The Vault 7 exposé by WikiLeaks neglected to mention the most important part of the disclosure. Sure, the CIA has all these tools available. Yes, they are used on the public. The important part is; it’s not the CIA that’s using them. That’s the part that needs to frighten you.
The CIA, by the definition of its mission, cannot use the tools in Vault 7, and definitely not on Americans. All the tools are unclassified, open-source, and can be used by anyone. It makes them not exactly usable for secret agent work. That’s what makes it impossible for them to use Vault 7 tools directly. Because of the possible exposure for the agency, use of the tools was farmed out.
Instead, they are there for subcontractors to use. Are you worried about your TV watching you? Has your car developed the habit of starting itself in the morning?
If these tools were solely in the hands of a US agency, you would be much safer. The agencies have limits on what they can do and agencies have oversight providing protections.
Instead, intelligence and counterterrorism tools are in the hands of people that make most of their money pushing political agendas forward. And there is no oversight for what they are doing with the tools.
In March 2015, I started writing about private NSA guns for hire. These hired guns work in the revolving door between government Intel and counterterrorism and private intel and counterterrorism. What it showed was the same people that worked for US agencies and trained them were using the same tools and methods on Americans that they used for terrorist hunting. And they brag about it in social media.
The same people that take counterterrorism measures against Al Qaeda, are free to use those tools on you. According to CNN, Aaron Weisburd models his methods on the no-holds-barred Al Qaeda model.
sources close to U.S. intelligence as saying that “hackers knocked out Al Qaeda’s online means of communication, thus preventing them from posting anything to commemorate 911 anniversary.” The paper also said Western intelligence suspects two hackers were responsible: Aaron Weisburd from Internet Haganah and Rusty Shackleford from the web group My Pet Jawa.”
As much as 80 percent of the US National Security Agency’s (NSA) budget is privatized, demonstrating the merger between Washington and corporate organizations, WikiLeaks founder Julian Assange said Tuesday.”
In May 2015, The Nation published an article that is a must read to grasp how dangerous this has become. I’ve written intensively on how these tools are used to create news and policy from a ground and company level for NGO’s and lobbyists. This article ratchets it up by looking at the policy makers and former agency heads that go into the private Intel and policy crafting business for hire.
According to The Nation :
These are the people — often referred to as “intelligence professionals” — who do the actual analytical and targeting work of the NSA and other agencies in America’s secret government. Over the last 15 years, thousands of former high-ranking intelligence officials and operatives have left their government posts and taken up senior positions at military contractors, consultancies, law firms, and private-equity firms. In their new jobs, they replicate what they did in government—often for the same agencies they left. But this time, their mission is strictly for-profit.”
What does this have to do with overhauling the ODNI and 17 Intel agencies? Everything. From oversight to policy, the level of non-partisan professionalism needed to conduct unbiased intelligence work is no longer there. The Vault 7 leak could well be an inside attempt to address these issues.
“In the intelligence community in the United States, there are certain disgruntled individuals [concerned] about the way operations are being run, and it’s obvious that material has come out that was felt by some of these individuals needed to be discussed,” Kampmark explained.”
The ODNI and its agencies descent into shambles have been three presidencies in the making. Why a shambles? When intelligence is based on political agendas, rumor, or speculation instead of facts, it’s in trouble. All of it was done in the name of getting faster intelligence and making actionable Intel available to members of Congress that had no business getting involved with classified, need to know basis intelligence.
The second part of this article will address how much effect these intel releases have on breaking story news over the years.
Many of the Intel experts hired as contractors are not Intel experts. As you’ll soon see, a housecleaning at the agency level and contractors is both unavoidable and necessary.
I asked Michael Jasinski, Assistant Professor Department of Political Science University of Wisconsin–Oshkosh about this. Professor Jasinski had oversight over researchers that were later hired by US Intel agencies and provided evaluations of them prior to their employment.
His comments show why a radical cleanup in both intel and counter-terrorism needs to happen. With the following statement he also added that their obvious patriotic feelings were real, but:
“Considering how the intelligence community is depicted in the media or in the movies (and clearly CIA “outreach” plays a role here), you’d think Jedi Knights. The Justice League. Gandalf. But if you ever had personal contact with the “three-letter agencies” for any period of time, you’d think different.
My most recent experience with the “intelligence” community was at MIIS, post-9/11 when the agencies were coming there to hire, and they were hiring big. They hired many of my research assistants–I was doing what might be termed “open-source intelligence” on WMD proliferation–and in the process, they’d ask me, their immediate supervisor, for my opinion.
So I’d tell them point-blank: can’t read, can’t write, can’t analyze. I don’t care what their CV says, the only language they can function in at any level is English. No matter, they’d get hired anyway. Drug convictions? No matter, they’d get hired anyway (at least at the time, the CIA would hire you if you didn’t have any drug convictions within the last 3 years). Scary political views they wore on their sleeve? No matter, they’d get hired anyway. All of my good assistants went to work for the UN, IAEA, major NGOs. The dregs went to “intelligence.”
So now when I see a) the “Russian interference” stories and b) the inability to safeguard, and presumably use responsibly, your own cyber-warfare arsenal, I can’t say I’m exactly surprised. But there are no shortcuts in this kind of work. If you rapidly expand at the cost of dramatically lowering standards, you (and the country) are going to pay a price. We’re paying it right now…”
One thing all these people have in common is that none of them have a background in intelligence or antiterrorism. In the years before and after 9/11, these concerned citizens took to the web and started pioneering a new form of intelligence called OSINT (Open Source Intelligence). This would later provide the basis for the establishment of the NSA and become the backbone of US intelligence gathering.
All the intelligence gathering agencies rejected it at first because it relied on social media. At best this intelligence can only be looked at as unsubstantiated or rumor level information. While it’s OK for pointing to a potential problem, it’s limitations are that it provides unproven and possibly compromised and tainted information. The CIA was focused on HUMINT (Human Intel, using human agents or trusted sources) and SIGINT(Signals Intel/ communications).
These Open Source Intel pioneers started gaining ground by emailing community leaders and US Congressmen. They pushed OSINT to the forefront of US intelligence by sending it to anyone they thought would listen and forward their Intel to the US government. At first, they worked on the War on Terror.
Along the way, they collected letters of recommendation which they flashed around to the next prospective clients in government, Intel agencies, military, and lobbyists. This is important because letters of recommendation from people not in the Intel business became the basis for this new internet, Google search based, cottage industry.
