Saturday, November 04, 2017

CIA Pushing To Control Cyberspace

U.S. taxpayer funded: Americans must force Congress to audit CIA, NSA, cut funding, prosecute war criminals including CNN fake news warmongers  

By Valery Kulikov

For a quite a while now, Western media sources have been engaged in a sort of a competition, striving to publish as many articles about so-called Russian hackers as they possibly could, while complaining about the alleged damage those unseen hackers inflicted upon the US-style democracy.

Just recently, The Washington Post would feature a propaganda article about Russia’s push towards the control of cyberspace. 

And what else could one expect from a media source that is being sponsored by the CIA, if various reports across the net are to be trusted. A casual reader would be bewildered by the sheer amount of article published by this media source that are aimed at triggering anti-Russian hysteria in the US. 

It’s curious that the above mentioned opinion peace mentions the CIA a total of 19 times, while forgetting to mention that the sole owner of the Washington Post received a total of 600 million dollars from the CIA. Under these circumstances, you won’t find a lot of facts on the pages of this propaganda mouthpiece, there’s speculations, quotes of unnamed “informed sources” and that’s pretty much it.

With the use of such pocket journals Washington has been trying to motivate Europe into starting a sort of a crusade against Russia, even though this crusade would directly contradict Brussels’ best interests. However, it’s pretty clear that the main purpose of this latest information war is an attempt to hide the extent of control that the CIA exercises over the web.

The CIA was founded some 70 years ago, and ever since 2001 it has been enjoying political and budgetary advantages over its competitor – the NSA, due to the fact that it hasn’t just created the notorious fleet of unmanned murderous vehicles, but has also assembled an impressive army of hackers. Over the course of its history, the CIA has been engaged in political assassinations, coups d’etats, drug trafficking, arms smuggling, bribery and other criminal acts. 

If anyone still wonders is there any real conspiracies in this world, he should seek no further as all of the activities that the CIA has been engaged in are conspiracies against the people of the United States and the peoples of the whole world. 

That’s the position of Norwegian, that would describe the CIA as a criminal organization, since pretty much everything that this agency does is illegal. Therefore, the US government and pro-government media that are connected with this agency are complied to uphold utmost secrecy about its operations. While Western media sources would describe the US as a bastion of peace and democracy, the agency that is supposed to protect this bastion is running all sorts of criminal organizations around the globe. Those sources are pretty manipulative in their attempts to whitewash such “operations”, since they are being sponsored by the same people that pay the CIA.

That’s why the Americans will never see pictures of disfigured bodies of Iraqi, Afghan, Libyan and Syrian children who were murdered in broad daylight by American mercenaries or a wide variety of illegal munitions dropped from US military planes to advance CIA’s secret operations.

Similarly, American media sources keep squiet about the role that the CIA played in establishing total control over the cyberspace. Let’s recall a handful of CIA’s internal documents that were released due to the efforts of the WikiLeaks team. The so-called Vault 7 papers that were released last March contain a total of 8761 files about Langley’s Center for Cyber Intelligence that is engaged in hacking computers, cell phones and TV sets. 

These reports demonstrate the true scale and direction of the global hacker program of the CIA, and the arsenal of malicious programs and zero day exploits that have been weaponized against a wide range of American and European users, including those who happen to be Apple’s, Google’s, and Microsoft’s faithful customers. It’s all started with the publication titled Dark Matter, describing CIA’s tactics of hacking and infecting Apple’s devices. 

Then WikiLeaks would publish additional 676 files stolen from the CIA, the so-called Marble dossier, revealing its extensive capabilities to remain anonymous, while designing its malicious programs in such a way for them to be trackable “back” to Russia or China.

This series of revelations was followed by a release of 27 documents on the CIA Grasshopper program, which is aimed at creating malicious spy-ware “updates” for the Windows operating system.

Finally, almost two months after initial reports, WikiLeaks would release classified documents about the so-called operation Athena, which aims at creating malware that would download itself on a system to copy all of its files remotely. The malware is capable of infecting various versions of Windows and was developed by the CIA in cooperation with Siege Technologies, which is registered in New Hampshire.

