Moderator: Andrew
Fact Finder wrote:Wow, Wikileaks has unloaded tons of CIA secrets this morning, may be time to dump those computers, smart phones and smart tv's, oh, and your cars too.![]()
CIA can remote drive your car after 2014 if I'm hearing right, still trying to soak up this info.
Fact Finder wrote:again Fwiw...
Michael @Traded_Up More @KimDotcom @realDonaldTrump It's coming out that Nancy Pelosi asked Obama for Trump wiretap in an email! Spread the word! They're Caught!
The F.B.I. is leading the investigations, aided by the National Security Agency, the C.I.A. and the Treasury Department’s financial crimes unit. The investigators have accelerated their efforts in recent weeks but have found no conclusive evidence of wrongdoing, the officials said. One official said intelligence reports based on some of the wiretapped communications had been provided to the White House.
Fact Finder wrote:http://www.cnn.com/2017/01/23/politics/flynn-russia-calls-investigation/
From Jan 23rd. Flynn was IN TRUMP TOWER when he was bugged talking to Russian Amb.
slucero wrote:really can't make this shit up.... the NYT as the smoking gun is eeffing HILARIOUS..
https://www.nytimes.com/2017/01/19/us/p ... ation.htmlThe F.B.I. is leading the investigations, aided by the National Security Agency, the C.I.A. and the Treasury Department’s financial crimes unit. The investigators have accelerated their efforts in recent weeks but have found no conclusive evidence of wrongdoing, the officials said. One official said intelligence reports based on some of the wiretapped communications had been provided to the White House.
So now "O" is implicated...
Fact Finder wrote:Monker wrote:Fact Finder wrote:http://www.cnn.com/2017/01/23/politics/flynn-russia-calls-investigation/
From Jan 23rd. Flynn was IN TRUMP TOWER when he was bugged talking to Russian Amb.
It is repeated numerous times that the calls were monitored due to routine tracking of the Russian ambassador. Nothing is said about bugging Flynn or Trump Tower. You are making shit up.
As has been said FROM THE BEGINNING...this started from NSA monitoring Russia and then hearing Trump people talking. That was said all the way back in January. You are trying rewrite history.
On the news last night was Flynn was in Trump Tower when bugged. We'll see who is right in due time I guess.
Say, what's your take on "Project Umbrage" ?
JBlake wrote:Fact Finder wrote:again Fwiw...
Michael @Traded_Up More @KimDotcom @realDonaldTrump It's coming out that Nancy Pelosi asked Obama for Trump wiretap in an email! Spread the word! They're Caught!
I'll have to wait and see what support documentation they got on this claim. I didn't think Pelosi could do much since she's busy fighting dementia.
Fact Finder wrote:Fwiw..
Kim DotcomVerified account @KimDotcom More .@realDonaldTrump would go totally ballistic if he knew what the Obama CIA did. They used his phone cam & mic. Watching and listening 24/7.
Fact Finder wrote:Who to believe, Monker or the head of DHS...hmmmmm let me think.Homeland Security Secretary John Kelly says President Trump possesses credible evidence that former President Barack Obama ordered the wiretapping of Trump Tower in New York City last year.
Trump claimed on Twitter last Saturday that Obama had his “wires tapped” in Trump Tower before Election Day last year, making the accusation without offering any evidence.
“If the president of the United States said that, he’s got his reasons to say it,” Kelly said Monday on CNN’s “The Situation Room." "[Trump’s] got some convincing evidence that that took place.”
Fact Finder wrote:Key Highlights from the Vault 7 release so far:
"Year Zero" introduces the scope and direction of the CIA's global covert hacking program, its malware arsenal and dozens of "zero day" weaponized exploits against a wide range of U.S. and European company products, include Apple's iPhone, Google's Android and Microsoft's Windows and even Samsung TVs, which are turned into covert microphones.
Wikileaks claims that the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized "zero day" exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.
