Google+ Badge

Wednesday, March 15, 2017

A CIA Cyber False Flag

The CIA mass murderers are and have been completely out of control for decades, and must be decisively purged from top to bottom for democracy to survive in America and the world  

STRATEGIC CULTURE FOUNDATION
By Federico Pieraccini
03/13/2017

New revelations from Wikileaks’ 'Vault 7' leak shed a disturbing light on the safeguarding of privacy. Something already known and largely suspected has now become documented by Wikileaks. 


It seems evident that the CIA is now a state within a state, an entity out of control that has even arrived at the point of creating its own hacking network in order to avoid the scrutiny of the NSA and other agencies.

Reading the revelations contained in the documents released by WikiLeaks and adding them to those already presented in recent years by Snowden, it now seems evident that the technological aspect regarding espionage is a specialty in which the CIA, as far as we know, excels. 


Hardware and software vendors that are complicit -- most of which are American, British or Israeli -- give the CIA the opportunity to achieve informational full-spectrum dominance, relegating privacy to extinction. 

Such a convergence of power, money and technology entails major conflicts of interest, as can be seen in the case of Amazon AWS (Amazon's Cloud Service), cloud provider for the CIA, whose owner, Jeff Bezos, is also the owner of The Washington Post. 




It is a clear overlap of private interests that conflicts with the theoretical need to declare uncomfortable truths without the need to consider orders numbering in the millions of dollars from clients like the CIA.

While it is just one example, there are thousands more out there. The perverse interplay between media, spy agencies and politicians has compromised the very meaning of the much vaunted democracy of the land of the Stars and Stripes. The constant scandals that are beamed onto our screens now serve the sole purpose of advancing the deep interest of the Washington establishment. In geopolitical terms, it is now more than obvious that the deep state has committed all available means toward sabotaging any dialogue and d├ętente between the United States and Russia. In terms of news, the Wikileaks revelations shed light on the methods used by US intelligence agencies like the CIA to place blame on the Kremlin, or networks associated with it, for the hacking that occurred during the American elections.


Perhaps this is too generous a depiction of matters, given that the general public has yet to see any evidence of the hacking of the DNC servers. In addition to this, we know that the origin of Podesta’s email revelations stem from the loss of a smartphone and the low data-security measures employed by the chairman of Hillary Clinton’s presidential campaign. 


In general, when the 16 US spy agencies blamed Russia for the hacking of the elections, they were never specific in terms of forensic evidence. Simply put, the media, spies and politicians created false accusations based on the fact that Moscow, together with RT and other media (not directly linked to the Kremlin), finally enjoy a major presence in the mainstream media. The biggest problem for the Washington establishment lies in the revelation of news that is counterproductive to the interests of the deep state. RT, Sputnik, this site and many others have diligently covered and reported to the general public every development concerning the Podesta revelations or the hacking of the DNC.

Now what is revealed through Wikileaks’ publications in Vault 7 is the ability of a subsection of the CIA, known as Umbrage, to use malware, viruses, trojans and other cyber tools for their own geopolitical purposes. The CIA’s Umbrage collects, analyzes and then employs software created variously from foreign security agencies, cyber mafia, private companies, and hackers in general. These revelations become particularly relevant when we consider the consequences of these actions. The main example can be seen in the hacking of the DNC. For now, what we know is that the hacking - if it ever occurred - is of Russian origin. This does not mean at all that the Kremlin directed it. It could actually be very much the opposite, its responsibility falling into the category of a cyber false-flag. One thing is for sure: all 16 US intelligence agencies are of the view that “the Russians did it”. That said, the methods used to hack vulnerabilities cannot be revealed, so as to limit the spread of easily reusable exploits on systems, such as the one that hosted the DNC server. It is a great excuse for avoiding the revelation of any evidence at all.




So, with little information available, independent citizens are left with very little information on which to reliably form an opinion on what happened. There is no evidence, and no evidence will be provided to the media. For politicians and so-called mainstream journalists, this is an acceptable state of affairs. What we are left with instead is blind faith in the 16 spy agencies. The problem for them is that what WikiLeaks revealed with Vault 7 exposes a scenario that looks more likely than not: a cyber false-flag carried out by the Central Intelligence Agency using engineered malware and viruses made in Russia and hypothetically linking them back to hacking networks in Russia. 

In all likelihood, it looks like the Democrats’ server was hacked by the CIA with the clear objective of leaving Russian fingerprints and obvious traces to be picked up by other US agencies.




