View Full Version : WikiLeaks’ Cryptic 'Vault 7'
singular_me
14th February 2017, 07:24 AM
conspiracy theories taking the internet by storm as I type this
====================
The Mystery Of WikiLeaks’ Cryptic 'Vault 7' – Do You Know What This Means?
14 February 2017 GMT
‘Starting on February 4th, each day WikiLeaks began sending out a series of cryptic question Tweets teasing the world about “Vault 7.”
The questions were framed in Who, What, When, Where, Why, and How format (but not in that order). Each came with an image “clue.”
Here they are in chronological order starting with the earliest.’
The first image, What, is the Svalbard Global Seed Vault, also referred to as the “doomsday seed vault” in Norway.
The second image, Where, reportedly shows a cave Nazis used to store gold and other valuables in during World War II.
The third image, When, has been located here
The fourth image, Who, shows whistleblowers Bradley Manning, Edward Snowden, and WikiLeaks founder Julian Assange on newspapers under the headline “infamous spies.”
The fifth image, Why, shows a welder… and gives us yet another Air Force reference.
The sixth and final image asks “How did #Vault7 make its way to WikiLeaks?” and shows us a retro image of a woman in a beret mailing something at a mailbox.
So… What, Where, When, Who, Why and How did WikiLeaks Acquire Vault 7?
http://www.activistpost.com/2017/02/mystery-wikileaks-cryptic-vault-7-know-means.html
Glass
16th February 2017, 10:34 PM
Vault 7 ?
2012 French Elections - CIA manipulation?
https://wikileaks.org/cia-france-elections-2012/
Not sure, no indication from WikiLeaks that this is Vault 7 related. Only release since the V7 teasers went out.
Glass
6th March 2017, 09:48 PM
Wikileaks Releases Encrypted "Vault 7" Torrent, Will Unveil Password Tuesday 9am
Last month, following a series of seemingly random tweets by Wikileaks, we reported (http://www.zerohedge.com/news/2017-02-14/mystery-wikileaks-cryptic-vault-7-do-you-know-what-means)that starting on February 4th, each day Wikileaks began sending out a series of cryptic question Tweets teasing the world about “Vault 7”. The questions were framed in Who, What, When, Where, Why, and How format (but not in that order). Each came with an image “clue”.
Here they are in chronological order starting with the earliest.
What: The first tweet (https://twitter.com/wikileaks/status/827828627488268290) shows a picture of the Svalbard Global Seed Vault (https://en.wikipedia.org/wiki/Svalbard_Global_Seed_Vault).
Where: The second tweet (https://twitter.com/wikileaks/status/828135633780633600) shows a picture of a vault in a former salt mine in Merkers, Germany (https://text-message.blogs.archives.gov/2014/01/27/the-monuments-men-and-the-recovery-of-the-art-in-the-merkers-salt-mine-april-1945/) where Nazis stored money, gold, paintings, and other valuables during World War II. This mine vault was captured by the United States in April 1945 (https://www.archives.gov/publications/prologue/1999/spring/nazi-gold-merkers-mine-treasure.htm).
When: The third tweet (https://twitter.com/wikileaks/status/828537075460890625) shows a picture of a Pratt & Whitney F119 airplane engine (https://en.wikipedia.org/wiki/Pratt_%26_Whitney_F119), which is the engine for the Lockheed Martin F-22 Raptor (https://en.wikipedia.org/wiki/Lockheed_Martin_F-22_Raptor). The picture in the tweet was taken on April 9th, 2010 at Langley Air Force Base (http://www.acc.af.mil/News/Features/Display/tabid/5765/Article/204302/hush-houses-keep-jet-noise-contained.aspx) as part of a story published on April 12th about the soundproof "hush houses" used for jet engine testing.
Who: The fourth tweet (https://twitter.com/wikileaks/status/828889235994324992) shows a picture of the Manning, Assange, and Snowden "infamous spies" posters (https://twitter.com/wikileaks/status/775674436917796865) released by the Defense Security Service (http://www.dss.mil/).
Why: The fifth tweet (https://twitter.com/wikileaks/status/829324362943696896) shows a picture from the article Keeping Structures Strong (http://www.afgsc.af.mil/News/Features/Display/tabid/2652/Article/455633/keeping-structures-strong.aspx), which discusses the 509th Civil Engineer Squadron's work repairing infrastructure on Whiteman Air Force Base (https://en.wikipedia.org/wiki/Whiteman_Air_Force_Base). The specific picture tweeted (http://www.whiteman.af.mil/News/Photos?igphoto=2000070405) is captioned "Staff Sgt. Adam Boyd, 509th Civil Engineer Squadron structural supervisor, welds a box blade for a snow plow, Feb. 27. Structures Airmen perform jobs such as this one to save the Air Force from having to possibly spend money on parts made by civilian companies."
How: Or, more specifically, "How did #Vault7 make its way to WikiLeaks?" The sixth tweet (https://twitter.com/wikileaks/status/829693251133272064) shows a picture of "Surveillance of mailboxes in Berlin" (https://www.opensocietyfoundations.org/moving-walls/22/images-secret-stasi-archives). The picture is caption "When mailboxes were being observed by Stasi agents, every person posting a letter was photographed. Some films found in the Stasi archives also show persons dressed in civilian clothing emptying the mailbox after the conclusion of the surveillance action."
While it is possible that Vault 7 is directly related to one of these pictures, these pictures may just be representative images, part of some sort of pattern (https://www.reddit.com/r/WikiLeaks/comments/5savr8/what_is_vault_7_wl_research_community/dde8avd/), or clues about the answers to the corresponding questions (https://boards.4chan.org/pol/thread/111332836#p111333268). As the pictures are images of entirely different things (and no longer just pictures of vaults), each individual picture being related to the answer of the question tweeted along with it seems quite plausible.
Then, after a flurry of appearances over a month ago, the topic of "Vault 7" faded away from the Wikileaks twitter account, until Monday evening, when in a tweet around 7:30pm, Wikileaks announced that it had released an encrypted 'torrent' file, just over 500 MB in size and which can be downloaded now at the following URL (https://t.co/gpBxJAoYD5), will be made accessible for everyone tomorrow at 9am ET when Wikileaks releases the passphrase.
ENCRYPTED RELEASE
Use a 'torrent' downloader on: https://t.co/gpBxJAoYD5
And '7z' to decrypt.
Passphrase will be made public at Tue 9am ET. pic.twitter.com/MxZQtoaCMK (https://t.co/MxZQtoaCMK)
— WikiLeaks (@wikileaks) March 7, 2017 (https://twitter.com/wikileaks/status/838910359994056704)
In subsequent tweets, Wikileaks provides further information on how to unzip the encrypted file contained in the torrent.
Zerohedge
(http://www.zerohedge.com/news/2017-03-06/wikileaks-releases-encrypted-vault-7-torrent-will-unveil-password-tuesday-9am)Possible trojan? be careful.
cheka.
6th March 2017, 09:56 PM
pizzagate? bernie/wasserman/dnc gate? weiner gate? skype-pedo snuff film gate? killary foundation gate?
Glass
6th March 2017, 09:59 PM
pizzagate? bernie/wasserman/dnc gate? weiner gate? skype-pedo snuff film gate? killary foundation gate?
are you feeling suspense? ;)
cheka.
6th March 2017, 10:51 PM
are you feeling suspense? ;)
no doubt. not a fiction fag...or big pro sport fan. give me wiki bomb
old steel
6th March 2017, 10:55 PM
Fireworks tomorrow.
Glass
7th March 2017, 01:41 AM
Fireworks tomorrow.
https://www.youtube.com/watch?v=B4hNlg_ZuJA
Joshua01
7th March 2017, 06:28 AM
Just waiting for the decrypt password and we'll see. Personally I think this is just another dud. Wikileaks hasn't released anything of value since before Assange was killed (yeah, I'm afraid he's probably dead and Wikileaks has probably been compromised by the deep state fucks)
Joshua01
7th March 2017, 06:29 AM
Any Microsoft Windows fags downloading shit like this deserve what they get.
Zerohedge
(http://www.zerohedge.com/news/2017-03-06/wikileaks-releases-encrypted-vault-7-torrent-will-unveil-password-tuesday-9am)Possible trojan? be careful.
monty
7th March 2017, 06:43 AM
Wikileaks Vault7 release classified CIA info (http://www.trunews.com/article/wikileaks-vault7-release-will-reveal-classified-cia-info)
WikiLeaks #Vault7 release will reveal classified CIA info
http://static.trunews.com/images/Screen_Shot_2017-03-07_at_1.46_.53_AM_.pngA screenshot montage of WikiLeaks founder Julian Assange (L), a tweet about the Tuesday release (TR), and an picture of the hidden image in the announcement tweet (TR), Source: Screenshot, REUTERS/Edward Szall
According to a source within the organization the WikiLeaks #Vault7 release Tuesday will contain classified CIA documents
(VERO BEACH, FLA) On Monday night at approximately 7:30 PM ET a tweet was published from the WikiLeaks verified twitter account informing the public of an upcoming release scheduled for 9 AM ET on Tuesday March 7th 2017.
The file, offered through an encrypted torrent, is roughly 500MB in size and will be accessible after a password is publicly provided by WikiLeaks.
According to a post by Kelly Kolinsinik, a Canadian Web/App Developer, the photo attached to the WikiLeaks tweet is related to Julian Assange’s #Vault7 series — which was first teased on February 5th 2017 and later identified as a soon-to-be published major CIA leak.
Between February 5th and February 9th WikiLeaks published the following tweets from their verified account as a preview of the #Vault7 release.
http://gold-silver.us/forum/webkit-fake-url://994b5c4e-c2fd-4527-b598-9d3e4ba64e1b/imagejpeg
monty
7th March 2017, 06:50 AM
From Russia Today
https://actualidad.rt.com/actualidad/232714-wikileaks-filtra-mayor-coleccion-documentos-cia
WikiLeaks filtra la mayor colección de documentos confidenciales sobre la CIA
Publicado: 7 Mar 2017 | 13:22 GMThttps://esp.rt.com/actualidad/public_images/static.es/article/ultimo.jpg
WikiLeaks ha iniciado la publicación de documentos sobre la Agencia Central de Inteligencia de EE.UU.
El portal de filtraciones WikiLeaks ha anunciado este martes la publicación de primera parte de sus archivos sobre la CIA, en el marco de lo que llama "la mayor publicación en la historia de los documentos confidenciales sobre la agencia".
Los documentos en disposición de WikiLeaks incluyen datos sobre "decenas de miles de objetivos y máquinas de ataque de la CIA en América Latina, EE.UU. y Europa". El portal ha decidido no revelarlos por el momento para poder estudiarlos más profundamente.
El conjunto de la filtración ha sido bautizado como Vault 7 por el portal. En concreto, la primera parte de los documentos lleva el nombre Year Zero (Año Cero en español). Year Zero consta de 8.761 documentos procedentes del Centro para la Inteligencia Cibernética de la CIA.