WikiLeaks has also published reports on CIA’s Dumbo project, which, through total control of cyberspace, can turn off cameras remotely and damage any records that could compromise infiltration activities of the Physical Access Group. Dumbo can recognize, monitor and manage systems operated by Windows, while detecing cams and microphones connected by both wire, Bluetooth, or WiFi. 

A CIA operator can now stop a recording or delete records, leaving no trace that the CIA could be engaged in some sort of illegal activities.

In the WikiLeaks documents of the CIA, there is also a lot of documents about the ability of this intelligence agency to organize hacker attacks to impersonate other groups. In particular, as part of the Umbrage program, the CIA collects and maintains an extensive library of offensive technologies “stolen” from programs written in other countries, including the Russian Federation. With the help of this project, the CIA can not only diversify its attacks, but also attribute them to others, leaving the “fingerprints” of those groups from whom the CIA stole their offensive capabilities. It would also use foreign languages in the coding deliberately as it has been revelead by in the detailed analysis of one of such impersonation attacks that was exposed by the BAE Systems blog.

There’s more that enough documents on the web now to state that the CIA is trying to abuse the cyberspace in every way possible. So maybe it’s time to paraphrase the article mentioned at the very beginning of this piece: “It’s not Russia, but the CIA is gaining control over cyberspace. We should all be worried.”

This news bureau contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc.  We believe this constitutes a 'fair use' of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes.

WAYNE MADSEN: The Toxic Mix Of AFRICOM And Human Terrain Operations

U.S. has no business or reason to deploy military personnel on failed continent  

By Wayne Madsen

Pentagon and White House officials have been circumspect about the reason behind the deaths of four US Green Beret troops in southwestern Niger, said to be on a “routine training mission.”

There is a very good reason why the Trump administration is doing its very best to cover up the reason for an ambush that killed Staff Sgt. Bryan C. Black, Staff Sgt. Jeremiah W. Johnson, Sgt. La David Johnson, and Staff Sgt. Dustin M. Wright in the TillabĂ©ri region of Niger. The Pentagon first hauled out the usual bogeyman of “Al Qaeda in the Islamic Maghreb” (AQIM) as the culprit. When that notion was debunked, the Trump White House, in coordination with Secretary of Defense James Mattis, created a new Islamist organization out of whole cloth.

What the Pentagon pulled out of its hat was the Islamic State in the Sahel, conveniently abbreviated as "ISIS." With the Islamic State of Iraq and Syria, the original ISIS, on the run in the Middle East, the Pentagon saw an opportunity to give the terrorist group a rebirth in West Africa, while also blaming it for the deaths of the US servicemen. But the actual reason for the obfuscation from the Oval Office was to avoid having one of the Pentagon’s most fraudulent and discredited programs making it back on to the front pages of the newspapers.

There is every indication that what transpired near the village of Tongo Tongo in Niger was the result of a decision by the Trump administration to bolster the costly and dubious Pentagon program called the Human Terrain System (HTS). Using anthropologists, sociologists, and linguists possessing higher degrees, the Pentagon created HTS to conduct ethnographic surveys of conflict zones in order to take advantage of inter-tribal conflicts to achieve quick military dominance over a targeted region. 

HTS has been charged with exacerbating tensions between various indigenous groups and tribes to create intelligence "opportunities" for the US military. In 2012, the Pentagon announced that HTS would be extended from South Asia and the Middle East to Latin America and Africa.

The Army supposedly ended HTS in 2014. However, in March 2016, the Army announced that the program was not only still in operation but was expanding. The Pentagon deceived the Congress into believing HTS was dead, but the program was simply given a new name, the Global Cultural Knowledge Network (GCKN). The new HTS has been particularly active in the Niger Delta of Nigeria and western Cameroon, where secessionists are trying to break free from Nigeria and Cameroon, respectively. AFRICOM and HTS appear to be a neo-colonialist enforcement operation whose primary mission is to protect US oil and mining companies in Africa.

