
So in other words, in order to disguise themselves, CIA hackers often use malware stolen from other countries to make it look like they did it, and not the U.S. spy agency.
 
Enter the DNC and Clinton.
 
I’ve always said it did not make sense for Russia to prefer Trump over Clinton, as we’ve been lead to believe. Clinton had not only helped Moscow obtain 20 percent of all strategic U.S. uranium deposits, but she was on record as supporting Obama era policies that would have further weakened U.S. national security while helping Russia and its proxy state, Iran, become stronger. Trump, on the other hand, has publicly opposed the Iran deal and, while he’s said he wants better relations with Russia, is vehemently against continuing Obama-era foreign policies. 
 
 
Plus, there is this: Clinton knowingly exposed some of our most classified secrets through her selfish and stupid use of a private email server, so she could conduct Clinton Foundation fundraising, among other things, in private and away from public records laws. We know that her server was hacked; we know that classified data was stolen – by Russia, most assuredly, but also by China, Iran, North Korea and other adversaries. Clinton, then, would have been a huge liability to our security had she been elected president. Talk about Trump being a stooge of Russian President Vladimir Putin, he had so much dirt on Clinton it would have been like the Kremlin’s satellite office was the Oval Office.
 
 
While there are certainly elements within the Deep State who are #nevertrumpers, it’s ludicrous to think there aren’t elements within the same Deep State who are #neverhillary types and who did NOT want to see her win. Given what we now know about the CIA’s ability to mask its own hackers by shrouding them in the cloak of a foreign government’s malware, it is not beyond the realm of possibility to surmise that Deep State operatives within our own intel community using Russian malware hacked and then released compromising information on Clinton, her campaign, and the DNC.
 
And remember, Wikileaks editor Julian Assange has said repeatedly that the Russians did not do the DNC/Clinton campaign hacking.
 
All of this merits further investigation, of course, but it’s understandable that a) the CIA would want to be able to mask its hacking/electronic probing of foreign national assets; and b) there are elements within the Deep State who are pulling for Trump to succeed.
 
J.D. Heyes is a senior writer for NaturalNews.com and NewsTarget.com, as well as editor of The National Sentinel.
 
Sources:
TheNationalSentinel.com
Wikileaks.org
NaturalNews.com

No comments:

Gadget

This content is not yet available over encrypted connections.