In this way, it becomes easier to explain the unique views of all 16 spy agencies. Thus, it is far more likely that the CIA intentionally left fake Russian fingerprints all over the DNC server, thereby misleading other intelligence agencies in promoting the narrative that Russia hacked the DNC server. Of course the objective was to create a false narrative that could immediately be picked up by the media, creating even more hysteria surrounding any rapprochement with Russia.

Diversification of Computer Systems

The revelations contained in the Wikileaks vault 7 (less than 1 % of the total data in Wikileaks’ possession has been released to date) have caused a stir, especially by exposing the astonishing complicity between hardware and software manufacturers, often intentionally creating backdoors in their products to allow access by the CIA and NSA. In today’s digital environment, all essential services rely on computer technology and connectivity. These revelations are yet more reason why countries targeted by Washington, like China, Russia, Iran and North Korea, should get rid of European and American products and invest in reducing technological dependence on American products in particular.




The People's Republic has already started down this track, with the replacement of many network devices with local vendors like Huawei in order to avoid the type of interference revealed by Snowden. Russia has been doing the same in terms of software, even laying the groundwork to launch of its own operating system, abandoning American and European systems. In North Korea, this idea was already put into practice years ago and is an excellent tool for deterrence for external interference. In more than one computer security conference, US experts have praised the capabilities of the DPRK to isolate its Internet network from the rest of the world, allowing them to have strong safety mechanisms. Often, the only access route to the DPRK systems are through the People's Republic of China, not the easiest way for the CIA or NSA to infiltrate a protected computer network.


An important aspect of the world in which we live today involves information security, something all nations have to deal with. At the moment, we still live in a world in which the realization of the danger and effect of hacking attacks are not apparent to many. On the other hand, militarily speaking, the diversification and rationalization of critical equipment in terms of networks and operability (smartphones, laptops, etc) has already produced strong growth in non-American and European manufacturers, with the aim of making their systems more secure.


This strengthening of technology also produces deleterious consequences, such as the need for intelligence agencies to be able to prevent the spread of data encryption so as to always enjoy access to any desired information. The birth of the Tor protocol, the deployment of Bitcoin, and apps that are more and more encrypted (although the WikiLeaks documents have shown that the collection of information takes place on the device before the information is encrypted) are all responses to an exponential increase in the invasion of privacy by federal or American government entities.

We live in a world that has an enormous dependence on the Internet and computer technology. The CIA over the years has focused on the ability to make sure vulnerable systems are exploited as well as seeking out major security flaws in consumer products without disclosing this to vendors, thereby taking advantage of these security gaps and leaving all consumers with a potential lack of security. Slowly, thanks to the work and courage of people like Snowden and Assange, the world is beginning to understand how important it is to keep personal data under control and prevent access to it by third parties, especially if they are state actors. In the case of national security, the issue is expanded exponentially by the need to protect key and vital infrastructure, considering how many critical services operate via the Internet and rely on computing devices.




The wars of the future will have a strong technological basis, and it is no coincidence that many armed forces, primarily the Russian and Chinese, have opted in recent years to training troops, and conducting operations, not completely relying on connectivity. No one can deny that in the event of a large-scale conflict, connectivity is far from guaranteed. One of the major goals of competing nations is to penetrate the military security systems of rival nations and be able to disarm the internal networks that operates major systems of defense and attack.

The Wikileaks revelations are yet another confirmation of how important it is to break the technological unipolar moment, if it may be dubbed this way, especially for nations targeted by the United States. Currently Washington dictates the technological capacities of the private and government sectors of Europe and America, steering their development, timing and methods to suit its own interests. It represents a clear disadvantage that the PRC and its allies will inevitably have to redress in the near future in order to achieve full security for its vital infrastructure.



This news bureau contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc.  We believe this constitutes a 'fair use' of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes.

Texas Politician Proposes Law To Fine Men $100 For Masturbating

Texas finally goes off the deep end, should be given back to Mexico  

THE INDEPENDENT
By Jon Sharman
03/13/2017

A Texas politician has filed legislation that would see men fined $100 (£82) for masturbating unless they are doing it in a sanctioned session at a hospital or clinic.


Farrar
Jessica Farrar, a Democrat, created the "Man's Right To Know Act" to highlight how women have been affected by targeted healthcare legislation in her state, particularly relating to abortion.