Some of them work directly with Israeli intelligence. Most of these pioneers found ready help by sending their Intel to Israeli embassies that sent the info to US government agencies. At the same time, with the help of the connections they were making, they published news stories in major publications before US agencies had time to digest the information that they received. This forced the US government to react to their online Google-driven research.
Because it was Open Source Intel, these pioneers figured out quickly that they could send or sell the information BEFORE it was reviewed by an agency and classified. All Intel the CIA receives is given a classified rating whether it is open source or not. This one point increased the status of the practitioners.
Congressmen, Governors, and news outlets that were interested started getting the same “Intel” the CIA was. It also became clear quickly that the new Intel could be framed on whatever bias you chose. This meant it could be used to create policy.
Lobbyists and Congress quickly figured out that by using these sources, they could push pet or paid foreign policy forward. Because it was a private effort, OSINT operators got paid to deliver Intel for groups looking for specific insights. For instance, during the Gulf War, they searched for WMD and Al Qaeda connections.
From the mid-1990’s this became a boom industry thanks to pioneers Steve Emerson and Rita Katz. Emerson’s big break came with CNN after the 1995 Oklahoma City bombing. He was sure Islamists were behind it. Being wrong didn’t slow him down.
Before 9/11, Emerson and Katz open source Intel was being spread far and wide and thanks to personal networking efforts it made, then president Bush’s daily briefings about Al Qaeda. Emerson and Katz provided erroneous open source Intel to support Ahmed Chalabi’s drive for invading Iraq. This was personal to Katz and Intel agencies noted that most of her Intel is one-sided and politically charged.
Katz made it a habit of bombarding agencies and media with new social media findings that came so fast news cycles couldn’t keep up with it. To ignore her meant you could be scooped by another news agency. To publish it meant that it was unsubstantiated information.
For Katz, this came to a head in 2007 when she posted an Osama bin Laden interview online before Al Qaeda had a chance to. How many conclusions does this point to? Al Qaeda got the video from Katz.
A similar event occurred Friday when another group beat al-Qaeda by nearly a full day with the release of the first video images of bin Laden to appear publicly since 2004. That group, the SITE Institute, provided the tape to government agencies and news organizations at a time when many well-known jihadist Web sites had been shut down in a powerful cyber attack by unknown hackers.”
According to the Newsweek article “How Richard Clarke Outsourced Terrorist Intel,” both Emerson and Katz became the go-to companies for OSINT. US intelligence had no experience with it until this period. And US intel and law enforcement didn’t want any.
Emerson and Katz furnished Clarke and his staff with the names of Islamic radical Web sites, the identities of possible terrorist front groups and the phone numbers and addresses of possible terror suspects–data they were unable to get from elsewhere in the government.
This private pipeline of information–which began under President Clinton and continued under Bush even after September 11–irritated top officials at FBI headquarters, especially when much of the private research bore fruit and was later used to help develop a U.S. government list of banned organizations whose assets were frozen by the Treasury Department.”
After the Patriot Act, it was these two in particular and contractors like them that caused the “no-fly” lists to fill out so quickly. The search for terrorists had begun and it looks like it was paid on a piece-work basis. The more potential terrorists there were the more money in government contracts that could be had.
Until this point, Emerson and Katz research was funded by unnamed wealthy donors and foundations who had an interest in finding Islamic terrorists operating in the US online. In his book “Against All Enemies” Clarke writes “Within days” of his first request in late 1999, Emerson provided him “with a long list of Web sites sitting on servers in the United States.” Clarke then passed along the list to the Justice Department and FBI. But officials there balked at using it and complained at the time about “how difficult it was to prosecute ‘free speech’ cases.”
While all of this sounds good and noble, the reality was and is that most of the targeted websites were American citizens expressing free speech. The only qualification to get on their list for a news site or a website was to print anti-Zionist articles, pro-Palestinian articles, or write something against the policies their donors or lobbyist bosses were against. When the government refused to act, OSINT pioneers took it upon themselves to shut down, hack, makeup, and plant evidence on websites to try to get convictions.
Big media and the agencies themselves did their job letting the public know what was going on. Because no one understood the technology and therefore didn’t care about this, the problem grew to where it is today. As early as 2003 in the Chicago Tribune, the FBI gave warnings like this one about a particular website it was asked to investigate, “The site is not illegal in any way [nor does it condone] illegal activity,” said FBI spokesman Frank Bochte in Chicago. “We cannot be the Orwellian thought police. If it is mere words and nothing beyond that, there’s nothing we can do.”
The proof terrorist hunter Aaron Weisburd offered was simple. “It talks about the “Zionist” rope over American leaders and lists 45 Jews in top positions of U.S. government. A photo gallery features the burning of the American flag, and one section is called “Know Your Enemy.”
In 2005, the Washington Postinterviewed Weisburd and he unabashedly states his group uses the same tactics as Al Qaeda. He goes on to say that not everything they do is legal. According to his victims, he used the tools, access, and criminal activity to destroy their lives. They had nothing to do with the war on terror. They wrote human rights articles.
The Guardian made the point in November 2014 saying:
“Our choice isn’t between a world where either the good guys spy or the bad guys spy. It’s a choice of everybody gets to spy or nobody gets to spy.”
The privatized NSA makes its living off building hate. They are hired to drive headlines and policy. A longtime partner of Rita Katz and Aaron Weisburd drove these headlines in the UK.
‘Terror expert warns of ‘new 9/11’’, The Express, 1 January 2009; ‘Attack on US ‘soon’’, The Sun, 1 January 2009, ‘HATE HIT LIST’, The Sun, 7 January 2009
In her 2003 book “The Terrorist Hunter,” Rita Katz went as far as to say “the F.B.I., didn’t “possess one-thousandth of my knowledge on the relevant issues.”
Through agency overhaul in 2004, Congress set the stage and legislated the method that agencies and media warned would result in politically motivated, goal oriented reports loosely defined as intelligence. All of it affects policy today because a lot of it is designed to.
With over 20 years of experience, Steve Emerson must deliver crazy good OSINT intel to the US government. Just how good is the god-father of US government OSINT intel?
Unfortunately, this isn’t a joke. These same experts taught NATO, the FBI, CIA, NSA, and related agencies their expertise in the business through 6-week courses and seminars. They also testify as expert witnesses for Congress and supply an endless stream of Intel built on the policies their clients or prejudice dictates. Today’s DNI is filled with people that learned his methods.