Según el anuncio publicado por WikiLeaks, el archivo aparentemente pasó por las manos de varios piratas electrónicos que trabajan para el Gobierno estadounidense, después de que la CIA perdiera "recientamente" el control sobre "la mayoría de su arsenal de 'hackeo'".
Varios contratistas estadounidenses también tuvieron acceso "no autorizado" a estos documentos, uno de los cuales los filtró a WikiLeaks.
Más información en breve.
google translation
From Russia Today
WikiLeaks filters the largest collection of confidential CIA documents
Posted: Mar 7, 2017 | 13:22 GMT
WikiLeaks filters the largest collection of confidential CIA documents
WikiLeaks has begun publishing documents on the US Central Intelligence Agency.
The leaks portal WikiLeaks has announced the publication of the first part of its archives on the CIA, in the framework of what it calls "the largest publication in the history of confidential documents about the agency."
The documents available to WikiLeaks include data on "tens of thousands of targets and CIA attack machines in Latin America, the US and Europe." The portal has decided not to reveal them for the moment to be able to study them more deeply.
The whole of the filtration has been baptized Vault 7 by the portal. In particular, the first part of the documents is called Year Zero. Year Zero consists of 8,761 documents from the Center for Cyber Intelligence of the CIA.
According to the announcement published by WikiLeaks, the file apparently went through the hands of several electronic pirates working for the US government, after the CIA "lost" control over "most of its hacking arsenal."
Several US contractors also had "unauthorized" access to these documents, one of which leaked them to WikiLeaks.
More information coming soon.
Ares
7th March 2017, 06:52 AM
Just waiting for the decrypt password and we'll see. Personally I think this is just another dud. Wikileaks hasn't released anything of value since before Assange was killed (yeah, I'm afraid he's probably dead and Wikileaks has probably been compromised by the deep state fucks)
Julian used the blockchain (by reading the latest bitcoin block ID) to show proof of life:
https://www.cryptocoinsnews.com/julian-assange-uses-bitcoins-blockchain-proof-life/
monty
7th March 2017, 06:57 AM
Russia Today English
https://www.rt.com/news/379724-wikileaks-assange-cia-hacking/
WikiLeaks publishes 'entire hacking capacity of the CIA'
Published time: 7 Mar, 2017 13:18Edited time: 7 Mar, 2017 13:46
WikiLeaks has published what it claims is the largest ever batch of confidential documents on the CIA. More than 8,000 documents were released on Tuesday as part of ‘Vault 7’, a series of leaks on the agency.
A total of 8,761 documents have been published as part of ‘Year Zero’, the first in a series of leaks the whistleblower organization has dubbed ‘Vault 7.’
In a statement WikiLeaks said ‘Year Zero’ revealed details of the CIA’s “global covert hacking program,” including “weaponized exploits” used against company products including “Apple's iPhone, Google's Android and Microsoft's Windows and even Samsung TVs, which are turned into covert microphones.”
RELEASE: Vault 7 Part 1 "Year Zero": Inside the CIA's global hacking force
https://t.co/h5wzfrReyy (https://t.co/h5wzfrReyy)pic.twitter.com/N2lxyHH9jp (https://t.co/N2lxyHH9jp)
— WikiLeaks (@wikileaks) March 7, 2017 (https://twitter.com/wikileaks/status/839100679625060353)
WikiLeaks tweeted the leak, which it claims came from a network inside the CIA’s Center for Cyber Intelligence in Langley, Virginia.
The source of the information told WikiLeaks in a statement (https://wikileaks.org/ciav7p1/#ANALYSIS) that they wish to initiate a public debate about the “security, creation, use, proliferation and democratic control of cyberweapons.”
Policy questions that should be debated in public include “whether the CIA's hacking capabilities exceed its mandated powers and the problem of public oversight of the agency,” WikiLeaks claims the source said.
The FAQ section of the release yields some key details that highlight the true extent of the leak: firstly, the information was “obtained recently and covers through 2016”.
The time period covered in the latest leak is between the years 2013 and 2016, according to the CIA timestamps on the documents themselves.
Secondly, WikiLeaks has asserted that it has not mined the entire leak and has only verified it, asking that journalists and activists do the leg work.
"Those who demonstrate journalistic excellence may be considered for early access to future parts," Wikileaks said in the leak.
The release came after a planned press conference (https://twitter.com/wikileaks/status/839099265314131968)suffered a cyberattack, according to the whistleblowing organization. WikLeaks has since rescheduled its press conference.
PatColo
7th March 2017, 07:56 AM
Victurus Libertas
https://i.ytimg.com/vi/7O46Rm6oKpw/hqdefault.jpg?custom=true&w=336&h=188&stc=true&jpg444=true&jpgq=90&sp=68&sigh=CguVlPqnAiZiJtzosjxKL88vT30 (https://www.youtube.com/watch?v=7O46Rm6oKpw) 1:29
BREAKING - WIKILEAKS HAS RELEASED #VAULT7 - CIA Hacking Tools Revealed (https://www.youtube.com/watch?v=7O46Rm6oKpw)
89 views
1 minute ago
https://i.ytimg.com/vi/FXifNp547Pk/hqdefault.jpg?custom=true&w=336&h=188&stc=true&jpg444=true&jpgq=90&sp=68&sigh=_hWcFM48Kh1jLDvITLnDxIPutU4 (https://www.youtube.com/watch?v=FXifNp547Pk) 21:16
BREAKING DEEP STATE EXPOSED! The Cicada3301 #Vault7/Wikileaks Connection (https://www.youtube.com/watch?v=FXifNp547Pk)
318 views
12 minutes ago
PatColo
7th March 2017, 09:00 AM
dave seaman; lots of views for being pub'd 15 mins ago :o
https://i.ytimg.com/vi/w1-nmA5My7U/hqdefault.jpg?custom=true&w=336&h=188&stc=true&jpg444=true&jpgq=90&sp=68&sigh=iXYEl1iA7GgOKQkyDxXQVwTt-Wg (https://www.youtube.com/watch?v=w1-nmA5My7U) 9:20
WIKILEAKS VAULT 7: The C.I.A. Is Listening Via Everything (https://www.youtube.com/watch?v=w1-nmA5My7U)
2,488 views
15 minutes ago
Dachsie
7th March 2017, 09:19 AM
Just another probably meaningless observation of mine
but what I notice AGAIN about this Vault 7 Wikileaks leak is its TIMING OF RELEASE.
This big leak happens right now when THE top story on all medea is how Trump Tower and campaign headquarters was bugged, electronically spied upon, ordered and allowed by people connected to the top of the Obama / Democratic Party Team.
So this Vault 7 release basically tells us the CIA is the federal agency that really has a huge sophisticated arsenal of hacking tools to spy on each and every person in the USA in every minute facet of their lives, include television sets in fake off mode to listen to you at home.
I suppose there is a name or phrase to describe this particular Cass Sunstein kind of Orwellian universal domestic spying and infiltation but basically I would describe it thus.
When something very big and very bad news, illegal spying on Trump by the Deep State, story hits all media and demographics that exposes the massive Big Brother nature and reality that is our government
the Sunstein squad goes in to action and they take several divert and distract actions immediately to diffuse and dilute the import of that very big and very bad news item.
So all of a sudden see that what happened to Trump in his Trump Tower while he was a presidential candidate is very small compared to spying that is going on everywhere on all of us every day and has been for years and has taken billions of our tax dollars to build the spying tools and occupies a huge part of the work that is done by the CIA, the agency that is actually charged with spying on foreigners in foreign countries.
So whatever beef or case Trump may have and may want congress to look at, all of a sudden there is ostensibly a much bigger case to be investigated, that is, that one or our top intelligence agency is spying on every American every day with impunity.
I would say that making the Spying on Trump matter look small and of much lesser importance, as utterly shocking it was to almost everyone about two days ago, has been a huge success made so by the timing of this WikiLeaks Vault 7 release.
Tell me I'm tilting at windmills and have an overly conspiratorial thinking process. Whatever, I think somebody needs to say these kinds of things.
PatColo
7th March 2017, 09:30 AM
JSo all of a sudden see that what happened to Trump in his Trump Tower while he was a presidential candidate is very small compared to spying that is going on everywhere on all of us every day and has been for years and has taken billions of our tax dollars to build the spying tools and occupies a huge part of the work that is done by the CIA, the agency that is actually charged with spying on foreigners in foreign countries.
Seaman kept saying the red part ^ in his vid too... I wanted to message him that in part if not whole, CIA's black ops budget comes from their global drug trafficking $. Human misery/addiction/premature death profits. :(
Also see that Victurus Libertas vid I posted a few up; goes into some numerology re this vault 7 dump. When did wikileaks first announce this imminent dump? Over the weekend I guess, but when relative to DT's wire tapping tweet? :(??
Dachsie
7th March 2017, 09:42 AM
When I see that THEY are letting out THE WHOLE ENCHILADA now that is so big that it clearly is a threat to "our national security", I see again that this Vault 7 release is multi-pupose and sends very clear messages to the American people. One thing THEY are telling us by this is something like...
Look, we control everything and there is nothing you can do about it and we have had all under our control for many many years. All that you believe about "America is great because America is good" has always been a big lie. So just shut up and watch how nothing ever comes of this big Vault 7 matter either. I think we are to get the message also that we are nearing "end of game" time and THEY see no reason why to keep themselves hidden under a veil. THEY're taking off the mask.
This not only takes ObamaGate off the front burner but does likewise to Pedogate.
Joshua01
7th March 2017, 09:50 AM
Maybe something like a non photoshopped picture of the man with today's paper might be a bit easier to disgest rather than all this hocus pocus bullshit techno crap. I'm sick of smioke sceeens that are always open for interpretation.
Julian used the blockchain (by reading the latest bitcoin block ID) to show proof of life:
https://www.cryptocoinsnews.com/julian-assange-uses-bitcoins-blockchain-proof-life/
Atocha
7th March 2017, 10:05 AM
When I see that THEY are letting out THE WHOLE ENCHILADA now that is so big that it clearly is a threat to "our national security", I see again that this Vault 7 release is multi-pupose and sends very clear messages to the American people. One thing THEY are telling us by this is something like...
Look, we control everything and there is nothing you can do about it and we have had all under our control for many many years. All that you believe about "America is great because America is good" has always been a big lie. So just shut up and watch how nothing ever comes of this big Vault 7 matter either. I think we are to get the message also that we are nearing "end of game" time and THEY see no reason why to keep themselves hidden under a veil. THEY're taking off the mask.
This not only takes ObamaGate off the front burner but does likewise to Pedogate.
So sad but so true. We are finished. America is done. Let the games begin..