She said its rules — including a mandatory waiting period before a vasectomy procedure or receiving a prescription for Viagra, as well as a "medically-unnecessary digital rectal exam" — mirror "real TX laws and health care restrictions faced by TX women every #txlege session".


The headline stipulation would categorise ejaculation outside either a vagina or medical facility as an "act against an unborn child, and failing to preserve the sanctity of life".

Ms Farrar told mysanantonio.com: "A lot of people find the bill funny. What's not funny are the obstacles that Texas women face every day, that were placed there by legislatures making it very difficult for them to access healthcare."




Texas' House of Representatives is currently controlled by a Republican majority, and the state has some of the most restrictive abortion laws in the country due to its conservative Christianculture.

From 2011, women were made to undergo an invasive ultrasound scan at least 24 hours before they had an abortion, requiring at least two trips to a clinic. This is one of the measures Ms Farrar's bill parodies.

She told the site: "When a woman has to have a trans-vaginal ultrasound, it has nothing to do with her healthcare. One of the state's objectives is to guilt her into changing her mind."




The proposed law would also force the state to create pamphlets — mimicking those given to women seeking an abortion — filled with information about vasectomies, Viagra and colonosopies.

And it would allow doctors to "invoke their personal, moralistic, or religious beliefs in refusing to perform an elective vasectomy or prescribe Viagra".

It adds: "Masturbatory emissions created in health or medical facilities will be stored for the purposes of conception for a current or future wife."




Earlier this year one GOP state representative called for abortion to become a crime in Texas, arguing it would force women to be "more personally responsible" about sex.

Tony Tinderhold introduced the "Abolition Of Abortion In Texas Act" in an attempt to make it a criminal offence to have an abortion in the state at any point, regardless of whether a woman has conceived following rape or incest.

It is currently in the committee stage and, if successful, would mean women who have an abortion could be charged with murder.


After one state law that required doctors who perform abortions to have admitting privileges at a nearby hospital, and abortion clinics to have facilities similar to ambulatory surgical centres, was struck down by the Supreme Court, a study found its restrictions had already forced women to travel further for the procedure.

In Texas counties where the distance to the nearest clinic increased by 100 miles or more, there was a 50 per cent drop in the number of abortions taking place, the University of Texas' policy evaluation project found.


The number of clinics offering abortions in the state more than halved between 2013 and June 2016, when the law was struck down, from 41 to 17.

A spate of proposed laws targeting abortion across the US led Margaret Atwood, author of the classic dystopian novel The Handmaid's Tale, to speak out last month.


Spanking the monkey may soon land you in the can in Texas

She said concerns about women's rights under President Donald Trump had contributed to a resurgence in popularity for the book, which describes a repressive and highly stratified American society in which women are forced into domestic servitude and made to bear the children of the ruling class.

It followed a series of moves by conservative politicians to restrict access to abortions, as well as Vice President Mike Pence's attendance at the anti-abortion March For Life, for which Mr Trump also tweeted his "full support".


Texas now that land of shemale ball-crushers

Mr Pence told marchers in January: "This administration will work with Congress to end taxpayer funding of abortion and abortion providers. Life is winning again in America."



This news bureau contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc.  We believe this constitutes a 'fair use' of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes.

Sex Toy Espionage: Vibrator Maker To Pay $3 Million For Tracking Customer Usage

DEFCON scum should be impaled with their own products - modified with cameras and the results broadcast on You Tube: a disgusting, criminal act of privacy invasion and wireless transmitting of pornography that should be prosecuted    

RT
03/14/2017

A Canadian sex-toy manufacturer has agreed to pay US$3 million (CAD$4 million) to customers for collecting data relating to their sexual habits without their consent.


The settlement is the result of a class action lawsuit filed against Standard Innovation, the company behind the We-Vibe 4 Plus vibrator, last September in Illinois by a Chicago area plaintiff who claimed the company gathered data on customers, including app settings.

Standard Innovation will have to pay up to US$7400 to each customer who used the We-Vibe 4 Plus app, while those who purchased the sex toy but didn’t use the app will be entitled to US$148.


The bluetooth enabled vibrator allows the sex-toy to be controlled remotely and is described on its website as enabling couples to “connect in new, exciting ways — whether they’re in the same room or on a different continent. Push play.”

What was not advertised, however, was the fact that the Canadian company collected intimate personal data on customers without their knowledge. 




The collected data was sent back to Standard Innovation, informing the company about how often the devices were used and for how long, as well as the device’s temperature and vibration intensity.