How serious are they taken? The Information Operations Newsletter Vol. 12, no. 06 (April 2012) Compiled by: Mr. Jeff Harley, US Army Space and Missile Defense Command Army Forces Strategic Command G39, Information Operations Division quotes the above-listed OSINT pioneers as the experts to listen to.
Throughout 2015 and 2016, I followed a team of these OSINT pioneers setting up to attack people in the USA using these technologies. Because no one had ever cared before, they were very open about what they were doing in social media if you knew where to look. They geo-located victims, collected information, and added hackers in the group to attack American news websites.
I followed this group as they destroyed the income of news websites and started to destroy the reputations of owners and journalists. After documenting enough of the facts, I tried to contact the concerned parties directly and indirectly. I wrote a couple articles describing how it was happening and even quoted the group doing it describing what they were setting up for. This even included screen shots.
Why would they go as far as geo-location? Vault 7 makes that clear. The pioneer in this area also helped set up the Peacemaker website for Ukraine. This site provides kill lists with all the information known or needed to find someone. Within a month of my first article about Peacemaker in March 2015, the first victim was murdered.
It raises some serious questions about what is occurring in 2017. When it’s clear the people using Vault 7 tools don’t think of you as anything more than an enemy in a “Call of Duty” video game and they get paid for results, it’s time to question the legality.
When they do it for foreign governments, it’s time to bring up treason. When they turn around, work for government and then put the same people and news site on lists; Are they working for their private clients or for the US government? If you disagree with their employers’ politics, they get paid to destroy your life. They are a privatized NSA attacking you.
Part 2 of this article will show the second fork using these tools took. Understanding who is behind the stories about Russian election influence, hacking, and even the MH-17 disaster in 2014, and why they did it is an eye opener.
This dissects fake news and shows how prominent fabricated intelligence is in mainstream media. The article shows the methodology and the technicians that ignited and pushed the biggest controversies of the past few years.
These are the tools and these are the players that built the election interference and Russian hacking story. The 17 Intel agencies need a ground up rebuild.
George Eliason is an American journalist that lives and works in Donbass. He has been interviewed by and provided analysis for RT, the BBC, and Press-TV.
Who rules? Elected officials or the national security state? The fact this question is being asked reflects the dangerous times we live in. Governments collect intelligence to protect the state and citizens. Is intelligence now a political weapon of unelected stakeholders? CrossTalking with Michael Patrick Flanagan, Philip Giraldi, and Robert David Steele.
On January 30 NBC News reported that “On a snowy Polish plain dominated by Russian forces for decades, American tanks and troops sent a message to Moscow and demonstrated the firepower of the NATO alliance. Amid concerns that President Donald Trump’s commitment to NATO is wavering, the tanks fired salvos that declared the 28-nation alliance a vital deterrent in a dangerous new world.”
One intriguing aspect of this slanted account are the phrases “dominated by Russian forces for decades” and “vital deterrent” which are used by NBC to imply that Russia yearns, for some unspecified reason, to invade Poland. As is common in the Western media there is no justification or evidence to substantiate the suggestion that Russia is hell-bent on domination, and the fact that US troops are far from home, operating along the Russian border, is regarded as normal behaviour on the part of the world’s “indispensable nation.”
Then Reutersrecorded that “Beginning in February, US military units will spread out across Poland, the Baltic states, Bulgaria, Romania and Germany for training, exercises and maintenance. The Army is also sending its 10th Combat Aviation Brigade with about 50 Black Hawk and 10 CH-47 Chinook helicopters and 1,800 personnel, as well as a separate aviation battalion with 400 troops and 24 Apache helicopters.”
As the US-NATO military alliance continues its deployments along Russia’s borders, including the US-UK supported Joint Viking 2017 exercise in Norway that began on March 1 and the deployment of more US troops in Poland “from the start of April, as the alliance sets up a new force in response to Moscow’s 2014 annexation of Crimea,” the campaign by the US and British governments against alleged “Russian Aggression” continues to increase in volume and intensity, aided by an ever-compliant media.
During his visit to Washington on March 6-7 Ukraine’s foreign minister Pavlo Klimkin met with Secretary of State Rex Tillerson and Senator Marco Rubio of the Senate Committee on Foreign Relations and received assurances of US support in “confronting Russian aggression” while in Britain it was announced that its foreign minister, Boris Johnson, the “mop-haired buffoon” was about to visit Russia in order to tell it to “keep its nose” out of western affairs. Mr Johnson declared that Russia “was up to all sorts of no good” and “engaged in cyber-warfare.”
The splendid irony of the Johnson allegation about cyber warfare is that it came just before the revelation that Britain’s intelligence agencies were deeply involved with those of the United States in cyber-chicanery on a massive scale. WikiLeaks once again showed the depths of deceit and humbug to which the West’s great democracies submerge themselves, and revealed that leaked files “describe CIA plans and descriptions of malware and other tools that could be used to hack into some of the world’s most popular technology platforms. The documents showed that the developers aimed to be able to inject these tools into targeted computers without the owners’ awareness . . . the documents show broad exchanges of tools and information between the CIA, the National Security Agency and other US federal intelligence agencies, as well as intelligence services of close allies Australia, Canada, New Zealand and the United Kingdom.”
ABC News then announced, without a shred of proof, that “Julian Assange, the man behind WikiLeaks, appears to have a strong relationship with Russia” but could not disguise the report by CNN that the documents disclosed that “to hide its operations, the CIA routinely adopted techniques that enabled its hackers to appear as if they were Russian.”
There has been no comment on the WikiLeaks revelations by such as US Senator Amy Klobuchar who declared in January that “Russia used cyberattacks and propaganda to try and undermine our democracy. We are not alone. Russia has a pattern of waging cyberattacks and military invasions against democracies across the world.” She was echoed by Senator Ben Sasse who declared that increased US sanctions would “upend Putin’s calculus and defend America from Russian cyberattacks and political meddling.”
Of course it would be impossible for the Senators to revise their rabid hatred of Russia and overcome their dismal pride to acknowledge that on March 1 the US National Reconnaissance Office launched a spy satellite carried by an Atlas V rocket that was powered by a Russian RD-180 engine. In an astonishing example of petty-minded obfuscation, the 1,500-word official report on the launching mentioned RD-180 three times — but failed to state its country of manufacture. The mainstream media followed suit.