PatColo
7th March 2017, 11:07 AM
When I see that THEY are letting out THE WHOLE ENCHILADA now that is so big that it clearly is a threat to "our national security", I see again that this Vault 7 release is multi-pupose and sends very clear messages to the American people. One thing THEY are telling us by this is something like...
Look, we control everything and there is nothing you can do about it and we have had all under our control for many many years. All that you believe about "America is great because America is good" has always been a big lie. So just shut up and watch how nothing ever comes of this big Vault 7 matter either. I think we are to get the message also that we are nearing "end of game" time and THEY see no reason why to keep themselves hidden under a veil. THEY're taking off the mask.
This not only takes ObamaGate off the front burner but does likewise to Pedogate.
I, and I think most of us here, have long taken for granted that the spooks have full eavesdropping capability on our window/mac comps (though this does confirm linux too... this was discussed in a past linux thread), our smart phones, and the latest smart TVs. And "pretty sure" about modern cars. So from what I've heard re vault 7 so far, no surprises. Waiting for further analysis over the coming days.
Best I can do by way of mitigating or offsetting, that I'm aware of, is keeping my phone in an EFR blocking pouch, 'cept when I need to use it, then back in the pouch. No smart TV, or goog/amzn's little home helper spy devices, and ~20+ year old car, if any.
Really Graceful:
https://i.ytimg.com/vi/FyMpmyRm2H8/hqdefault.jpg?custom=true&w=336&h=188&stc=true&jpg444=true&jpgq=90&sp=68&sigh=lGv3DkgEkuzuwB8Oumh04rf8IlU (https://www.youtube.com/watch?v=FyMpmyRm2H8) 3:18
Vault 7: CIA Hacking Tools Revealed | Wikileaks (https://www.youtube.com/watch?v=FyMpmyRm2H8)
142 views
8 minutes ago
Dachsie
7th March 2017, 11:14 AM
I was listening to Alex Jones show today as a live YouTube feed and the subject was Vault 7.
Roger Stone and Dr. Steve Pacienyck on and their take is that the Vault 7 release was effected by the good guys at the CIA, the ones Dr. P says are feeding Wikileaks high quality leaks. And how Trump is right now at the top of his game and every time the Left or Deep State sends him another ostensibly devastating bit of "news" against him, he volleys right back with some much more "bombshell" indisputable WikiLeaks.
This is on the surface quite the opposite of what I am implying but maybe, just maybe, there is some truth in what I am saying about the timing of the release of Vault 7 and also about the timing of "volleys" of Trump.
I do feel that it is only one side that has control of timing of Leaks by Wiki but I am not sure what side it is.
Maybe there is a Deep State and a Deep Deep State.
Had to stop listening to show after only a few minutes when Alex kept feeding "fishing for compliments" questions to Dr. P and Dr. P went right along and said "Alex, I know you are a modest man but..." [ is there an emoticon for choke choke cough cough] then went on to praise AJ and his monumental accomplishments in alternative news power.
Ares
7th March 2017, 11:15 AM
Maybe something like a non photoshopped picture of the man with today's paper might be a bit easier to disgest rather than all this hocus pocus bullshit techno crap. I'm sick of smioke sceeens that are always open for interpretation.
Hey if you don't understand it, that's up to you. But the blockchain updates every 10 minutes and a new block ID is generated each time. That would be better that some bullshit news paper that can be photo-shopped at will.
Ares
7th March 2017, 11:17 AM
I, and I think most of us here, have long taken for granted that the spooks have full eavesdropping capability on our window/mac comps (though this does confirm linux too... this was discussed in a past linux thread), our smart phones, and the latest smart TVs. And "pretty sure" about modern cars. So from what I've heard re vault 7 so far, no surprises. Waiting for further analysis over the coming days.
Best I can do by way of mitigating or offsetting, that I'm aware of, is keeping my phone in an EFR blocking pouch, 'cept when I need to use it, then back in the pouch. No smart TV, or goog/amzn's little home helper spy devices, and ~20+ year old car, if any.
Really Graceful:
https://i.ytimg.com/vi/FyMpmyRm2H8/hqdefault.jpg?custom=true&w=336&h=188&stc=true&jpg444=true&jpgq=90&sp=68&sigh=lGv3DkgEkuzuwB8Oumh04rf8IlU (https://www.youtube.com/watch?v=FyMpmyRm2H8) 3:18
Vault 7: CIA Hacking Tools Revealed | Wikileaks (https://www.youtube.com/watch?v=FyMpmyRm2H8)
142 views
8 minutes ago
Or in the Microwave (just don't turn it on with it inside), and it will block all communication. Since Microwave ovens are sealed to prevent microwave leakeage you can put your phone in the microwave oven and watch the communication bars drop to zero as soon as you close the door.
PatColo
7th March 2017, 12:06 PM
Or in the Microwave (just don't turn it on with it inside), and it will block all communication. Since Microwave ovens are sealed to prevent microwave leakeage you can put your phone in the microwave oven and watch the communication bars drop to zero as soon as you close the door.
yeah, m'wave & EFR blocking phone pouch are both faraday cages... but the pouch can be < $10 at amzn, and fits in your front pocket, without radiating your 'nads. Also can't be tracked everywhere you go, or the data sucked out of it when you pass one of the spooks' fake cell towers; until you take out the phone to use it, then boom, the cell towers triangulate your location to within a few feet.
A good pouch will have 2 pockets-- one fully lined with EFR block material, and the other unlined-- if you carry your phone in your front pocket, but need the phone "on the grid" for receiving calls etc; put it in the unlined pouch pocket, then the lined side closest to your body (so between phone & body)... this helps lessen the radiation as your phone is constantly "burping", maintaining tower contact. You can talk on the phone that way too, using the earbuds/mic.
when I'm out & about, the phone is in the fully lined pouch pocket, with headphone cord running out through the flap lid, so I can keep the MP3s playing to keep me company. :)
crimethink
7th March 2017, 12:08 PM
Just another probably meaningless observation of mine
but what I notice AGAIN about this Vault 7 Wikileaks leak is its TIMING OF RELEASE.
This big leak happens right now when THE top story on all medea is how Trump Tower and campaign headquarters was bugged, electronically spied upon, ordered and allowed by people connected to the top of the Obama / Democratic Party Team.
So this Vault 7 release basically tells us the CIA is the federal agency that really has a huge sophisticated arsenal of hacking tools to spy on each and every person in the USA in every minute facet of their lives, include television sets in fake off mode to listen to you at home.
I suppose there is a name or phrase to describe this particular Cass Sunstein kind of Orwellian universal domestic spying and infiltation but basically I would describe it thus.
When something very big and very bad news, illegal spying on Trump by the Deep State, story hits all media and demographics that exposes the massive Big Brother nature and reality that is our government
the Sunstein squad goes in to action and they take several divert and distract actions immediately to diffuse and dilute the import of that very big and very bad news item.
So all of a sudden see that what happened to Trump in his Trump Tower while he was a presidential candidate is very small compared to spying that is going on everywhere on all of us every day and has been for years and has taken billions of our tax dollars to build the spying tools and occupies a huge part of the work that is done by the CIA, the agency that is actually charged with spying on foreigners in foreign countries.
So whatever beef or case Trump may have and may want congress to look at, all of a sudden there is ostensibly a much bigger case to be investigated, that is, that one or our top intelligence agency is spying on every American every day with impunity.
I would say that making the Spying on Trump matter look small and of much lesser importance, as utterly shocking it was to almost everyone about two days ago, has been a huge success made so by the timing of this WikiLeaks Vault 7 release.
Tell me I'm tilting at windmills and have an overly conspiratorial thinking process. Whatever, I think somebody needs to say these kinds of things.
Or, the Vault 7 release is a confirmation of what Trump has alleged about wiretapping of his communications.
Universal wiretapping was a proven fact since Snowden. Whether there was a FISA "court" order is the only question (in most cases, there is not).
The idea that Assange released this to hurt Trump is absurd.
crimethink
7th March 2017, 12:13 PM
When I see that THEY are letting out THE WHOLE ENCHILADA now that is so big that it clearly is a threat to "our national security", I see again that this Vault 7 release is multi-pupose and sends very clear messages to the American people. One thing THEY are telling us by this is something like...
Look, we control everything and there is nothing you can do about it and we have had all under our control for many many years. All that you believe about "America is great because America is good" has always been a big lie. So just shut up and watch how nothing ever comes of this big Vault 7 matter either. I think we are to get the message also that we are nearing "end of game" time and THEY see no reason why to keep themselves hidden under a veil. THEY're taking off the mask.
This is absolutely true.
It's the reason Snowden is still alive (if he was ever really a "whistleblower").
It's also the reason Assange is still alive...these releases are not unwanted.
All part of the Psychodrome. Managed "thought" for the Goyim.
PatColo
7th March 2017, 12:13 PM
if any of you can tolerate the TV "news", how's the (((media))) responding to this dump, if at all? That would be the biggest "tell" I can think of. :)
old steel
7th March 2017, 02:12 PM
Do people like being spied upon?
https://pbs.twimg.com/media/C6VPmK3WMAEXw-x.jpg
monty
7th March 2017, 04:39 PM
"CIA uses techniques to make cyber attacks look like they originated from enemy state. It turns DNC/Russia hack allegation by CIA into a JOKE" (http://www.zerohedge.com/news/2017-03-07/wikileaks-hold-press-conference-vault-7-release-8am-eastern)
Wikileaks Unveils 'Vault 7': "The Largest Ever Publication Of Confidential CIA Documents"; Another Snowden Emerges (http://www.zerohedge.com/news/2017-03-07/wikileaks-hold-press-conference-vault-7-release-8am-eastern)
WikiLeaks has published (https://wikileaks.org/ciav7p1/)what it claims is the largest ever release of confidential documents on the CIA. It includes more than 8,000 documents as part of ‘Vault 7’, a series of leaks on the agency, which have allegedly emerged from the CIA's Center For Cyber Intelligence in Langley (https://wikileaks.org/ciav7p1/files/org-chart.png), and which can be seen on the org chart below, which Wikileaks also released (https://wikileaks.org/ciav7p1/files/org-chart.png):
http://www.zerohedge.com/sites/default/files/images/user5/imageroot/2017/03/06/Org%20chart%20CIA_0.png (http://www.zerohedge.com/sites/default/files/images/user5/imageroot/2017/03/06/Org%20chart%20CIA.png)
A total of 8,761 documents have been published (https://wikileaks.org/ciav7p1/cms/index.html)as part of ‘Year Zero’, the first in a series of leaks the whistleblower organization has dubbed ‘Vault 7.’ WikiLeaks said that ‘Year Zero’ revealed details of the CIA’s “global covert hacking program,” including “weaponized exploits” used against company products including “Apple's iPhone, Google's Android and Microsoft's Windows and even Samsung TVs, which are turned into covert microphones.”