By the end of 2016, the CIA's hacking division, which formally falls under the agency's Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other "weaponized" malware. Such is the scale of the CIA's undertaking that by 2016, its hackers had utilized more code than that used to run Facebook.
The CIA had created, in effect, its "own NSA" with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.
Once a single cyber 'weapon' is 'loose' it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.
Snowden 2.0?
In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA's hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.
CIA targets iPhones, Androids, smart TVs:
CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA's DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details).
The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell's 1984, but "Weeping Angel", developed by the CIA's Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.
Also cars, suggesting that the CIA may have a role in the death of Michael Hastings:
As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks.
The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.
And computers:
The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized "zero days", air gap jumping viruses such as "Hammer Drill" which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( "Brutal Kangaroo") and to keep its malware infestations going.
Hoarding of Zero Day exploits:
In the wake of Edward Snowden's leaks about the NSA, the U.S. technology industry secured a commitment from the Obama administration that the executive would disclose on an ongoing basis — rather than hoard — serious vulnerabilities, exploits, bugs or "zero days" to Apple, Google, Microsoft, and other US-based manufacturers.
Serious vulnerabilities not disclosed to the manufacturers places huge swathes of the population and critical infrastructure at risk to foreign intelligence or cyber criminals who independently discover or hear rumors of the vulnerability. If the CIA can discover such vulnerabilities so can others.
Proliferation of leaked/hacked Cyberwar programs:
While nuclear proliferation has been restrained by the enormous costs and visible infrastructure involved in assembling enough fissile material to produce a critical nuclear mass, cyber 'weapons', once developed, are very hard to retain. Cyber 'weapons' are in fact just computer programs which can be pirated like any other. Since they are entirely comprised of information they can be copied quickly with no marginal cost.
Over the last three years the United States intelligence sector, which consists of government agencies such as the CIA and NSA and their contractors, such as Booze Allan Hamilton, has been subject to unprecedented series of data exfiltrations by its own workers.
Once a single cyber 'weapon' is 'loose' it can spread around the world in seconds, to be used by peer states, cyber mafia and teenage hackers alike.
The U.S. Consulate in Frankfurt is a covert CIA hacker base
In addition to its operations in Langley, Virginia the CIA also uses the U.S. consulate in Frankfurt as a covert base for its hackers covering Europe, the Middle East and Africa. CIA hackers operating out of the Frankfurt consulate ( "Center for Cyber Intelligence Europe" or CCIE) are given diplomatic ("black") passports and State Department cover.
The instructions for incoming CIA hackers make Germany's counter-intelligence efforts appear inconsequential: "Breeze through German Customs because you have your cover-for-action story down pat, and all they did was stamp your passport"
Examples of CIA projects
The CIA's Engineering Development Group (EDG) management system contains around 500 different projects (only some of which are documented by "Year Zero") each with their own sub-projects, malware and hacker tools. The majority of these projects relate to tools that are used for penetration, infestation ("implanting"), control, and exfiltration.
Umbrage: The CIA's Remote Devices Branch's UMBRAGE group collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation. With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the "fingerprints" of the groups that the attack techniques were stolen from.
Fine Dining: Fine Dining comes with a standardized questionnaire i.e menu that CIA case officers fill out. The questionnaire is used by the agency's OSB (Operational Support Branch) to transform the requests of case officers into technical requirements for hacking attacks (typically "exfiltrating" information from computer systems) for specific operations. Among the list of possible targets of the collection are 'Asset', 'Liason Asset', 'System Administrator', 'Foreign Information Operations', 'Foreign Intelligence Agencies' and 'Foreign Government Entities'. Notably absent is any reference to extremists or transnational criminals.
'Improvise'; a toolset for configuration, post-processing, payload setup and execution vector selection for survey/exfiltration tools supporting all major operating systems like Windows (Bartender), MacOS (JukeBox) and Linux (DanceFloor).