There was to be another Atlas V launch in March, carrying supplies to the International Space Station, but it was delayed by “a hydraulic issue that was uncovered on ground support equipment required for launch.” Had it been deferred because of malfunction of the Russian engine that powers it, there would have been gloating headlines.
Reaction by the US government to the WikiLeaks disclosures has been to denounce them because they supposedly “not only jeopardise US personnel and operations, but also equip our adversaries with tools and information to do us harm.” Predictably, Senator Sasse tweeted that “Julian Assange should spend the rest of his life wearing an orange jumpsuit. He’s an enemy of the American people and an ally to Vladimir Putin.”
There should be no surprise about the activities of US and British intelligence agencies, because they already have a proven record of spying on UN Secretary General Kofi Annan, Chancellor Merkel of Germany, French Presidents Jacques Chirac, Nicolas Sarkozy and François Hollande and Brazilian President Dilma Rousseff, to name but a few world leaders subjected to the indignity of greasy little eavesdroppers sniggering at their private conversations.
In June 2013 it was revealed that the United States of America had been spying on European Union computer networks in the EU offices in Washington and New York. According to Germany’s Der Spiegel a document of September 2010 “explicitly named the Union’s representation at the UN as a ‘location target’.” Der Spiegeldiscovered that “the NSA had also conducted an electronic eavesdropping operation in a building in Brussels where the EU Council of Ministers and the European Council were located.” Together with their British colleagues, the techno-dweebs of Government Communications Headquarters, the US agencies have been having a ball — but have been unable to prove that Russia “used cyberattacks and propaganda to try and undermine our democracy.”
The faithful CIA mouthpiece, the New York Times, stated in December that “American spy and law enforcement agencies were united in the belief, in the weeks before the presidential election, that the Russian government had deployed computer hackers to sow chaos during the campaign.” Not only this, but “CIA officials presented lawmakers with a stunning new judgment that upended the debate: Russia, they said, had intervened with the primary aim of helping make Donald J Trump president.”
But there is no evidence whatever that there was election-time hacking by Russia, and now there is proof that “to hide its operations, the CIA routinely adopted techniques that enabled its hackers to appear as if they were Russian.”
Although none of the assertions that Russia has been conducting a cyber war against America can be substantiated, Washington’s anti-Russia propaganda campaign will continue for the foreseeable future, while President Trump’s initial intentions to enter into dialogue with his counterpart in Moscow wither away to nothing. Even if he does resurrect the sensible policy he seemed to endorse, his acolytes in Washington will do their best to maintain confrontation by spreading more allegations of Russian “aggression” and “cyberattacks.” The anti-Russia campaign is gathering force, and it is not difficult to put a finger on why such a counter-productive crusade appeals to so many in the West.
The US arms and intelligence industries are the main beneficiaries of confrontation with Russia, closely followed by the hierarchy of the defunct US-NATO military alliance who have been desperately seeking justification for its existence for many years. For so long as the military-industrial complex holds sway in Washington, there will continue to be sabre-rattling and mindless military posturing.
But the International Space Station will continue to be resupplied by rockets powered by Russian engines.
Brian Cloughley writes about foreign policy and military affairs. He lives in Voutenay sur Cure, France.
It appears that the inquiry into Russia’s alleged interference in the 2016 presidential elections has finally stalled. Apparently, the problem is that new inconvenient truths regarding the inappropriate handling of intelligence information on Trump’s team continue to emerge.
The investigation into an alleged Russian interference in the 2016 presidential campaign has seemingly reached a deadlock.
Democrats have recently accused Republican Chairman of the House Intelligence Committee Devin Nunes of deliberately stalling the inquiry by canceling the committee’s meetings and urged him to recuse himself from the investigation.
On Monday night Rep. Adam B. Schiff called upon Nunes to remove himself from the inquiry.
“This is not a recommendation I make lightly, as the Chairman and I have worked together well for several years; and I take this step with the knowledge of the solemn responsibility we have on the Intelligence Committee to provide oversight on all intelligence matters, not just to conduct the investigation,” Schiff said in an official statement.
A Democratic chorus echoed Schiff on Tuesday.
“An investigation is only as credible as those who lead it. Chairman Nunes sacrificed his credibility & must recuse himself,” Rep. Kathleen Rice tweeted March 28.
The Democratic Party members Rep. Terry Sewell and Rep. Jackie Speier also issued statements calling upon Nunes to step aside or even to resign.
However, the chairman of the House Intelligence Committee signaled Tuesday that he would neither recuse himself nor resign and told CNN that the investigation “moves forward just like it was before.”
Still, it appears that it wasn’t the cancellation of the committee’s hearings involving former acting attorney general Sally Yates, FBI Director James Comey and NSA Director Michael Rogers that prompted deep concerns within the Democratic camp.
Apparently, the root of the matter lies in Nunes’ revelations regarding an illegal dissemination of “incidentally” collected intelligence on Donald Trump and his team.
Speaking to journalists last week, Nunes confirmed that the intelligence community “incidentally collected information about US citizens involved in the Trump transition.”
While the “incidental” gathering of sensitive information on US citizens is technically legal, the dissemination of such data is completely inappropriate, Mollie Hemingway of the Federalistpointed out while commenting on Nunes’ press conference.To make the situation even worse, none of the surveillance material collected on Trump’s team was connected to Russia or the investigation of Russian activities.
“Details about US persons associated with the incoming administration, details with little or no apparent foreign intelligence value, were widely disseminated in intelligence community reporting,” Nunes told reporters March 22, “Finally, I want to be clear, none of this surveillance was related to Russia or the investigation of Russian activities or of the Trump team.”
“When an administration is spreading around reports of political and personal discussions, failing to mask that information, and the information itself isn’t of foreign intelligence value, you have the makings of a huge scandal,” Hemingway highlighted.
To add to the Democrats’ confusion, Nunes announced Tuesday that he will not unveil — at least for a period of time — who exactly provided him with the intelligence reports revealing that Trump and his associates were subjected to incidental intelligence monitoring.
Currently, two separate investigations are going on, conservative media outlet Washington Examinerexplains.
The first one pertains to alleged Russian meddling in the US 2016 presidential campaign; the second one is a “potentially illegal handling of intelligence information on US persons by the intelligence community or the Obama administration.”