WikiLeaks tweeted the leak, which it claims came from a network inside the CIA’s Center for Cyber Intelligence in Langley, Virginia.
Among the more notable disclosures which, if confirmed, "would rock the technology world (https://www.nytimes.com/2017/03/07/world/europe/wikileaks-cia-hacking.html?smid=tw-nytimes&smtyp=cur&_r=0)", the CIA had managed to bypass encryption on popular phone and messaging services such as Signal, WhatsApp and Telegram. According to the statement from WikiLeaks, government hackers can penetrate Android phones and collect “audio and message traffic before encryption is applied.”
Another profound revelation is that the CIA can engage in "false flag" cyberattacks which portray Russia as the assailant. Discussing the CIA's Remote Devices Branch's UMBRAGE group, Wikileaks' source notes that it "collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation.
"With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the "fingerprints" of the groups that the attack techniques were stolen from. UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques."
As Kim Dotcom summarizes this finding, "CIA uses techniques to make cyber attacks look like they originated from enemy state. It turns DNC/Russia hack allegation by CIA into a JOKE"
But perhaps what is most notable is the purported emergence of another Snowden-type whistleblower: the source of the information told WikiLeaks in a statement that they wish to initiate a public debate about the “security, creation, use, proliferation and democratic control of cyberweapons.” Policy questions that should be debated in public include “whether the CIA's hacking capabilities exceed its mandated powers and the problem of public oversight of the agency,” WikiLeaks claims the source said.
The FAQ section of the release, shown below, provides further details on the extent of the leak, which was “obtained recently and covers through 2016”. The time period covered in the latest leak is between the years 2013 and 2016, according to the CIA timestamps on the documents themselves. Secondly, WikiLeaks has asserted that it has not mined the entire leak and has only verified it, asking that journalists and activists do the leg work.
Among the various techniques profiled by WikiLeaks is “Weeping Angel”, developed by the CIA's Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones. After infestation, Weeping Angel places the target TV in a 'Fake-Off' mode, so that the owner falsely believes the TV is off when it is on. In 'Fake-Off' mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.
As Kim Dotcom chimed in on Twitter, "CIA turns Smart TVs, iPhones, gaming consoles and many other consumer gadgets into open microphones" and added " CIA turned every Microsoft Windows PC in the world into spyware. Can activate backdoors on demand, including via Windows update"
Dotcom also added that "Obama accused Russia of cyberattacks while his CIA turned all internet enabled consumer electronics in Russia into listening devices. Wow!"
Julian Assange, WikiLeaks editor stated that "There is an extreme proliferation risk in the development of cyber 'weapons'. Comparisons can be drawn between the uncontrolled proliferation of such 'weapons', which results from the inability to contain them combined with their high market value, and the global arms trade. But the significance of "Year Zero" goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective."
Key Highlights from the Vault 7 release so far:
"Year Zero" introduces the scope and direction of the CIA's global covert hacking program, its malware arsenal and dozens of "zero day" weaponized exploits against a wide range of U.S. and European company products, include Apple's iPhone, Google's Android and Microsoft's Windows and even Samsung TVs, which are turned into covert microphones.
Wikileaks claims that the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized "zero day" exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.
By the end of 2016, the CIA's hacking division, which formally falls under the agency's Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other "weaponized" malware. Such is the scale of the CIA's undertaking that by 2016, its hackers had utilized more code than that used to run Facebook.
The CIA had created, in effect, its "own NSA" with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.
Once a single cyber 'weapon' is 'loose' it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.
Snowden 2.0?
In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA's hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.
CIA targets iPhones, Androids, smart TVs:
CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA's DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details).
The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell's 1984, but "Weeping Angel", developed by the CIA's Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.
Also cars, suggesting that the CIA may have a role in the death of Michael Hastings:
As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks.
The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.
And computers:
The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized "zero days", air gap jumping viruses such as "Hammer Drill" which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( "Brutal Kangaroo") and to keep its malware infestations going.
Hoarding of Zero Day exploits:
In the wake of Edward Snowden's leaks about the NSA, the U.S. technology industry secured a commitment from the Obama administration that the executive would disclose on an ongoing basis — rather than hoard — serious vulnerabilities, exploits, bugs or "zero days" to Apple, Google, Microsoft, and other US-based manufacturers.
Serious vulnerabilities not disclosed to the manufacturers places huge swathes of the population and critical infrastructure at risk to foreign intelligence or cyber criminals who independently discover or hear rumors of the vulnerability. If the CIA can discover such vulnerabilities so can others.
Proliferation of leaked/hacked Cyberwar programs:
While nuclear proliferation has been restrained by the enormous costs and visible infrastructure involved in assembling enough fissile material to produce a critical nuclear mass, cyber 'weapons', once developed, are very hard to retain. Cyber 'weapons' are in fact just computer programs which can be pirated like any other. Since they are entirely comprised of information they can be copied quickly with no marginal cost.
Over the last three years the United States intelligence sector, which consists of government agencies such as the CIA and NSA and their contractors, such as Booze Allan Hamilton, has been subject to unprecedented series of data exfiltrations by its own workers.
Once a single cyber 'weapon' is 'loose' it can spread around the world in seconds, to be used by peer states, cyber mafia and teenage hackers alike.
The U.S. Consulate in Frankfurt is a covert CIA hacker base
In addition to its operations in Langley, Virginia the CIA also uses the U.S. consulate in Frankfurt as a covert base for its hackers covering Europe, the Middle East and Africa. CIA hackers operating out of the Frankfurt consulate ( "Center for Cyber Intelligence Europe" or CCIE) are given diplomatic ("black") passports and State Department cover.
The instructions for incoming CIA hackers make Germany's counter-intelligence efforts appear inconsequential: "Breeze through German Customs because you have your cover-for-action story down pat, and all they did was stamp your passport"
Examples of CIA projects
The CIA's Engineering Development Group (EDG) management system contains around 500 different projects (only some of which are documented by "Year Zero") each with their own sub-projects, malware and hacker tools. The majority of these projects relate to tools that are used for penetration, infestation ("implanting"), control, and exfiltration.
Umbrage: The CIA's Remote Devices Branch's UMBRAGE group collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation. With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the "fingerprints" of the groups that the attack techniques were stolen from.
Fine Dining: Fine Dining comes with a standardized questionnaire i.e menu that CIA case officers fill out. The questionnaire is used by the agency's OSB (Operational Support Branch) to transform the requests of case officers into technical requirements for hacking attacks (typically "exfiltrating" information from computer systems) for specific operations. Among the list of possible targets of the collection are 'Asset', 'Liason Asset', 'System Administrator', 'Foreign Information Operations', 'Foreign Intelligence Agencies' and 'Foreign Government Entities'. Notably absent is any reference to extremists or transnational criminals.
'Improvise'; a toolset for configuration, post-processing, payload setup and execution vector selection for survey/exfiltration tools supporting all major operating systems like Windows (Bartender), MacOS (JukeBox) and Linux (DanceFloor).
HIVE: HIVE is a multi-platform CIA malware suite and its associated control software. The project provides customizable implants for Windows, Solaris, MikroTik (used in internet routers) and Linux platforms and a Listening Post (LP)/Command and Control (C2) infrastructure to communicate with these implants. The implants are configured to communicate via HTTPS with the webserver of a cover domain; each operation utilizing these implants has a separate cover domain and the infrastructure can handle any number of cover domains.
And some key sections from the FAQ:
What time period is covered? The years 2013 to 2016. The sort order of the pages within each level is determined by date (oldest first). WikiLeaks has obtained the CIA's creation/last modification date for each page but these do not yet appear for technical reasons. Usually the date can be discerned or approximated from the content and the page order. If it is critical to know the exact time/date contact WikiLeaks.
What is "Vault 7" "Vault 7" is a substantial collection of material about CIA activities obtained by WikiLeaks.
What is the total size of "Vault 7"? The series is the largest intelligence publication in history.
When was each part of "Vault 7" obtained?: Part one was obtained recently and covers through 2016. Details on the other parts will be available at the time of publication.
Is each part of "Vault 7" from a different source? Details on the other parts will be available at the time of publication.
How did WikiLeaks obtain each part of "Vault 7"? Sources trust WikiLeaks to not reveal information that might help identify them.
Isn't WikiLeaks worried that the CIA will act against its staff to stop the series? No. That would be certainly counter-productive.
* * *
PREVIOUSLY
Joshua01
7th March 2017, 04:45 PM
Fair enough, I didn't understand, now you've helped me to understand it a lot better. Thanks!
Hey if you don't understand it, that's up to you. But the blockchain updates every 10 minutes and a new block ID is generated each time. That would be better that some bullshit news paper that can be photo-shopped at will.
monty
7th March 2017, 05:16 PM
What you need to know about Vault7
https://milo.yiannopoulos.net/2017/03/vault-7-tldr/
VAULT 7: WHAT YOU NEED TO KNOW
MARCH 7, 2017
POLITICS (https://milo.yiannopoulos.net/category/politics/)TECH (https://milo.yiannopoulos.net/category/tech/)65 COMMENTS (https://milo.yiannopoulos.net/2017/03/vault-7-tldr/#disqus_thread)2 MIN READ (https://milo.yiannopoulos.net/2017/03/vault-7-tldr/)
This morning, WikiLeaks released “the largest ever publication of confidential documents on the agency”. Since it can be quite difficult to search through the data yourself, we are assembling a list of the most notable information.
The CIA can masquerade its malware as belonging to a foreign intelligence agency. (https://milo.yiannopoulos.net/2017/03/cia-mimic-russian-hacking/)
The CIA stole hacking malware from the Russian Federation for their own use. (https://milo.yiannopoulos.net/2017/03/cia-mimic-russian-hacking/)
The CIA is hacking everyone, including US citizens. (https://wikileaks.org/ciav7p1/)
Every microphone and webcam is remote controllable. (https://wikileaks.org/ciav7p1/)
The CIA’s exploits have been leaked internally and can be used by (https://wikileaks.org/ciav7p1/)
unauthorized people to gain access to virtually anything. (https://wikileaks.org/ciav7p1/)
CIA malware can infiltrate iPhones, Androids, Windows Phones, and even your smart TV. (https://wikileaks.org/ciav7p1/)
The U.S. consulate in Frankfurt is a covert CIA hacker base. (https://wikileaks.org/ciav7p1/)
The CIA created air gap jumping viruses that infect CDs, DVDs, flash drives, etc. (https://wikileaks.org/ciav7p1/)
The CIA created malware that specifically evaded certain anti-virus programs. (https://wikileaks.org/ciav7p1/)
The CIA can hack cars for “undetectable assassinations” (https://milo.yiannopoulos.net/2017/03/wikileaks-cia-hack-cars/)
CIA malware can infiltrate your macOS and Windows computers. (https://wikileaks.org/ciav7p1/)
CIA malware infiltrates your smartphone to read messages on encrypted apps, before you send them. (https://wikileaks.org/ciav7p1/)
CIA malware can infiltrate Linux and routers. (https://wikileaks.org/ciav7p1/)
The CIA was supposed to reveal major vulnerabilities, but instead, hoarded them for their own use. (https://wikileaks.org/ciav7p1/)
Notepad++, a popular text editor, has a DLL hijack. (https://wikileaks.org/ciav7p1/cms/page_26968090.html)
The CIA steals saved passwords from Internet Explorer (https://wikileaks.org/ciav7p1/)
CIA can bypass Windows User Account Control (https://wikileaks.org/ciav7p1/)
CIA has Android malware that makes Android phones bulk-spy on WiFi networks around them. (https://twitter.com/wikileaks/status/839210002694942725)
[Updated to include point 18]
Horn
7th March 2017, 05:28 PM
How reassurring, I'm not sure there is any unknowns there.
crimethink
7th March 2017, 06:04 PM
Do people like being spied upon?
https://pbs.twimg.com/media/C6VPmK3WMAEXw-x.jpg
In 1984, the government installed telescreens in every home.
