MCViewPoint

Opinion from a Libertarian ViewPoint

Posts Tagged ‘Wikileaks’

CIA, FBI launch manhunt for leaker who gave top-secret documents to WikiLeaks

Posted by Martin C. Fox on April 20, 2017

http://www.cbsnews.com/news/cia-fbi-on-manhunt-for-leaker-who-gave-top-secret-documents-to-wikileaks/

“It is time to call out WikiLeaks for what it really is: A non-state hostile intelligence service often abetted by state actors like Russia,” he said.

The worst, the unthinkable, the most horrible has happened. The truth has come out.

Apparently even at least one of the CIA’s own employees cannot stomach what it does. Read the rest of this entry »

Advertisements

Posted in Uncategorized | Tagged: , , , , , | Leave a Comment »

False Flag: How the U.S. Armed Syrian Rebels to Set Up an Excuse to Attack Assad | The Daily Bell

Posted by Martin C. Fox on April 8, 2017

http://www.thedailybell.com/news-analysis/false-flag-how-the-u-s-armed-syrian-rebels-to-set-up-an-excuse-to-attack-assad/

Documents from Wikileaks show that the U.S. State Department wanted to help rebels overthrow Syrian Dictator Assad in order to strengthen Israel’s position against Iran. The State Department discussed how Iran and Syria trained forces in opposition to Israel. The fall of Assad, they said, would destroy the only Iranian ally in the region positioned to help Iran in the event of Israeli aggression to stop Iran’s nuclear program.

CNN reported in 2012 that America was involved in training the rebels to secure and monitor chemical weapons sites.

The United States and some European allies are using defense contractors to train Syrian rebels on how to secure chemical weapons stockpiles in Syria, a senior U.S. official and several senior diplomats told CNN Sunday.

The training, which is taking place in Jordan and Turkey, involves how to monitor and secure stockpiles and handle weapons sites and materials, according to the sources. Some of the contractors are on the ground in Syria working with the rebels to monitor some of the sites, according to one of the officials.

I don’t know about you but I am tired of the US bending over for Israel.

Be seeing you

Posted in Uncategorized | Tagged: , , , , | Leave a Comment »

“The evidence that the Russians hacked the DNC is collapsing”

Posted by Martin C. Fox on March 24, 2017

http://original.antiwar.com/justin/2017/03/23/rush-to-judgment/

“Unlike Crowdstrike, ESET doesn’t assign APT28/Fancy Bear/Sednit to a Russian Intelligence Service or anyone else for a very simple reason. Once malware is deployed, it is no longer under the control of the hacker who deployed it or the developer who created it. It can be reverse-engineered, copied, modified, shared and redeployed again and again by anyone. In other words  –  malware deployed is malware enjoyed!

“In fact, the source code for X-Agent, which was used in the DNC, Bundestag, and TV5Monde attacks, was obtained by ESET as part of their investigation!

“During our investigations, we were able to retrieve the complete Xagent source code for the Linux operating system….”

Wikileaks release of Vault 7 told us the CIA can make malware look like it came from anywhere they chose. Just saying.

Be seeing you

Posted in Uncategorized | Tagged: , , , | Leave a Comment »

What the New CIA Leaks Tell Us About the U.S. Government

Posted by Martin C. Fox on March 20, 2017

By Alice Salles 
Anti Media

WikiLeaks may have finally done what many small and anti-government advocates have only dreamed of. They exposed the Central Intelligence Agency (CIA) for what it is: a bloated government bureaucracy that has grown much too large to be restrained.

According to the document dump released by Julian Assange’s whistleblower hub, this list of highly confidential information regarding the CIA emerged from the agency’s Center For Cyber Intelligence in Langley, revealing details on the agency’s “global covert hacking program.”

The CIA’s hacking effort has been so powerful and effective, the leaks show, that it includes the weaponization of exploits used against products such as the iPhone, Android phones, Samsung TVs, and Microsoft Windows. This means any of these devices can be used as spying mechanisms at any given time. Read the rest of this entry »

Posted in Uncategorized | Tagged: , | Leave a Comment »

What Is the CIA Hack All About?