It is understandable that Nunes needs to take his time to look into both issues, the media outlet pointed out.
Moscow has repeatedly refuted groundless claims that the Russian government could have interfered in the US presidential election, calling attention to the fact that the US failed to present any evidence to confirm its allegations.
Although many details are still hazy because of secrecy – and further befogged by politics – it appears House Intelligence Committee Chairman Devin Nunes was informed last week about invasive electronic surveillance of senior U.S. government officials and, in turn, passed that information onto President Trump.
This news presents Trump with an unwelcome but unavoidable choice: confront those who have kept him in the dark about such rogue activities or live fearfully in their shadow. (The latter was the path chosen by President Obama. Will Trump choose the road less traveled?)
What President Trump decides will largely determine the freedom of action he enjoys as president on many key security and other issues. But even more so, his choice may decide whether there is a future for this constitutional republic. Either he can acquiesce to or fight against a Deep State of intelligence officials who have a myriad of ways to spy on politicians (and other citizens) and thus amass derogatory material that can be easily transformed into blackmail.
This crisis (yes, “crisis” is an overused word, but in this highly unusual set of circumstances we believe it is appropriate) came to light mostly by accident after President Trump tweeted on March 4 that his team in New York City’s Trump Towers had been “wiretapped” by President Obama.
Trump reportedly was relying on media reports regarding how conversations of aides, including his ill-starred National Security Advisor Michael Flynn, had been intercepted. Trump’s tweet led to a fresh offensive by Democrats and the mainstream press to disparage Trump’s “ridiculous” claims.
However, this concern about the dragnets that U.S. intelligence (or its foreign partners) can deploy to pick up communications by Trump’s advisers and then “unmask” the names before leaking them to the news media was also highlighted at the Nunes-led House Intelligence Committee hearing on March 20, where Nunes appealed for anyone who had related knowledge to come forward with it.
That apparently happened on the evening of March 21 when Nunes received a call while riding with a staffer. After the call, Nunes switched to another car and went to a secure room at the Old Executive Office Building, next to the White House, where he was shown highly classified information apparently about how the intelligence community picked up communications by Trump’s aides.
The next day, Nunes went to the White House to brief President Trump, who later said he felt “somewhat vindicated” by what Nunes had told him.
The ‘Wiretap’ Red Herring
But the corporate U.S. news media continued to heckle Trump over his use of the word “wiretap” and cite the insistence of FBI Director James Comey and other intelligence officials that President Obama had not issued a wiretap order aimed at Trump.
As those paying rudimentary attention to modern methods of surveillance know, “wiretapping” is passé. But Trump’s use of the word allowed FBI and Department of Justice officials and their counterparts at the National Security Agency to swear on a stack of bibles that the FBI, DOJ, and NSA have been unable to uncover any evidence within their particular institutions of such “wiretapping.”
At the House Intelligence Committee hearing on March 20, FBI Director Comey and NSA Director Michael Rogers firmly denied that their agencies had wiretapped Trump Towers on the orders of President Obama.
So, were Trump and his associates “wiretapped?” Of course not. Wiretapping went out of vogue decades ago, having been rendered obsolete by leaps in surveillance technology.
The real question is: Were Trump and his associates surveilled? Wake up, America. Was no one paying attention to the disclosures from NSA whistleblower Edward Snowden in 2013 when he exposed Director of National Intelligence James Clapper as a liar for denying that the NSA engaged in bulk collection of communications inside the United States.
The reality is that EVERYONE, including the President, is surveilled. The technology enabling bulk collection would have made the late demented FBI Director J. Edgar Hoover’s mouth water.
Allegations about the intelligence community’s abuse of its powers also did not begin with Snowden. For instance, several years earlier, former NSA worker and whistleblower Russell Tice warned about these “special access programs,” citing first-hand knowledge, but his claims were brushed aside as coming from a disgruntled employee with psychological problems. His disclosures were soon forgotten.
Intelligence Community’s Payback
However, earlier this year, there was a stark reminder of how much fear these surveillance capacities have struck in the hearts of senior U.S. government officials. Senate Minority Leader Chuck Schumer of New York told MSNBC’s Rachel Maddow that President Trump was “being really dumb” to take on the intelligence community, since “They have six ways from Sunday at getting back at you.”
Maddow shied away from asking the logical follow-up: “Senator Schumer, are you actually saying that Trump should be afraid of the CIA?” Perhaps she didn’t want to venture down a path that would raise more troubling questions about the surveillance of the Trump team than on their alleged contacts with the Russians.
Similarly, the U.S. corporate media is now focused on Nunes’s alleged failure to follow protocol by not sharing his information first with Rep. Adam Schiff, the ranking Democrat on the House Intelligence Committee. Democrats promptly demanded that Nunes recuse himself from the Russia investigation.
On Tuesday morning, reporters for CNN and other news outlets peppered Nunes with similar demands as he walked down a corridor on Capitol Hill, prompting him to suggest that they should be more concerned about what he had learned than the procedures followed.
That’s probably true because to quote Jack Nicholson’s character in “A Few Good Men” in a slightly different context, the mainstream media “cannot handle the truth” – even if it’s a no-brainer.
At his evening meeting on March 21 at the Old Executive Office Building, Nunes was likely informed that all telephones, emails, etc. – including his own and Trump’s – are being monitored by what the Soviets used to call “the organs of state security.”
By sharing that information with Trump the next day – rather than consulting with Schiff – Nunes may have sought to avoid the risk that Schiff or someone else would come up with a bureaucratic reason to keep the President in the dark.
A savvy politician, Nunes knew there would be high political cost in doing what he did. Inevitably, he would be called partisan; there would be more appeals to remove him from chairing the committee; and the character assassination of him already well under way – in The Washington Post, for example – might move him to the top of the unpopularity chart, displacing even bête noire Russian President Vladimir Putin.
But this episode was not the first time Nunes has shown some spine in the face of what the Establishment wants ignored. In a move setting this congressman apart from all his colleagues, Nunes had the courage to host an award ceremony for one of his constituents, retired sailor and member of the USS Liberty crew, Terry Halbardier.
Rep. Devin Nunes, R-California.
On June 8, 1967, by repairing an antennae and thus enabling the USS Liberty to issue an SOS, Halbardier prevented Israeli aircraft and torpedo boats from sinking that Navy intelligence ship and ensuring that there would be no survivors to describe how the Israeli “allies” had strafed and bombed the ship. Still, 34 American seamen died and 171 were wounded.