In America, the people themselves install telescreens aka "smart" TVs in every home. And even pay for them!
crimethink
7th March 2017, 06:07 PM
Hey if you don't understand it, that's up to you. But the blockchain updates every 10 minutes and a new block ID is generated each time. That would be better that some bullshit news paper that can be photo-shopped at will.
Such key merely demonstrates someone is using it.
Only a five-minute speech by Assange at the embassy window would be incontrovertible proof of life.
monty
7th March 2017, 06:32 PM
SGT Report, pretty much mirrors Dave Hodges Common Sense Show from this morning
http://youtu.be/HO_mSZLA8QU
https://youtu.be/HO_mSZLA8QU
PatColo
7th March 2017, 06:50 PM
vlogger Bait & Sketch; but I think we mostly get the idea by now... :rolleyes:
https://i.ytimg.com/vi/0aYGxhAPiiY/hqdefault.jpg?custom=true&w=336&h=188&stc=true&jpg444=true&jpgq=90&sp=68&sigh=qs0Y9r46XAnnP0PpA6qBzFZy4f4 (https://www.youtube.com/watch?v=0aYGxhAPiiY)
11:51
Vault 7: The CIA Can Hack Americans Cars, Phones, TVs and More (https://www.youtube.com/watch?v=0aYGxhAPiiY)
257 views
1 hour ago
crimethink
7th March 2017, 08:39 PM
Some of us have been telling society about all this for decades.
We have been laughed at and even angrily shouted down as "un-American."
Neither Snowden nor Vault 7 are "news" to us. Merely confirmation of what we already knew was happening. Only the specifics are concrete now.
Putting the little piece of tape (or, in my case, an aluminum foil "dot") over the webcam wasn't so loony after all, eh? The Faraday pouches weren't an "overreaction," yes?
crimethink
7th March 2017, 08:44 PM
CIA planned to hack cars and trucks to carry out undetectable assassinations claims WikiLeaks
http://www.mirror.co.uk/tech/year-zero-series-wikileaks-cia-9982483?service=responsive
The group said that from October 2014 the CIA was "looking at infecting the vehicle control systems used by modern cars and trucks" to possibly enable them to "engage in nearly undetectable assassinations."
FLASHBACK! September 2016:
Vladimir Putin’s chauffeur who died in horror smash ‘was assassinated by Western spies to send a violent message to Russian president’
https://www.thesun.co.uk/news/1741916/vladimir-putins-presidential-car-driver-who-died-in-car-crash-was-killed-in-political-assassination/
AND:
Michael Hastings Assassinated by CIA Remote Car Hack?
http://heavy.com/news/2017/03/wikileaks-vault-7-remote-car-hack-assassination-michael-hastings-conspiracy/
Joshua01
7th March 2017, 08:46 PM
I would have never thought I'd live to see the day that the MSM would actually report it! This is indeed unprecedented.
Some of us have been telling society about all this for decades.
We have been laughed at and even angrily shouted down as "un-American."
Neither Snowden nor Vault 7 are "news" to us. Merely confirmation of what we already knew was happening. Only the specifics are concrete now.
Putting the little piece of tape (or, in my case, an aluminum foil "dot") over the webcam wasn't so loony after all, eh? The Faraday pouches weren't an "overreaction," yes?
monty
7th March 2017, 09:33 PM
From Snowden's twitter
https://s19.postimg.org/62m281fdv/IMG_1525.png
monty
7th March 2017, 09:46 PM
I have been using AMD processors in my linux boxes for about 18 years. I do have an old Mac (2009) laptop with an intel processor.
https://s19.postimg.org/xr8pfk2eb/IMG_1526.png
ximmy
7th March 2017, 09:51 PM
LOL... is this a joke...Apple says it already fixed most of the hacks listed in "Vault 7."
soooo does this mean Apple knew previously about these hacks?
also, by saying it has fixed the hacks, Apple confirms the veracity of the "Vault 7" hacks...
----
Apple Says Many of the Vulnerabilities Detailed in 'Vault 7' Leaks Already Patched
Tuesday March 7, 2017 7:35 pm PST by Husain Sumra (https://www.macrumors.com/author/husain-sumra/)
Earlier today a new series (https://www.macrumors.com/2017/03/07/wikileaks-cia-ios-exploits/) of Wikileaks leaks that revealed the United States Central Intelligence Agency's efforts to hack iPhones. The leaks detail a number of iOS exploits that can be used to bypass security on devices. Tonight, Apple said in a statement provided (https://techcrunch.com/2017/03/07/apple-says-most-vulnerabilities-in-wikileaks-docs-are-already-patched/?ncid=rss) to TechCrunch that most of the vulnerabilities detailed in the leaks have been patched.
https://cdn.macrumors.com/article-new/2015/02/ios9security.jpg
“Apple is deeply committed to safeguarding our customers’ privacy and security. The technology built into today’s iPhone represents the best data security available to consumers, and we’re constantly working to keep it that way. Our products and software are designed to quickly get security updates into the hands of our customers, with nearly 80 percent of users running the latest version of our operating system. While our initial analysis indicates that many of the issues leaked today were already patched in the latest iOS, we will continue work to rapidly address any identified vulnerabilities. We always urge customers to download the latest iOS to make sure they have the most recent security updates."
Apple says its initial analyses indicates that many of the exploits detailed were patched in the latest version of iOS, and that it will continue to patch identified vulnerabilities. The Cupertino company closes by saying that it always urges users to download and install the latest version of iOS to ensure that they have the most recent security updates.
The Vault 7 revelations aren't the first time the CIA has targeted Apple's mobile devices. In 2015 it was reported (https://theintercept.com/2015/03/10/ispy-cia-campaign-steal-apples-secrets/) that the CIA worked on ways to compromise both iPhones and iPads.
The full list of so-called "Year Zero" documents can be found on found on Wikileaks (https://wikileaks.org/ciav7p1/cms/index.html)' website.
https://www.macrumors.com/2017/03/07/apple-wikileaks-vault-7-patched/
ximmy
7th March 2017, 10:00 PM
CNN still pretending "Vault 7" does not exist.
Instead, front page filled with hate stories on Trump.
CNN at 9:01 AM: Nothing was Found in Vault 7. (https://www.reddit.com/r/The_Donald/comments/5y0356/cnn_at_901_am_nothing_was_found_in_vault_7/) (self.The_Donald (https://www.reddit.com/r/The_Donald/))
submitted 16 hours ago by BakedBlunts (https://www.reddit.com/user/BakedBlunts)
"We have reviewed all the content inside of Vault 7 and we can assure you... There is nothing to see here."
Joshua01
7th March 2017, 10:02 PM
Seriously, CNN needs to be shut down ASAP
CNN still pretending "Vault 7" does not exist.
Instead, front page filled with hate stories on Trump.
CNN at 9:01 AM: Nothing was Found in Vault 7. (https://www.reddit.com/r/The_Donald/comments/5y0356/cnn_at_901_am_nothing_was_found_in_vault_7/) (self.The_Donald (https://www.reddit.com/r/The_Donald/))
submitted 16 hours ago by BakedBlunts (https://www.reddit.com/user/BakedBlunts)
"We have reviewed all the content inside of Vault 7 and we can assure you... There is nothing to see here."
crimethink
7th March 2017, 10:18 PM
From Snowden's twitter
https://s19.postimg.org/62m281fdv/IMG_1525.png
I do not have utmost confidence in it, but it's one reason I run Kaspersky instead of US-based "security" software. I'd rather have the KGB spying on me, than the Washington Criminals.
crimethink
7th March 2017, 10:27 PM
I have been using AMD processors in my linux boxes for about 18 years. I do have an old Mac (2009) laptop with an intel processor.
https://s19.postimg.org/xr8pfk2eb/IMG_1526.png
Given the choice, AMD vs. (((Intel))), the former is definitely the better. However, AMD is no panacea. There is only one option for real personal security, and that is no electronic devices at all.
Rockchip of China had promise to release an advanced SoC or even a CPU that was not NSA-approved or -proof, but even they are now selling out, and recently announced partnership with (((Intel))).
crimethink
7th March 2017, 10:29 PM
CNN still pretending "Vault 7" does not exist.
Instead, front page filled with hate stories on Trump.
CNN at 9:01 AM: Nothing was Found in Vault 7. (https://www.reddit.com/r/The_Donald/comments/5y0356/cnn_at_901_am_nothing_was_found_in_vault_7/) (self.The_Donald (https://www.reddit.com/r/The_Donald/))
submitted 16 hours ago by BakedBlunts (https://www.reddit.com/user/BakedBlunts)
"We have reviewed all the content inside of Vault 7 and we can assure you... There is nothing to see here."
Finally...but not a headline:
http://money.cnn.com/2017/03/07/technology/wikileaks-cia-hacking/index.html
Glass
7th March 2017, 10:40 PM
Apple Says Many of the Vulnerabilities Detailed in 'Vault 7' Leaks Already Patched
Many, but not all. And further in the press release it says "in the latest IOS". So how long were these vulnerabilities known and open?
Many people will be feel a sense of security based on this, without really thinking about the implications of Apples statement.
Neuro
7th March 2017, 11:05 PM
Maybe something like a non photoshopped picture of the man with today's paper might be a bit easier to disgest rather than all this hocus pocus bullshit techno crap. I'm sick of smioke sceeens that are always open for interpretation.
He should get out and wave and shout from the balcony of the Equadorian embassy.
PatColo
8th March 2017, 12:45 AM
LOL... is this a joke...Apple says it already fixed most of the hacks listed in "Vault 7."
soooo does this mean Apple knew previously about these hacks?
also, by saying it has fixed the hacks, Apple confirms the veracity of the "Vault 7" hacks...