The clue of HTS involvement in the Niger attack by irregulars armed with machine guns and grenade launchers came in a statement by Joint Chiefs of Staff Chairman Marine General Joseph Dunford. In revealing that the joint US-Nigerien patrol, consisting of 12 US Army and 30 Nigerien army personnel, was attacked by 40 armed men shortly after meeting with village leaders in Tongo Tongo. Under the HTS program, it is routine for US military personnel deployed to a targeted country to meet with village leaders and tribal elders. US military teams are often accompanied by US civilian sociocultural personnel, called Human Terrain Teams, for "intelligence support" purposes.

After questions were raised about the presence of the Green Berets in Tongo Tongo, the Pentagon indicated that someone in Tongo Tongo must have tipped off nearby AQIM guerrillas that an American military unit was in the village. After it was determined that AQIM was nowhere near Tongo Tongo, a village that does not even have roads, the Pentagon quickly created a decoy in the Islamic State in the Sahel (ISIS). Rather than walking into an Islamist terrorist group’s trap, it is more likely that the US Africa Command (AFRICOM) failed to adequately brief the Niger government and military on a mission that involved the HTS.

U.S. military activity a “recruiting tool” for terror groups across West Africa

It is quite possible that the U.S-Nigerien patrol ran into armed opposition from smugglers who ply a region that includes Niger, nearby Mali, Burkina Faso, Benin, and Nigeria. In one of the poorest places on the planet, illicit commerce is the only way for some tribes to survive. These include the Zarma people who populate the Tillabéri region of Niger and neighboring Mali and Benin. The Zarma once rented their cattle, sheep, goats and dromedaries out to Tuareg and Fulani tribesmen. Today, it is more lucrative for the people of the Sahel to deal in weapons -- including those looted from Libyan leader Muammar Qaddafi's massive arms warehouses after the overthrow of his government -- and drugs. Add smuggling to a Tuareg secessionist rebellion in northern Niger and Mali, uranium mining in Niger, and increased oil exploration in Niger, Chad, and northern Nigeria and a perfect toxic brew emerges. It is in this environment that AFRICOM is now wading with a discredited HTS playbook.

The Tuaregs who populate northern Niger and have been agitating for independence have long memories about what they consider to be US meddling in their affairs. In 1995, Niger's Tuareg leader Mano Dayak was killed in a suspicious plane crash in Niger. The Cessna 337 carrying Dayak and his Tuareg delegation crashed shortly after taking off from Agadez airport. Dayak was engaged in peace negotiations with the central Niger government and he and his party were on their way to Niamey for peace talks. 

An autonomous Tuareg government threatened to undermine the plans of Exxon and other US oil and mineral companies to have a free hand in exploiting oil and mineral resources around Lake Chad. Some Tuareg leaders suspected CIA involvement in the crash that killed their leader. Ironically, the same runway from which Dayak took off has been improved and expanded in order to handle Pentagon and CIA drone missions over the Sahel region. Google’s problematic search engine, when queried for Dayak and the plane crash is hampered by the fact that Agadez airport was re-named Mano Dayak International Airport. Therefore, search results provide flight and airline information but little on the suspicious plane crash.

With little congressional oversight, there will be more incidents like that which saw the deaths of four Green Berets and 30 Nigerien military personnel. In Afghanistan and Iraq, where US military commanders like General David Petraeus placed a high degree of confidence in HTS, the program resulted in massive numbers of civilian deaths. Rather than report on the failures of HTS, the media, including The New York Times and the New Yorker, gave the program high praise. Today, the media is falling for the "ISIS did it" canard when many corporate reporters had to locate Niger on a map when the first reports emerged about the ambush on the Green Berets.

HTS predecessor programs used in Southeast Asia, the Pentagon's Civil Operations and Rural Development Support (CORDS) and the CIA’s counterpart, the Phoenix Program, were responsible for some of the worst genocide carried out by the United States during the Vietnam War. Before Phoenix, the CIA dabbled in anthropological operations in Latin America with Project CAMELOT.