HIVE: HIVE is a multi-platform CIA malware suite and its associated control software. The project provides customizable implants for Windows, Solaris, MikroTik (used in internet routers) and Linux platforms and a Listening Post (LP)/Command and Control (C2) infrastructure to communicate with these implants. The implants are configured to communicate via HTTPS with the webserver of a cover domain; each operation utilizing these implants has a separate cover domain and the infrastructure can handle any number of cover domains.
Memorex wrote:Remember when we used to be a free country? Goodbye to all that.
Fact Finder wrote:So would you admit that Umbrage could have been used on the DNC hack with fake Russian fingerprints planted by CIA and use that "hack" to imply Trump was working with the Russians and therefore had reason to bug him and associates? Not so far fetched knowing what we now know.
Monker wrote:You're wrong. Trump's actions are going to get him impeached, or having dinner and not waking up in the morning.
Monker wrote:I was making this argument LONG before the election was over. When OhSherrie was posting, she said she wanted Trump to come in and throw a kink in the system and maybe even destroy the Republican party. I said he was the wrong person and compared him to Hitler...that he was DANGEROUS. That was LONG before the election.
Monker wrote:....I've been saying he is a liberal since early on in the election.
Monker wrote:Yep, and instead you are going to get four years of investigations.
Monker wrote:What are you talking about? The CIA has nothing to do with this. And, the Democrats do not have the numbers to matter.
Monker wrote:Being independent doesn't scare anybody.
Monker wrote:When Spicer's first appearence before the press he LIED about almost everything. THAT is scary.
Monker wrote:Blaming all of your problems on the press or the people you hand selected to support you, instead of being a leader and taking responsibility. THAT is scarey.
Monker wrote:Retelling Breit Bart as FACT without any supporting facts. THAT is scarey.
Monker wrote:And, on, and on, and on.
Fact Finder wrote:WikiLeaks @wikileaks
WikiLeaks has released less than 1% of its #Vault7 series in its part one publication yesterday 'Year Zero'.
17 min 3/8/17
Monker wrote:If you are going to reply to a quote talking about apples by talking about oranges, then forget it. Not worthy of my time.
Monker wrote:Wrong.
The travel ban failed in court...and I'm sure this new one will be challenged again. So, you can not definitely say it will happen.'
Monker wrote:If Trump can not learn how to legislate, he can't govern. Period.
Monker wrote:But, those Tea Party'ers are still in congress. You can not guarantee they will vote for Trump when they were elected by idiots like KC and FF to vote against deficit spending. It is against their core values and beliefs.
Monker wrote:I personally know a couple moderate Republicans who are leaving the party because they can't stomach Trump.
Monker wrote:People are just starting to realize what happens, for example, when immigrants are not their to pick crops or work in meat processing plants. People are just starting to realize when trade relations with China are damaged. People are just starting to realize how many people are going to be without health care even if Obamacare is relpealed/replaced.
Monker wrote:You had your March 4 Trump protests and compared to what Indivisible is doing, it is miniscule. Indivisible is FAR more mainstream than you are giving it credit for.
Monker wrote:YOU are not Russia.
Monker wrote:Russia attempting to influence our election is a MUCH bigger issue than you are giving credit for.
Monker wrote: And, if Trump cooperated in ANY way.....he is going to be in HUGE trouble.
Schwarzenegger, 69, appeared on SiriusXM’s The Michael Smerconish Program, where he discussed Trump’s recent tweet about him following Arnold’s decision to leave his gig as host of The New Celebrity Apprentice. After all, it’s not every day that the president calls you “pathetic.”
“I think he’s in love with me,” Schwarzenegger cracked.
“Is that what it is?” Smerconish asked.
“Yeah, I think so,” Schwarzenegger replied.
Monker wrote:
You're wrong. Trump's actions are going to get him impeached, or having dinner and not waking up in the morning.
So what? CIA also hated JFK and Nixon.