----
Apple Says Many of the Vulnerabilities Detailed in 'Vault 7' Leaks Already Patched
I dismiss any talk, posturing, from the big tech corp's re how they're surprised by this wiki dump, and/or how they have, or are working overtime to "patch these vulnerabilities."
Coz said corps, at their highest & compartmentalized exec levels, have been in bed with the spooks all along, WRT their deliberate/engineered back doors for the spooks. It's a pre-req for being allowed to succeed & become "big time."
Their execs & boards are in the same secret societies, and/or the same (((trans-generational organized crime cult masquerading as a "religion"))), as the top levels of the spook agencies, after all.
PatColo
8th March 2017, 04:59 AM
couple shorter ones from Richie Allen; first is him solo, then the Lionel interview is VG!
https://i.ytimg.com/vi/jQxAZIQ478g/hqdefault.jpg?custom=true&w=336&h=188&stc=true&jpg444=true&jpgq=90&sp=68&sigh=F4gu9KyppyNUiqM88FkK6ufyQVc (https://www.youtube.com/watch?v=jQxAZIQ478g) 13:29
"With Vault 7, Wikileaks Are Once Again Not Telling Us Anything New. Who Are Wikileaks Really?" (https://www.youtube.com/watch?v=jQxAZIQ478g)
https://i.ytimg.com/vi/els5t9FpU5c/hqdefault.jpg?custom=true&w=336&h=188&stc=true&jpg444=true&jpgq=90&sp=68&sigh=eEDjAIfdAFDPCLmwJNKzFVMh3hI (https://www.youtube.com/watch?v=els5t9FpU5c) 28:00
Lionel "Wikileaks Vault 7 Shows That Trump Is Not Crazy. The CIA Spy On Everybody." (https://www.youtube.com/watch?v=els5t9FpU5c)
Hagmann show OTOH; 3 flippin hours!! I might poke my way through, maybe some part catches my interest? :(??
https://i.ytimg.com/vi/4KsgLJ4mBp8/hqdefault.jpg?custom=true&w=336&h=188&stc=true&jpg444=true&jpgq=90&sp=68&sigh=lw4TtEw0v03Wvg3rofvWiSVWSt4 (https://www.youtube.com/watch?v=4KsgLJ4mBp8) 3:00:50
Vault 7 Drops: TL Davis, William Ramsey & Stan Deyo (https://www.youtube.com/watch?v=4KsgLJ4mBp8)
10,228 views
8 hours ago
monty
8th March 2017, 05:03 AM
Dave Hodges Common Sense Show ~ Boston Brakes
http://youtu.be/32DIauzewAQ
https://youtu.be/32DIauzewAQ
Joshua01
8th March 2017, 05:49 AM
Trust no one! Question everything!
I dismiss any talk, posturing, from the big tech corp's re how they're surprised by this wiki dump, and/or how they have, or are working overtime to "patch these vulnerabilities."
Coz said corps, at their highest & compartmentalized exec levels, have been in bed with the spooks all along, WRT their deliberate/engineered back doors for the spooks. It's a pre-req for being allowed to succeed & become "big time."
Their execs & boards are in the same secret societies, and/or the same (((trans-generational organized crime cult masquerading as a "religion"))), as the top levels of the spook agencies, after all.
monty
8th March 2017, 05:53 AM
I do not have utmost confidence in it, but it's one reason I run Kaspersky instead of US-based "security" software. I'd rather have the KGB spying on me, than the Washington Criminals.
Hmm! Apple rejected Kaspersky in 2012, The Wikileaks Vault 7 release probably reveals the reason. Kaspersky does have security software for Mac and IOS. I have Kaspersky on the old Mac laptop.
From 2012. http://www.zdnet.com/article/kaspersky-denied-ios-app-apple-buries-its-head-in-the-security-sand/
Kaspersky denied iOS app: Apple buries its head in the security sand
Apple was in a Catch-22 situation, but ultimately denied Kaspersky's request for an iOS anti-virus app. The refusal crucially shows how much in denial Apple is over its devices' security.
By Zack Whittaker (http://gold-silver.us/forum/safari-reader://www.zdnet.com/meet-the-team/us/zack-whittaker/) for Between the Lines (http://gold-silver.us/forum/safari-reader://www.zdnet.com/blog/btl/) | May 22, 2012 -- 05:45 GMT (22:45 PDT) | Topic: Apple (http://gold-silver.us/forum/safari-reader://www.zdnet.com/topic/apple/)
Apple has denied Kaspersky's bid to develop anti-virus software for iOS devices, including the iPhone and iPad, and has warned that the decision will only lead to malware writers targeting the mobile operating system in the future.
Speaking to The Register (http://www.theregister.co.uk/2012/05/22/kaspersky_ios_antivirus/), the security firm's founder and chief executive Eugene Kaspersky said he was "a little bit disappointed" because "Apple won’t let us" develop a security solution for iOS.
iOS may not need protection, but Apple's reputation certainly does. The company looks weak in security circles. It was only a few weeks since Kaspersky claimed Apple was "10 years behind Microsoft" security wise (http://news.cnet.com/8301-13579_3-57421513-37/kaspersky-mac-security-is-10-years-behind-microsoft/).
http://zdnet1.cbsistatic.com/hub/i/2015/06/11/1f741e44-0ff8-11e5-9a74-d4ae52e95e57/iphone-business.png
Apple continues to bury its head over iOS and OS X security and seems to have no interest in changing its position. Even when Apple can't ignore a major malware attack, it stumbles into action days or weeks later. The rest of the time it sticks its fingers in its ears in the face of anybody criticising it.
For malware writers to successfully attack iOS en masse, malware has to pass itself off as an application and successfully navigate through the Apple App Store vetting procedure.
This is what happened with Charlie Miller. He wrote an application that phoned home to his server and injected code into his application. He was ultimately booted out of the Apple Developer Program (http://news.cnet.com/8301-27076_3-57320190-248/apple-boots-security-guru-who-exposed-iphone-exploit/) for not only breaking the phone-home rules, but for knowingly deceiving Apple during the submission process.
The other way is if iPhones and iPads are jailbroken and third-party applications --- with no application store vetting procedure --- is installed by the owner. Apple will likely say while jailbreaking is legal (http://www.zdnet.com/photos/15-reasons-to-jailbreak-your-iphone/6351901), it does not recommend it and will void the user's warranty. If iPhone or iPad users become infected with malware on a jailbroken device, it's not Apple's problem.
Except: it is. Apple can disassociate itself from jailbroken iPhones and iPads, but the brand damage alone will harm the company.
iOS currently has 29.9 percent of the global mobile market share according to recent Gartner figures (http://www.zdnet.com/blog/btl/gartner-samsung-steals-nokias-crown-as-global-phone-leader/77125), and 30.7 percent according to comScore's latest poll (http://www.comscore.com/Press_Events/Press_Releases/2012/5/comScore_Reports_March_2012_U.S._Mobile_Subscriber _Market_Share).
But because mobile market share is increasingly important and gaining on desktop or tablet numbers, it should come as no surprise that mobile devices are the next target on the malware writers' list.
Android and iOS take up the number one and two spots in global market share, though Android is way ahead of iOS. But Google Play, the new name for the Android Market, is far from perfect. No more than a month after Google said it would automatically scan uploaded Android applications for malware (http://news.cnet.com/8301-27080_3-57370650-245/google-now-scanning-android-apps-for-malware/), malware writers found another attack route: mobile websites (http://news.cnet.com/8301-1009_3-57426864-83/android-malware-now-spreading-through-hacked-web-sites/).
iPhones and iPads will be next on the list. It's inevitable, and bound to happen.
For Kaspersky, it cannot develop security features for iOS because Apple's SDK simply doesn't allow it. The antivirus maker notes that attacking iOS is "more complicated".
"They are happy with Windows computers. Now they are happy with Mac. They are happy with Android. It is much more difficult to infect iOS but it is possible and when it happens it will be the worst-case scenario because there will be no protection," Kaspersky said.
Apple still believes that Macs can do no wrong, and though it no longer makes the claim that Macs "doesn't get PC viruses," (http://gold-silver.us/forum/safari-reader://www.zdnet.com/article/kaspersky-denied-ios-app-apple-buries-its-head-in-the-security-sand/%E2%80%9CThey%20are%20happy%20with%20Windows%20com puters.%20Now%20they%20are%20happy%20with%20Mac.%2 0They%20are%20happy%20with%20Android.%20It%20is%20 much%20more%20difficult%20to%20infect%20iOS%20but% 20it%20is%20possible%20and%20when%20it%20happens%2 0it%20will%20be%20the%20worst-case%20scenario%20because%20there%20will%20be%20no %20protection.%20The%20Apple%20SDK%20won%E2%80%99t %20let%20us%20do%20it.%E2%80%9D) but it believes it can still say the same about iOS.
Macs have seen two major attacks in as many years: first with the Mac Defender outbreak, and this year with more than 600,000 Macs attacked by Flashback malware. As ZDNet's Ed Bott (http://www.zdnet.com/blog/bott/flashback-malware-exposes-big-gaps-in-apple-security-response/4904) succinctly puts it, the Flashback episode alone has thoroughly "exposed Apple’s security weak spots."
Windows has always been an attractive target for malware writers, with more than 90 percent of the global market share, while Apple has around 5--7 percent of the market. However, Apple's share is on the increase by around one percentage point per year (http://www.netmarketshare.com/operating-system-market-share.aspx?qprid=9&qpcustomb=0&qptimeframe=M&qpsp=136&qpnp=25).
On two fronts: by denying Kaspersky or any other malware protection company from the App Store shows weakness in long-term planning. It also looks weak if it does allow in anti-virus software, because it paints the impression that iOS is vulnerable and requires third-party help to stay secure.
The reason it doesn't is because Apple thinks iOS is not vulnerable to malware. And if you take jailbroken devices, that's the customer's decision and out of Apple's hands. If iOS does get attacked, Apple will likely take the same position it did with the Mac Defender malware and the Flashback outbreak by acting only after it is forced to do so by pressure from the public and the press.
Image credit: Josh Lowensohn/CNET (http://reviews.cnet.com/8301-19512_7-20073431-233/iphone-5-rumor-roundup/).
Related:
Has Apple done enough to fight malware on Macs? (http://www.zdnet.com/blog/bott/has-apple-done-enough-to-fight-malware-on-macs/3485)
Gartner: Samsung steals Nokia's crown as global phone leader (http://www.zdnet.com/blog/btl/gartner-samsung-steals-nokias-crown-as-global-phone-leader/77125)
comScore: RIM, Microsoft face mobile market share crisis (http://www.zdnet.com/blog/btl/comscore-rim-microsoft-face-mobile-market-share-crisis/73046)
CNET: Kaspersky: Mac security is '10 years behind Microsoft' (http://news.cnet.com/8301-13579_3-57421513-37/kaspersky-mac-security-is-10-years-behind-microsoft/)
Apple boots security guru who exposed iPhone exploit (http://news.cnet.com/8301-27076_3-57320190-248/apple-boots-security-guru-who-exposed-iphone-exploit/)
Google now scanning Android apps for malware (http://news.cnet.com/8301-27080_3-57370650-245/google-now-scanning-android-apps-for-malware/)
ZDNet: Malware charges users for free Android apps on Google Play (http://www.zdnet.com/blog/security/malware-charges-users-for-free-android-apps-on-google-play/12245)
Ares
8th March 2017, 05:59 AM
Fair enough, I didn't understand, now you've helped me to understand it a lot better. Thanks!