The device was also vulnerable to hacking meaning that an unknown entity could remotely activate the device once within the bluetooth range. Security concerns about We-Vibe 4 were first revealed at the DEF CON hacking conference in Las Vegas last year.




At the conference, New Zealand based hackers ‘Goldfisk’ and ‘Follower’ argued that an unwanted takeover of the device could potentially result in a sexual assault.

"We are pleased to have reached a fair and reasonable settlement in this matter,” the company said in a statement to Fortune. “At Standard Innovation we take customer privacy and data security seriously. We have enhanced our privacy notice, increased app security, provided customers more choice in the data they share, and we continue to work with leading privacy and security experts to enhance the app."


Time to go back to the basics

Whether customers will be willing to consensually share their intimate data with the company in the future has yet to be determined.



This news bureau contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc.  We believe this constitutes a 'fair use' of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes.

-------------------------------------------------------------------------------------------------------------------

ANDREW KREIG: EXPERTS REJECT FIRE AS CAUSE FOR 9/11 WTC COLLAPSES

The real truth on 9/11 slowly continues to bleed out

 photo
Technical experts are mounting major challenges to official U.S. government accounts of how three World Trade Center skyscrapers collapsed in near-freefall after the 9/11 attacks 15 years ago.

Many researchers are focusing especially on the little-known collapse of

READ MORE >>

-------------------------------------------------------------------------------------------------------------------

The Geopolitics Of The United States, Part 1: The Inevitable Empire

The Empire and the inevitable fall of the Obama criminal regime

 photo
STRATFOR Editor’s Note: This installment on the United States, presented in two parts, is the 16th in a series of STRATFOR monographs on the geopolitics of countries influential in world affairs.

Like nearly all of the peoples of North and South America, most Americans are not originally from the territory that became the United States.

READ MORE >>

-------------------------------------------------------------------------------------------------------------------

Geopolitics Of The United States Part 2: American Identity And The Threats of Tomorrow

A look back at 2011 predictions for the future in order to put events of today into perspective

 photo capitalism_zpsah78uy5p.jpg
We have already discussed in the first part of this analysis how the American geography dooms whoever controls the territory to being a global power, but there are a number of other outcomes that shape what that power will be like. The first and most critical is the impact of that geography on the American mindset.

READ MORE >>

-------------------------------------------------------------------------------------------------------------------


By Robert S. Finnegan

This e-mail outlines and confirms the acts of espionage against Indonesia and Indonesians by Akiko Makino and the others involved both in Kobe University and in AI Lab at University of Airlangga, Surabaya; Bahasa Indonesia original follows English translation...

READ MORE >>

-------------------------------------------------------------------------------------------------------------------

UPDATED 01/07/2015 : New Analysis Challenges Tamiflu Efficacy; Hong Kong Corona Virus Outbreak

UPDATED 01/07/2015 : FOX NEWS CORPORATE PHARMA SHILL MEGAN KELLY AND FOX NEWS QUACK DOCTOR NOW PUSHING TAMIFLU FOR PREGNANT WOMEN AND CHILDREN;

 photo TAMIFLU_small_zpssojx6okt.jpg
THE 5TH ESTATE UNEQUIVOCALLY WARNS THE PUBLIC NOT TO TAKE OR GIVE THIS PROVEN DANGEROUS, INEFFECTIVE DRUG TO ANYONE

Obama criminals now resulting to biowarfare in quest to destroy Chinese and ASEAN economy; "novel virus substrain" points directly to a Kawaoka / Fouchier / Ernala-Ginting Kobe lab virus weaponized and genetically altered to specifically target and infect the Asian population: Ribavirin...

READ MORE >>

-------------------------------------------------------------------------------------------------------------------


 photo WHO02_zpsplmhtlpr.jpg
The 5th Estate has just purchased a library on H5N1 "Novel" virus pandemics, there are dozens of PDF and Exel documents we feel will assist you in saving lives following intentional releases of the H5N1 and now MERS viruses; we will begin by printing those that appear to be extremely relevant here: H5N1 Kobe-Kawaoka-Ernala series continues soon with more "Smoking Gun" e-mails from Teridah Ernala to The 5th Estate . . .

READ MORE >>

-------------------------------------------------------------------------------------------------------------------


By Robert S. Finnegan

On October 12, 2002 the Indonesian island of Bali experienced a terrorist attack that rocked the world. It was unquestionably well-coordinated and executed, the largest in the country's history.

READ MORE >>