At the time of the award ceremony in 2009, Nunes said, “The government has kept this quiet I think for too long, and I felt as my constituent, he [Halbardier] needed to get recognized for the services he made to his country.” (Ray McGovern took part in the ceremony in Nunes’s Visalia, California office.)
Now, we suspect that much more may be learned about the special compartmented surveillance program targeted against top U.S. national leaders if Rep. Nunes doesn’t back down and if Trump doesn’t choose the road most traveled – acquiescence to America’s Deep State actors.
Ray McGovern served as a CIA analyst for 27 years and conducted one-on-one briefings of the President’s Daily Brief under Ronald Reagan from 1081 to 1985.
Bill Binney was former Technical Director, World Geopolitical & Military Analysis, NSA and co-founder of NSA’s SIGINT Automation Research Center before he retired after 9/11.
Devin Nunes just set the cat down among the pigeons.
Two days after FBI Director James Comey assured us there was no truth to President Trump’s tweet about being wiretapped by Barack Obama, the chairman of the House Intelligence Committee said Trump may have had more than just a small point.
The U.S. intelligence community, says Nunes, during surveillance of legitimate targets, picked up the names of Trump transition officials during surveillance of targets, “unmasked” their identity, and spread their names around, virtually assuring they would be leaked.
If true, this has the look and smell of a conspiracy to sabotage the Trump presidency, before it began.
Comey readily confirmed there was no evidence to back up the Trump tweet. But when it came to electronic surveillance of Trump and his campaign, Comey, somehow, could not comment on that.
Which raises the question: What is the real scandal here?
Is it that Russians hacked the DNC and John Podesta’s emails and handed them off to WikiLeaks? We have heard that since June.
Is it that Trump officials may have colluded with the Russians?
But former Director of National Intelligence James Clapper and ex-CIA Director Mike Morrell have both said they saw no evidence of this.
This March, Sen. Chris Coons walked back his stunning declaration about transcripts showing a Russia-Trump collusion, confessing, “I have no hard evidence of collusion.”
But if Clapper and Morrell saw no Russia-Trump collusion, what were they looking at during all those months to make them so conclude?
Was it “FBI transcripts,” as Sen. Coons blurted out?
If so, who intercepted and transcribed the conversations? If it was intel agencies engaged in surveillance, who authorized that? How extensive was it? Against whom? Is it still going on?
And if today, after eight months, the intel agencies cannot tell us whether or not any member of the Trump team colluded with the Russians, what does that say of their competence?
The real scandal, which the media regard as a diversion from the primary target, Trump, is that a Deep State conspiracy to bring down his presidency seems to have been put in place by Obamaites, and perhaps approved by Obama himself.
Consider. On Jan. 12, David Ignatius of the Washington Post wrote,
“According to a senior U.S. government official, (Gen. Michael) Flynn phoned Russian Ambassador Sergey Kislyak several times on Dec. 29, the day the Obama administration announced the expulsion of 35 Russian officials … What did Flynn say?”
Now, on Dec. 29, Flynn, national security adviser-designate, was not only doing his job calling the ambassador, he was a private citizen.
Why was he unmasked by U.S. intelligence?
Who is this “senior official” who dropped the dime on him? Could this official have known how many times Flynn spoke to Kislyak, yet not known what was said on the calls?
That is hard to believe. This looks like a contract hit by an anti-Trump agent in the intel community, using Ignatius to do the wet work.
Flynn was taken down. Did Comey turn his FBI loose to ferret out the felon who had unmasked Flynn and done him in? If not, why not?
In today’s Wall Street Journal, Dan Henninger points anew to a story in The New York Times of March 1 that began:
“In the Obama administration’s last days, some White House officials scrambled to spread information about Russian efforts to undermine the presidential election — and about possible contacts between associates of President-elect Trump and Russians — across the government.”
“This is what they did,” wrote Henninger, quoting the Times :
“At intelligence agencies, there was a push to process as much raw intelligence as possible into analyses, and to keep the reports at a relatively low classification level to ensure as wide a readership as possible across the government — and, in some cases, among European allies.”
For what benign purpose would U.S. intelligence agents spread secrets damaging to their own president — to foreign regimes? Is this not disloyalty? Is this not sedition?
On Jan. 12, writes Henninger, the Times “reported that Attorney General Loretta Lynch signed rules that let the National Security Agency disseminate ‘raw signals intelligence information’ to 16 other intelligence agencies.”
Astounding. The Obamaites seeded the U.S. and allied intel communities with IEDs to be detonated on Trump’s arrival. This is the scandal, not Trump telling Vlad to go find Hillary’s 30,000 missing emails.
We need to know who colluded with the Russians, if anyone did. But more critically, we need to unearth the deep state conspiracy to sabotage a presidency.
So far, the Russia-connection investigation has proven a dry hole. But an investigation into who in the FBI, CIA or NSA is unmasking U.S. citizens and criminally leaking information to a Trump-hating press to destroy a president they are sworn to serve could prove to be a gusher.
As for the reports of Lynch-White House involvement in this unfolding plot to damage and destroy Trump the real question is: What did Barack Obama know, and when did he know it?
FBI Director Comey’s and NSA Director Rogers’s public testimony to the House Intelligence Committee on Monday 20th March 2017 cast some interesting light on the ‘Russiagate’ allegations, though these were not the ones the media has sought to emphasise.
Firstly, almost from the moment the House Intelligence Committee began its session, the establishment media as one chose to highlight Comey’s public confirmation that the FBI is investigating Russia’s alleged interference in the US election, and that this involves investigating allegations of collusion between some of President Trump’s associates and the Russians, as if this was a major revelation.
Suffice to say that this was the headline story in all the British newspapers on Monday and on the BBC, as well as in the Washington Post. The confirmation was called a ‘bombshell’, or at least a ‘setback’ for the President.
It should be said clearly that it was nothing of the sort.
The fact that the FBI is investigating Russia’s alleged interference in the elections, and that this involves investigating allegations of collusion between some of President Trump’s associates and the Russians, has been all over the media for months, in fact since long before the election. It would have been nothing short of ridiculous, and would have served no purpose, if Comey had refused to confirm that such an investigation was underway when he appeared publicly before the Committee, and it would have rendered his entire public appearance before the Committee completely pointless had he done so.