Monker wrote:
I was making this argument LONG before the election was over. When OhSherrie was posting, she said she wanted Trump to come in and throw a kink in the system and maybe even destroy the Republican party. I said he was the wrong person and compared him to Hitler...that he was DANGEROUS. That was LONG before the election.
So Trump is a Hitler and yet you just said...
So there ya have it folks. Monker hates Trump because he is a not-liberal-enough version of Hitler.
Monker wrote:....and Nixon had to resign or he would have been impeach, and JFK didn't wake up the next morning.
Monker wrote:Please understand what you read and then quote. I said, as you quoted above, "I said he was the wrong person and compared him to Hitler...that he was DANGEROUS."
I did not say, "he is a Hitler". Trump is authoritarian, like Hitler. Trump incites negative emotions and hatred towards minorities, like Hitler. Trump uses minorities as scapegoats for the countries problems, like Hitler.
But, he is not 'a Hitler". Hitler also wanted to "drain the swamp", but to do so he simply locked everybody in a room and then killed everybody who disagrees with him. As much as Trump may want to do that, I doubt he would go that far.
Monker wrote:He wants to end the trade deals, which is traditionaly a liberal position...conservatives LIKE trade deals because they encourage the free market.
Monker wrote:
Yep, and instead you are going to get four years of investigations.
Good luck. The Dems have no power and voters recognize these tactics as transparent grandstanding by a dead party with no direction.
Monker wrote:
What are you talking about? The CIA has nothing to do with this. And, the Democrats do not have the numbers to matter.
CIA director Michael Morell endorsed Hillary Clinton. CIA director Gen. Michael Hayden endorsed Clinton. The Washington Post, which has led the charge on bogus Russian smears connecting Trump, Bernie (and pretty much anyone anti-WW 3) was recently given a 600 million dollar contract from the CIA. Plenty more where that came from.
You don't realize this because you just repeat whatever Rachel Maddow tells you.
During the primaries, you said Trump didn't have a chance (just like the Dems/MSM).
Now, you say we were hacked by Russia and demand an investigation (just like the Dems/MSM). Anyone detecting a pattern here?
Obama came to power being against CIA and released CIA memos. The swift condemnation from the CIA and media made him change his tune real fast. In a town like Washington, being independent gets you killed.
The White House Press Secretary gets paid to spin and lie. Did you think these guys were bastions of truth? You sound extremely naive.
Monker wrote:
Blaming all of your problems on the press or the people you hand selected to support you, instead of being a leader and taking responsibility. THAT is scarey.
From media polls that gave Hillary a 90% chance to "Russian hacking" news stories that are later retracted, the press deserves it.
Monker wrote:
Retelling Breit Bart as FACT without any supporting facts. THAT is scarey.
Breitbart's reporting is fine. No better or worse than HuffingtonPost or any other aggregate site like Drudge, BuzzFeed. Pick another boogeyman.
Boomchild wrote:
And yet our politicians will continue to rant and point fingers at other countries and nations about their hacking and spying programs aimed at the U.S..
Boomchild wrote:
And yet our politicians will continue to rant and point fingers at other countries and nations about their hacking and spying programs aimed at the U.S..
The_Noble_Cause wrote:Monker wrote:....and Nixon had to resign or he would have been impeach, and JFK didn't wake up the next morning.
Better to go down fighting the good fight than being an obsequious corporate toady like Obama and furthering America’s decline.
If I compare my boss to Satan ten different ways and then qualify that with “oh but he’s not Satan”, does it matter? You are comparing him to Hitler. End of story.
Fact Finder wrote:Wow, Wikileaks has unloaded tons of CIA secrets this morning, may be time to dump those computers, smart phones and smart tv's, oh, and your cars too.![]()
CIA can remote drive your car after 2014 if I'm hearing right, still trying to soak up this info.
Return to Snowmobiles For The Sahara
Users browsing this forum: No registered users and 10 guests