There is a website https://blockchain.info/ that tracks the blockchain. (Block creation, transactions etc.)
Once you visit the site, click on the latest block and you can then get the block ID.
They look like this:
Hash
000000000000000001ee93aa5cf3282de209a4f71d12f213dc 49c218475d0aa9
Previous Block
0000000000000000014432d69deda76a879e4b4645c62e2935 05fee316c55486
singular_me
8th March 2017, 01:11 PM
I'd take any further info with a grain of salt just in case Assange might not among the living anymore... at least until a few facts are confirmed several times
in the meantime, IF true, this is phenomenal
--------------------------------------------------
WikiLeaks publishes massive trove of CIA spying files in 'Vault 7' release
8 March 2017 GMT
https://www.youtube.com/watch?v=sZGl9oCbm8c
In publishing the documents, WikiLeaks had ensured that the CIA had "lost control of its arsenal", he claimed. That included a range of software and exploits that if real could allow unparalleled control of computers around the world.
http://www.independent.co.uk/life-style/gadgets-and-tech/news/wikileaks-cia-vault-7-julian-assange-year-zero-documents-download-spying-secrets-a7616031.html
What You Need To Know About The Vault 7 WikiLeaks Release
https://www.youtube.com/watch?v=ApJl2tR5NGQ
‘The American consulate in Frankfurt functions as a covert base for CIA hacking operations across Europe, the Middle East and Africa, the whistleblowing site WikiLeaks said, revealing the latest batch of their documents.
According to the leaked documents, the US consulate, located on Giessener Strasse opposite the Frankfurt cemetery, is the home of the Center for Cyber Intelligence Europe, or CCIE, which carries out hacking operations across the continent as well as the Middle East and Africa.
The documents reveal instructions for incoming hackers, containing not only mundane travel tips (“Flying Lufthansa: Booze is free so enjoy (within reason)!”) and details of local amenities (“Gas stations are not recommended for fine dining”) but also the official cover story should the agents be stopped by German customs, which is “supporting technical consultations at the Consulate.”’
Read more: WikiLeaks says CIA documents reveal US consulate in Frankfurt as hacking base
https://www.rt.com/news/379771-wikileaks-frankfurt-hacking-cia/?utm_source=browser&utm_medium=aplication_chrome&utm_campaign=chrome
TRUTHSTREAMMEDIA
https://www.youtube.com/watch?v=La3AiTmIWwY
Glass
8th March 2017, 07:54 PM
I'm so tired of "what you need to know" and "something something is good / bad / acceptable /evil, and Here's Why" and "X reasons for such and such bollocks".
What I want to know is, what do I use to find out if "Back door X Y or Z" is on my systems and how do I remove, block or put a spanner in the works of said X, Y or Z" so that it is valueless to them.
Everything else is noise.
monty
8th March 2017, 08:03 PM
I'm so tired of "what you need to know" and "something something is good / bad / acceptable /evil, and Here's Why" and "X reasons for such and such bollocks".
What I want to know is, what do I use to find out if "Back door X Y or Z" is on my systems and how do I remove, block or put a spanner in the works of said X, Y or Z" so that it is valueless to them.
Everything else is noise.
Quote for truth
Joshua01
8th March 2017, 08:05 PM
If the leaking of this information starts civil unrest, that will be bad. If it doesn't, that will be worse!!
Quote for truth
monty
8th March 2017, 08:08 PM
If the leaking of this information starts civil unrest, that will be bad. If it doesn't, that will be worse!!
But it is noticably quiet, the people don't care thay their phones are hacked or their TV spies on them.
old steel
8th March 2017, 08:30 PM
From what i've been reading it would appear all the hacking/spying was being used to gather info on competitors regarding contract bids etc for certain US corporations to gain an advantage.
If that is the case then couldn't all the countries and their corporations who were spied upon sue the US government and that would leave the US taxpayers holding the bill for all the lawsuits?
I don't think the CIA is interested in what Joe or Jane six pack has for breakfast or what brand of beer they drink.
monty
8th March 2017, 08:46 PM
I don't think the CIA is interested in what Joe or Jane six pack has for breakfast or what brand of beer they drink.
No, but if you find yourself in a situation like Cliven Bundy you can bet your bottom dollar the federal prosecutor will trot all that information out to use against you even if it lacks relevance.
Joshua01
8th March 2017, 08:53 PM
Bingo!!!!!!
no, but if you find yourself in a situation like cliven bundy you can bet your bottom dollar the federal prosecutor will trot all that information out to use against you even if it lacks relevance. [/color]
Glass
8th March 2017, 08:55 PM
No, but if you find yourself in a situation like Cliven Bundy you can bet your bottom dollar the federal prosecutor will trot all that information out to use against you even if it lacks relevance. [/COLOR]
yes, everything is a criminal act. It's just that they haven't codified all the crimes yet and When you will get prosecuted is the unknown variable. Leaving no fingerprints is the best option. Give them nothing. You have a ~400 year old Lawful right to privacy in your papers and person. You also have a right not to have to suffer the Barracking of the Crowns soldiers in your abode. This has been completely trampled upon.
As for joe six pack being a target, they will misuse what ever they have when ever it suits, even if only to do a favor for someone who can pull strings. This I know for fact.
crimethink
8th March 2017, 09:47 PM
You have a ~400 year old Lawful right to privacy in your papers and person. You also have a right not to have to suffer the Barracking of the Crowns soldiers in your abode.
"There is no such thing as absolute privacy in America; there is no place outside of judicial reach," [FBI Director James] Comey said at a Boston College conference on cybersecurity.
http://www.cnn.com/2017/03/08/politics/james-comey-privacy-cybersecurity/
https://infrakshun.files.wordpress.com/2015/02/640px-iao-logo-horz.jpg
Total Information Awareness = Total Government
Dachsie
8th March 2017, 10:16 PM
Here is Stephan Molyneaux's take on Vault 7.
...https://www.youtube.com/watch?v=ShyyPNcMXcY...
He really is not saying much of anything --
The government spying on everybody is bad because it prevents "free markets"...
the Internet is what allows us to be civilized (?) ....
we need to push back.
___________
The kinds of things revealed in the Vault 7 release so far are not anything new to us. We already knew THEY were spying on us in a big way.
What this release did do, among other things, is give veracity and specificity to who was doing it and what exact capabilities they have. These are valid leaks, just like all of the other leaks of Wikileaks. The CIA is for sure the agency that is doing this. The specificity is given when they leak shows us the tool exists and what specific things it can do such as a tool that allows a car to be taken over and crashed. That tells us for sure now that the government "suicides" people where before we had to only say it was our strong suspicion. (9-11 speaker of truth, Danny Jowenko)
All I am really sure about so far is that there are some very big power plays and fights going on between all factions of our government. It looks like the ante is getting higher and higher and that the game is for "all the marbles."
We do not have much reason to believe anything associated with our government tells us. Certainly our forms of entertaining ourselves for escape just further enslave us.
We all do know that the Constitution and our protected and enumerated "rights" have not been protected and upheld for a long time. They have only been something our government pretends sometimes to care about just to keep we the people under control. Now our government leaders can't even fool us with that kind of talk as they all have been working against us the basic tenets of our form of government and law for decades. This Vault 7 leak is a tiny part of what is to come and it itself is totally devastating.
Our "patriot" alternative media people keep telling us "THEY" are really scared now and "THEY" are really afraid of us millions of armed citizens, but I sometimes think that is just said to keep stringing us along with their hopium.
I am seeing my country trampled now, taken over by the dregs of humanity.
We the little people have no clue what is really going on in this big game now, but it does look like we are the ones being used as the poker chips.
This boiled old frog is not going to do any peaceful or non-peaceful forms of protest. Been there, done that.
I know Who is my only Help.
We are pressed on all sides, but not crushed; perplexed, but not in despair; persecuted, but not forsaken; struck down, but not destroyed.
2 Corinthians 4:9
Joshua01
8th March 2017, 10:24 PM
....and just like that your right to privacy is gone....POOF!
"There is no such thing as absolute privacy in America; there is no place outside of judicial reach," [FBI Director James] Comey said at a Boston College conference on cybersecurity.
http://www.cnn.com/2017/03/08/politics/james-comey-privacy-cybersecurity/
https://infrakshun.files.wordpress.com/2015/02/640px-iao-logo-horz.jpg
Total Information Awareness = Total Government
EE_
9th March 2017, 03:40 AM
I've said this a long time ago, you begged them to take your privacy away when you stood in line to take the mark of the beast.
If that wasn't enough, you wanted and bought other devices for your home that can talk to you. (talk to them)
http://i2.cdn.turner.com/money/dam/assets/121210074856-apple-store-line-monster.jpg
singular_me
9th March 2017, 05:35 AM
But it is noticably quiet, the people don't care thay their phones are hacked or their TV spies on them.
yes for the most part, people will feel vain and do nothing, but a few will escape the herd and join the rank of the freedom seekers. A critical mass must be reached before it affects the whole.
The problem with Truth is that awakening happens one mind at the time.... this is not a GROUPTHINK. ;D
People generally fall for groupthink because they are intellectually lazy or/and too busy chasing money
singular_me
9th March 2017, 05:44 AM
Glass, you might need to spend some time on a "hackers/programmers forum" for that
I'm so tired of "what you need to know" and "something something is good / bad / acceptable /evil, and Here's Why" and "X reasons for such and such bollocks".
What I want to know is, what do I use to find out if "Back door X Y or Z" is on my systems and how do I remove, block or put a spanner in the works of said X, Y or Z" so that it is valueless to them.
Everything else is noise.
singular_me
9th March 2017, 08:44 AM
unless it is his hologram talking or this has been shoot weeeeks ago, assange seems to be alive
LIVE STREAM: Julian Assange from Wikileaks Holds News Conference on CIA leaks
https://www.youtube.com/watch?v=qIJdU_ahXeY
Horn
9th March 2017, 10:27 AM
I've said this a long time ago, you begged them to take your privacy away when you stood in line to take the mark of the beast.
If that wasn't enough, you wanted and bought other devices for your home that can talk to you. (talk to them)
http://i2.cdn.turner.com/money/dam/assets/121210074856-apple-store-line-monster.jpg
But the Cloud is Nirvana, no?