Posted by Martin C. Fox on March 16, 2017

http://www.unz.com/pgiraldi/what-is-the-cia-hack-all-about/?_sm_byp=iVVJR033P2sp1jNF

Alexa demonstrates that CIA and NSA intrusion into the lives of ordinary people is not unique. In the cyber-sphere there are many predators. Amazon has apparently run special sales to get Alexa devices into as many homes as possible, presumably for commercial reasons, to have a machine in one’s home that will eventually replace the cookies on computers that collect information on what people are interested in buying. The company’s president Jeff Bezos also recently completed a deal worth $600 million for Amazon to provide cloud hosting services for the Agency. And there are, of course, two clear conflicts of interest in that deal as Bezos is selling a device that can be hacked by the government while he also owns The Washington Post newspaper, which, at least in theory, is supposed to be keeping an eye on the CIA. Read the rest of this entry »

Posted in Uncategorized | Tagged: , , | Leave a Comment »

Does the CIA Vault 7 Leak Make America Less Safe? | The Daily Bell

Posted by Martin C. Fox on March 10, 2017

http://www.thedailybell.com/news-analysis/does-the-cia-vault-7-leak-make-america-less-safe/

But we just got a glimpse into that mission. The CIA mission seems to be controlling the world economy and choosing who will win elections of foreign governments. Where is the focus on Isis, China, and Iran coming from? The leaked documents specifically mention 10,000 targets from North America, Europe, and South America.

So really the leak will do damage to the CIA’s mission, but the media is pretending the CIA has a different mission. The media is still pretending the CIA first and foremost keeps America safe when in reality it is clearly more interested in exerting influence around the globe.


Posted in Uncategorized | Tagged: , , | Leave a Comment »

CIA Turned Samsung Smart TVs into Listening Devices, WikiLeaks Dump Reveals

Posted by Martin C. Fox on March 8, 2017

https://www.infowars.com/cia-turned-samsung-smart-tvs-into-listening-devices-wikileaks-dump-reveals/

That is why you see black tape on all my devices.

Posted in Uncategorized | Tagged: , , | Leave a Comment »

Wikileaks Unveils ‘Vault 7’: “The Largest Ever Publication Of Confidential CIA Documents”; Another Snowden Emerges

Posted by Martin C. Fox on March 7, 2017

http://www.zerohedge.com/news/2017-03-07/wikileaks-hold-press-conference-vault-7-release-8am-eastern?_sm_byp=iVVDLDSSm3k3Np0k

WikiLeaks has published what it claims is the largest ever release of confidential documents on the CIA. It includes more than 8,000 documents as part of ‘Vault 7’, a series of leaks on the agency, which have allegedly emerged from the CIA’s Center For Cyber Intelligence in Langley

Another profound revelation is that the CIA can engage in “false flag” cyberattacks which portray Russia as the assailant. Discussing the CIA’s Remote Devices Branch’s UMBRAGE group, Wikileaks’ source notes that it “collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.

 
 “With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from. UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.”

As Kim Dotcom summarizes this finding, “CIA uses techniques to make cyber attacks look like they originated from enemy state. It turns DNC/Russia hack allegation by CIA into a JOKE Read the rest of this entry »

Posted in Uncategorized | Tagged: , , | Leave a Comment »

Julian Assange: ‘When You Read a Newspaper Article, You Are Reading Weaponized Text’

Posted by Martin C. Fox on February 21, 2017

“Nothing can be believed which is seen in a newspaper. Truth itself becomes suspicious by being put into that polluted vehicle.” – Thomas Jefferson, former President,  in a letter to John Norvell, 14 June 1807.

From Breibart

“What is special about WikiLeaks is that it’s not just another damn story,” said Assange, “it’s not just another damn journalist putting their damn byline, advertising themselves and their position on another damn story.”

“You’re not reading pre-weaponised knowledge,” Assange said in discussing WikiLeaks vast database of information. “When you read a newspaper article, you are reading weaponised text that is designed to affect a person just like you… I think that is the real beauty of WikiLeaks… it is that sea of information, that treasure, that intellectual treasure, that rebel library of Alexandria you can go into.”

Fake News is not a new idea.  Even without phrases like “weaponized text” Jefferson makes his point elegantly.

 

 

Posted in Uncategorized | Tagged: , , | Leave a Comment »

Wikileaks Gives CNN an Ultimatum – LewRockwell

Posted by Martin C. Fox on January 7, 2017

https://www.lewrockwell.com/2017/01/no_author/wikileaks-gives-cnn-ultimatum/

Wringing truth out of the Clinton News Network. No easy task.

Posted in Uncategorized | Tagged: , , | Leave a Comment »