In 2007, the Network of Concerned Anthropologists called HTS "dangerous and reckless," as well as an unethical use of anthropologists by the Pentagon. Professor David Price of Saint Martin's University, a leading critic of HTS, called the program a neo-colonial "mission to occupy and destroy opposition to US goals and objectives." Professor Hugh Gusterson of George Mason University said HTS was akin to "asking an anthropologist to gather intelligence that may lead to someone's death or imprisonment . . . it's like asking an Army doctor to kill a wounded insurgent." Members of the American Anthropological Association (AAA) have, as they did with the CIA's projects CAMELOT and PHOENIX, condemned HTS for its reliance on what the AAA has described as “mercenary anthropology."

Kumbaya Time... now secured for the duration

While the Army and its special operations forces, including the Green Berets, continue to value the program, it has met strong opposition from the Marine Corps. In 2009, one Marine Corps officer, Major Ben Connable, wrote that HTS undermined the Army's "cultural competence." The ambush in Niger appears to be more and more the result of "cultural incompetence."

Wayne Madsen

Wayne Madsen
Investigative journalist, author and syndicated columnist, Madsen has over twenty years experience in security issues. 

As a U.S. Naval Officer, he managed one of the first computer security programs for the U.S. Navy. Madsen has been a frequent political and national security commentator on Fox News and has also appeared on ABC, NBC, CBS, PBS, and MSNBC. He has been invited to testify as a witness before the US House of Representatives, the UN Criminal Tribunal for Rwanda, and an terrorism investigation panel of the French government. A member of the Society of Professional Journalists (SPJ) and the National Press Club, Madsen is based and reports from Washington, D.C.



The real truth on 9/11 slowly continues to bleed out

Technical experts are mounting major challenges to official U.S. government accounts of how three World Trade Center skyscrapers collapsed in near-freefall after the 9/11 attacks 15 years ago.

Many researchers are focusing especially on the little-known collapse of



The Geopolitics Of The United States, Part 1: The Inevitable Empire

The Empire and the inevitable fall of the Obama criminal regime

STRATFOR Editor’s Note: This installment on the United States, presented in two parts, is the 16th in a series of STRATFOR monographs on the geopolitics of countries influential in world affairs.

Like nearly all of the peoples of North and South America, most Americans are not originally from the territory that became the United States.



Geopolitics Of The United States Part 2: American Identity And The Threats of Tomorrow

A look back at 2011 predictions for the future in order to put events of today into perspective

 photo capitalism_zpsah78uy5p.jpg
We have already discussed in the first part of this analysis how the American geography dooms whoever controls the territory to being a global power, but there are a number of other outcomes that shape what that power will be like. The first and most critical is the impact of that geography on the American mindset.



By Robert S. Finnegan

This e-mail outlines and confirms the acts of espionage against Indonesia and Indonesians by Akiko Makino and the others involved both in Kobe University and in AI Lab at University of Airlangga, Surabaya; Bahasa Indonesia original follows English translation...



UPDATED 01/07/2015 : New Analysis Challenges Tamiflu Efficacy; Hong Kong Corona Virus Outbreak


 photo TAMIFLU_small_zpssojx6okt.jpg

Obama criminals now resulting to biowarfare in quest to destroy Chinese and ASEAN economy; "novel virus substrain" points directly to a Kawaoka / Fouchier / Ernala-Ginting Kobe lab virus weaponized and genetically altered to specifically target and infect the Asian population: Ribavirin...



 photo WHO02_zpsplmhtlpr.jpg
The 5th Estate has just purchased a library on H5N1 "Novel" virus pandemics, there are dozens of PDF and Exel documents we feel will assist you in saving lives following intentional releases of the H5N1 and now MERS viruses; we will begin by printing those that appear to be extremely relevant here: H5N1 Kobe-Kawaoka-Ernala series continues soon with more "Smoking Gun" e-mails from Teridah Ernala to The 5th Estate . . .



By Robert S. Finnegan

On October 12, 2002 the Indonesian island of Bali experienced a terrorist attack that rocked the world. It was unquestionably well-coordinated and executed, the largest in the country's history.