Imagine if tptb were no longer able to hide...
https://youtu.be/n8aJG1f815Q
monty
9th March 2017, 05:51 PM
Bill Still ~ Top NSA Director confirms what we already know : NSA CIA spying capabilities.
http://youtu.be/MBAC01_qgmI
https://youtu.be/MBAC01_qgmI
Dachsie
9th March 2017, 07:10 PM
More good analysis by Barry Soetoro...
https://www.youtube.com/watch?v=zEVWJ-QmU0s
some comments...
Stanley Dent13 hours ago (edited)
Anyone who believes that Julian Assange can leak classified and very disturbing information about government corruption for 11 straight years and NOT get assassinated in the process is a retard. Let's look at Ted Gunderson, Bill Cooper, Michael Hastings, David Kelly, the 9 people involved in the BP oil spill, John Clifford Baxter, Pat Tillman, Michael Ruppert and the list goes on. These people were actual whistleblowers (good guys). Based on how the U.S. government treats ACTUAL good people we MUST assume that Assange is NOT one of these for the simple fact that he is still alive (or at minimum co-opted or replaced). Vault 7 is most likely being used to achieve multiple goals. All bad. This is how these people operate. Somehow, some way someone is making money from this leak. I don't know who or how, yet. But given the history of these pedo scumbags, somebody is making money.
_____________
Remember some bad guys are disappeared or suicided too.
Joshua01
9th March 2017, 07:39 PM
So we have been, and always will be controlled by the elite. Anyone here have a plan to get out of this mess??
More good analysis by Barry Soetoro...
https://www.youtube.com/watch?v=zEVWJ-QmU0s
some comments...
Stanley Dent13 hours ago (edited)
Anyone who believes that Julian Assange can leak classified and very disturbing information about government corruption for 11 straight years and NOT get assassinated in the process is a retard. Let's look at Ted Gunderson, Bill Cooper, Michael Hastings, David Kelly, the 9 people involved in the BP oil spill, John Clifford Baxter, Pat Tillman, Michael Ruppert and the list goes on. These people were actual whistleblowers (good guys). Based on how the U.S. government treats ACTUAL good people we MUST assume that Assange is NOT one of these for the simple fact that he is still alive (or at minimum co-opted or replaced). Vault 7 is most likely being used to achieve multiple goals. All bad. This is how these people operate. Somehow, some way someone is making money from this leak. I don't know who or how, yet. But given the history of these pedo scumbags, somebody is making money.
_____________
Remember some bad guys are disappeared or suicided too.
Dachsie
9th March 2017, 07:50 PM
I have already revealed my plan but here it is in brief again.
Withdraw from this system however you can and still live in it.
And be not conformed to this world; but be reformed in the newness of your mind, that you may prove what is the good, and the acceptable, and the perfect will of God.
Seek and expose the truth in whatever ways you can and let your thoughts, words and actions be truthful. If you sense that some are not worth the truth...
And whosoever will not receive you, when ye go out of that city, shake off even the dust of your feet, for a testimony against them.
Stop biting all the bait they are throwing at us. They are really wanting and needing our reaction. How we react is the antithesis part of the dialectic manipulation.
"Somebody has to do something!"
Try to think beyond the surface and if something just does not ring true to you, trust your gut and seek the real truth.
Glass
9th March 2017, 07:57 PM
"There is no such thing as absolute privacy in America; there is no place outside of judicial reach," [FBI Director James] Comey said at a Boston College conference on cybersecurity.
http://www.cnn.com/2017/03/08/politics/james-comey-privacy-cybersecurity/
https://infrakshun.files.wordpress.com/2015/02/640px-iao-logo-horz.jpg
Total Information Awareness = Total Government
yes, The problem is clear and we know what the solution is. It's right there in those images as well. But how... thats the key. I'm sure there is one ......somewhere. Without the structure the eye has nothing and without the eye, the structure has no purpose.
monty
10th March 2017, 01:06 PM
Veritas Libertas ~ CNN and most media controlled by CIA
http://youtu.be/FaiWd49gvUw
https://youtu.be/FaiWd49gvUw
crimethink
10th March 2017, 01:08 PM
Veritas Libertas ~ CNN and most media controlled by CIA
http://youtu.be/FaiWd49gvUw
https://youtu.be/FaiWd49gvUw
Correction: mainstream media and CIA controlled by the same masters.
monty
10th March 2017, 04:30 PM
Correction: mainstream media and CIA controlled by the same masters.
actually that is what I meant when I said most media, I didn't intend to include the independents.
old steel
10th March 2017, 09:42 PM
http://www.zerohedge.com/sites/default/files/pictures/picture-211636.jpg (http://www.zerohedge.com/users/inosent)
inosent (http://www.zerohedge.com/users/inosent) Mar 10, 2017 11:30 AM (http://www.zerohedge.com/news/2017-03-10/conflict-within-deep-state-just-broke-open-warfare#comment-9164803)
"mm hmm ... and where are all the 'progressive' cucks on this CIA thing? All the loud mouthed champions of civil rights, war protestors, and, back in the day (the parents of the snowflakes) "down with the man"?
Nowhere, that's where.
The hypocrisy, the stupidity, the intellectual and academic bankruptcy of these 'progressives' is as jaw dropping, stunning and incomprehensible as it is breathtaking in its scope.
I still say this all boils down to a spiritual problem. The only rational explanation for the apparent irrationality is 'progress' means the total subservience to Lucifer, Satan, and if these purported beings do not exist, then we can replace the labels with what we know does, Pure Evil.
This is nothing new. From the classic quote of the serpent to Eve, "hath God said?", to the raving lunatic Marquis de Sade (there are many other examples between then and MDS, just trying to capture the idea here), to this Alistar Crowly character, and a few other notable rebels of the Light and worshippers of Darkness.
The silver lining here is I believe the jew media only creates an illusion, so we think many more ppl are totally committed to Pure Evil than actually are. The bad news is we easily fall prey to the illusion, and it has the effect to increase the numbers of the lost.
With respect to this article, a good one, it is extraordinary how we have government agencies entirely devoted to an Evil purpose. Thankfully, and this is what I focus on, the numbers in these agencies (like all of them) are very small relative to the overall population. That means if some percentage of the zombies will snap out of it, and the good people act in unison, we can shut down these agencies for good.
The CIA is totally rotten and corrupt to the core. It is a threat to national AND global security. It's track record is abysmal. It has ONLY created death and misery and horrors to the world. It has made our nation very insecure and totally hated around the world.
And, Never Forget! we have the jews to thank for it."
I'm sure the CeeEyeEh is small potatoes compared to the black world of the deep state and i have no doubt they are loaded with Zionists too.
Glass
11th March 2017, 04:13 AM
I think all US media organizations have their origin as RCA. This organisation was a military operation which was gradually splintered in to differently branded media outlets. However each of these media outlets have retained this original control. As a result US media is and always has been military propaganda.
The rock music industry, which got its start in the 60's was populated almost completely by US mil special ops people. The folk bands that evolved the hippy movement were either the children of US mil and secret agencies or controlled by those people.
Dachsie
11th March 2017, 05:25 AM
...https://www.youtube.com/watch?v=La3AiTmIWwY...
https://www.youtube.com/watch?v=La3AiTmIWwY
Aaron Dykes and Melissa of their own TruthStream media
have put out a very good video.
It confirms what I had been thinking toward in the last day or so.
Vault 7 has the purpose of changing our attitude toward the Internet and our being routinely spied upon and accepting that there is no more fourth Amendment or privacy.
What was particularly interesting to me was the part where it was reported that someone had asked Wikileaks something like....
'why is not Wikileaks taken down or destroyed too ?"
and the Wikileak's answer was....
"That would be counterproductive."
Now that, folks, is an answer that does not ring true.
Like Melissa said, "counterproductive to who?"
So the theory or hypothesis of this video is that we are being trained via desensitization to accepting that the Internet's intrusion into our every waking and sleeping moment. We won't give up the Internet so just accepting it is our only choice.
It would be cool if we all could just get completely off the Internet but that is not completely possible. If we have a phone and we get out on the roads in a car or even just walk out in the public streets and buildings we are being filed and recorded.
_______________
The most important part of this video to me was...
What was particularly interesting to me was the part where it was reported that someone had asked Wikileaks something like....
'why is not Wikileaks taken down or destroyed too ?"
and the Wikileak's answer was....
"That would be counterproductive."
Now that, folks, is an answer that does not ring true.
Like Melissa said, "counterproductive to who?"
______
This tells us WikiLeaks is just another crooked part of Big Brother.
And since it was Wikileaks who made us all aware of Podesta emails and rampant pedophilia, maybe Wikileaks is to train us that we are supposed to just accept and get used to our Satanic pedophile overlords.
Seems to make sense to me.
PatColo
15th March 2017, 11:05 PM
Good detailed overview of vault 7 findings from this 2nd hour rense tonight, 48m
Listen (http://www.talkshoe.com/resources/talkshoe/images/swf/lastEpisodePlayer.swf?fileUrl=https://archive.org/download/Rense.20170315/Rense.20170315.2of3.mp3) Download (https://archive.org/download/Rense.20170315/Rense.20170315.2of3.mp3) Hour 2 - Charles R. Smith (http://www.softwar.net/) - WikiLeaks Vault7, What We Learned
Glass
15th March 2017, 11:21 PM
vault seven = 33
PatColo
26th December 2017, 11:55 AM
weird Assange/WL events over Dec 24/25-- JA's twitter account removed for ~12 hours, Navy tweet (https://twitter.com/wikileaks/status/945341503072800768). Some word of his WL office being raided over the weekend too.
look for peeps to start disseminating what this new 65 GB dump is; takes long to d/l,
9m:
https://i.ytimg.com/vi/B30cAwMfJUg/hqdefault.jpg?sqp=-oaymwEXCNACELwBSFryq4qpAwkIARUAAIhCGAE=&rs=AOn4CLB2x58lYlm0sqrlrN70J-MzmOxL3Q 8:52
(https://www.youtube.com/watch?v=B30cAwMfJUg)
Did ASSANGE LEAK THE CONTENTS OF WEINERS LAPTOP - "INSURANCE POLICY"? (https://www.youtube.com/watch?v=B30cAwMfJUg)
UNIROCK (https://www.youtube.com/channel/UCIQrZNGOPGakKKdJ1my6pvQ)
13 hours ago
19,086 views
ASSANGE's Twitter is BACK up, and now a file (huge, 65 gigs) is being downloaded across torrents around the net named
monty
22nd April 2020, 11:55 AM
Apparently wiki Leaks has made public all its files
https://file.wikileaks.org/file/
Cebu_4_2
22nd April 2020, 12:19 PM
Assange is dead?
monty
22nd April 2020, 03:41 PM
Assange is dead?
No idea
Powered by vBulletin® Version 4.2.0 Copyright © 2025 vBulletin Solutions, Inc. All rights reserved.