It should also be said clearly that the mere fact that an investigation is underway is not in itself proof that any crime or wrongdoing was committed or that any person is guilty of anything. Comey made that very point in his testimony, and it is the reason why he – very properly – repeatedly refused to discuss individual cases. The way in which some sections of the media are trying to overturn the whole presumption of innocence by insinuating that the mere existence of an investigation is a sign of guilt, is actually shocking.
A far more important revelation to have come out of the Committee is that this is a counter-espionage not a crime investigation, and that it was (according to Comey) launched at the end of July 2016.
We can probably be a little more precise as to the precise date. On 22nd July 2016 Wikileaks began publishing the DNC emails. On 25th July 2016 the FBI publicly confirmed that it was investigating the hack of the DNC’s computers (though in the event it never actually examined them). That suggests that the investigation was launched between those dates, ie. almost immediately after Wikileaks started publishing the DNC emails.
That is important since the US intelligence community did not publish its first assessment that Russia was behind the DNC and Podesta leaks before October 2016, and did not publish its final assessment until January 2017.
In other words someone decided between 22nd and 25th July 2016 – long before any intelligence assessments had been published blaming Russia, and directly after the DNC leaks appeared – that the Russians were responsible, and initiated an FBI counter-espionage investigation.
What this also means is that this investigation was underway throughout the critical weeks of the election, with Donald Trump’s associates, and quite possibly (indeed probably) Donald Trump himself, being investigated and monitored by the FBI and by other US intelligence agencies throughout the election period as part of a counter-espionage investigation.
There was no word at the House Intelligence Committee hearing of who was the person or persons who initiated the investigation, or what were the reasons for doing so before any intelligence assessments blaming the Russians had been published.
For the record, I will say that though Barack Obama was the President at the time, and would have been receiving any confidential intelligence assessments, I am sure he was not that person.
Despite the denials of physical wiretaps of Trump Tower, that an investigation and surveillance operation of at least some of Donald Trump’s associates and quite possibly of Donald Trump himself was underway during the election period is therefore now officially confirmed as fact, and is no longer subject to doubt.
I would add that since this was a counter-espionage investigation and not a crime investigation, it was and could be launched despite the fact that neither in July 2016 nor at any time since has there been any evidence of wrongdoing on the part of those US citizens who are being investigated and who might have been placed under surveillance.
We know this for a fact because numerous sources, including Devin Nunes, the Committee Chair who together with the other members of the Committee receives in private classified updates of the progress of the investigation, have told us as much.
One particular point constantly made by Hillary Clinton’s supporters – that Comey treated Hillary Clinton unfairly by making public the FBI’s investigation of Hillary Clinton’s use of a private server whilst concealing the ‘far more serious investigation’ of the contacts between Donald Trump’s associates and Russia – might as well be addressed at this point.
Hillary Clinton’s defenders who make this claim consistently underestimate the seriousness of the issue of her misuse of a private server. The key point anyway is that these are two completely different types of investigation.
The investigation into Hillary Clinton’s use of a private server was a crime investigation into a potential federal felony. The investigation into the contacts between Donald Trump’s associates and Russia falls under a counter-espionage investigation, in which they are not necessarily suspected of any crime or wrongdoing. Since this is a counter-espionage investigation whose subject is classified, and which has been brought in the absence of any suspicion of any crime or wrongdoing by any particular person, it would have been wholly wrong for Comey to disclose its existence until the Justice Department gave him permission to do so, which it only did just before his appearance before the Committee on Monday.
One other important fact came out of the Committee hearing.
The Republicans on the Committee have rallied behind the President, almost certainly because – as Nunes says – the investigation has produced no evidence of any crime or wrongdoing by anyone. Instead, to Comey’s obvious unease, they are refusing to let the question of who was responsible for the leaking of the classified information that destroyed General Flynn’s career rest.
Both Representative Schiff for the Democrats and Representative Gowdy for the Republicans set out in public for the Committee the persons who each believes should be investigated, in the one case for collusion with the Russians, in the other for leaking the information about General Flynn.
It should be stressed that in neither case has any evidence been published against any of these persons. Nunes and Gowdy have however correctly pointed out that in contrast to the claims about collusion with Russia, in the case of the leaking of classified information to destroy General Flynn there is no doubt that a federal felony was committed. That does make Gowdy’s list of names at least interesting
GOWDY: I guess what I’m getting at, Director Comey, is you say it’s vital, you say it’s critical, you say it’s indispensable. We both know it’s a threat to the reauthorization of 702 later on this fall. And by the way, it’s also a felony punishable by up to 10 years.
So how would you begin your investigation, assuming for the sake of argument that a U.S. citizen’s name appeared in the Washington Post and the New York Times unlawfully. Where would you begin that investigation?
COMEY: Well, I’m not gonna talk about any particular investigation…
GOWDY: That’s why I said in theory.
COMEY: You would start by figuring out, so who are the suspects? Who touched the information that you’ve concluded ended up unlawfully in the newspaper and start with that universe and then use investigative tools and techniques to see if you can eliminate people, or include people as more serious suspects.
GOWDY: Do you know whether Director Clapper knew the name of the U.S. citizen that appeared in the New York Times and Washington Post ?
COMEY: I can’t say in this forum because again, I don’t wanna confirm that there was classified information in the newspaper.
GOWDY: Would he have access to an unmasked name?
COMEY: In — in some circumstances, sure, he was the director of national intelligence. But I’m not talking about the particular.
GOWDY: Would Director Brennan have access to an unmasked U.S. citizen’s name?
COMEY: In some circumstances, yes.
GOWDY: Would National Security Adviser Susan Rice have access to an unmasked U.S. citizen’s name?
COMEY: I think any — yes, in general, and any other national security adviser would, I think, as a matter of their ordinary course of their business.
GOWDY: Would former White House Advisor Ben Rhodes have access to an unmasked U.S. citizen’s name?
COMEY: I don’t know the answer to that.
GOWDY: Would former Attorney General Loretta Lynch have access to an unmasked U.S. citizen’s name?
COMEY: In general, yes, as would any attorney general.
GOWDY: So that would also include Acting AG Sally Yates?
COMEY: Same answer.
GOWDY: Did you brief President Obama on — well, I’ll just ask you. Did you brief President Obama on any calls involving Michael Flynn?
COMEY: I’m not gonna get into either that particular case that matter, or any conversations I had with the president. So I can’t answer that.
I have recently written that the true scandal of the 2016 US Presidential election is that under cover of a counter-espionage investigation cooked up through a wave of anti-Russian hysteria US citizens who had been accused of no wrongdoing were being investigated and placed under surveillance by the US’s intelligence and security agencies during the election. Despite all the evasions and qualifications that came from the Committee and from Comey and Rogers during the hearings, there is now official confirmation that this investigation and surveillance during this election actually took place.
What was interesting is that their questions about the leaks suggest that the Republicans on the Committee are beginning to see it this way, and are starting to look beyond the cloud of anti-Russian paranoia which has been blown up to confuse the issue. This is why they homed in on the question of who was behind the leaks that destroyed General Flynn.
As for the Democrats, they may also be starting to sense this as well. Glenn Greenwald thinks they are starting to have doubts about ‘Russiagate’, and I think he is right. That no doubt explains the frantic attempts of people like Schiff to keep ‘Russiagate’ going by conjuring up more and more claims against people like Manafort and Carter Page, who must by now have been investigated already. It may also explain some of the fantastic language some of the Democrats on the Committee resorted to.
Comey said that the FBI investigation is open-ended and has far to go. Given the stakes involved, I wonder whether it will report at all.
Americans are ill-governed and ill-served by officials at all levels of government – federal, state and local.
On Monday, clear evidence showed it. Disgraceful witch-hunt McCarthyism was on display for viewers tuning in to see.
Hysterical House Select Committee on Intelligence members disgraced themselves during tediously long testimony by FBI Director James Comey and NSA head Michael Rogers.
Committee members obsessed over nonexistent Trump ties to Russia, his charges about Obama wiretapping him, nonexistent Moscow US election hacking, Putin bashing, and security leaks.
Comey acknowledged an ongoing classified investigation into alleged Russian interference in America’s presidential election, saying:
“I have been authorized by the Department of Justice to confirm that the FBI as part of our counterintelligence mission is investigating the Russian government’s efforts to interfere in the 2016 presidential election.”
“And that includes investigating the nature of any links between individuals associated with the Trump campaign and the Russian government, and whether there was any coordination between the campaign and Russia’s efforts.”
“As with any counterintelligence investigation, this will also include an assessment of whether any crimes were committed.”
He offered no further elaboration despite hours of badgering by committee members to explain more.
The proceedings amounted to orchestrated McCarthyism, infamous witch-hunt hysteria, a disgusting display.
Russia was demonized for nonexistent US election hacking. Comey stopped short of suggesting collusion between Trump’s campaign and Moscow – because of an ongoing investigation he’s not at liberty to discuss.
After months of bashing Russia and Trump, no evidence surfaced of collusion between him, his campaign and Moscow – or proof of Russian US election hacking. None exists, yet baseless accusations persist.
Trump addressed Monday’s proceedings via multiple tweets, saying:
“James Clapper and others stated that there is no evidence Potus colluded with Russia. This story is FAKE NEWS and everyone knows it!”
“The Democrats made up and pushed the Russian story as an excuse for running a terrible campaign. Big advantage in Electoral College & lost!”
“The real story that Congress, the FBI and all others should be looking into is the leaking of Classified information. Must find leaker now!”
“What about all of the contact with the Clinton campaign and the Russians? Also, is it true that the DNC would not let the FBI in to look?”
Last fall Putin asked “is America a banana republic?” Televised Monday proceedings provided more evidence of a politically corrupt system too debauched to fix.
Of greater concern is creating pretexts for war on Russia. House Intelligence Committee chairman Devin Nunes (R. CA) claimed nonexistent “pressing threats posed by the Russian autocrat (sic)” Putin, urging “stronger action against Russian belligerence.”
Stoking conflict between the world’s top nuclear powers is madness. Is this where things are heading?
Will neocons infesting Washington risk nuclear armageddon to satisfy their lust for unchallenged power?
The Kremlin has been accused of launching large-scale cyberwar ostensibly aimed at undermining democracy in the United States, with high-profile hacks on the Democratic Party cited as evidence, but technology pioneer and founder of McAfee securities John McAfee told Radio Sputnik that Russia is not behind these high-profile cyberattacks.
“I can promise you it was not the Russians who hacked the Democratic National Committee (DNC). The software used was way too old. The state hackers would not use an old version of software which was less functional than the updated versions,” he said. “One of the things that the CIA said and I’ve been saying for years is that it is virtually impossible to find attribution for any hack because a good hacker can hide their tracks plus make it look like someone else did it. This happens all the time.”
It is extremely likely that if a cyberattack appears to have originated in Russia or China for instance, it was in fact launched from a third country. In this case locations are placed specifically to hide the tracks of the true perpetrator, he explained.
McAfee suggested that there could be political motivation behind accusations that Russia launched cyberattacks on the Democratic National Committee (DNC) and John Podesta, the former chairman of the 2016 Hillary Clinton presidential campaign.
Vladimir Putin is “possibly the most powerful man in the world. America resents that. The Democrats for some reason hate Putin. I think Donald Trump is far wiser,” he said, referring to Trump’s pledge to improve relations with Russia which were ruined during the Obama administration. “If in fact they spoke with each other daily, wouldn’t we have a more harmonious world? And yet here in America we are trashing people for speaking to Putin. It’s bizarre.”
McAfee further commented on recent revelations with regard to the CIA’s hacking secrets. He expressed doubt that the US intelligence community could be made more accountable and transparent if stricter rules on its operations are passed.
“I’ve never seen a covert agency adhere to any kind of legislation. We all know that murder is illegal in almost every country and yet there is not a single covert agency in America, except possibly for the FBI, that does not engage in assassinations. We all know this. I don’t think legislation is needed. I think that we need a firm hand. We need to fire the directors and management all the way down to the street agent and then start over,” he said.
McAfee also said that cyberwar could have far more serious implications than a nuclear conflict.
“We are not in a nuclear age anymore. There will not be another nuclear war because cyberwar is far more devastating. The tools will eventually be in the hands of hackers because this is what happens when you build weaponized software. The first time you use it you send a copy into the wild and every researcher in the world has a copy of that. It can then be duplicated and in a year from now, these tools will be sold on the dark web by 15-year-old boys for a hundred dollars,” he explained.
It is the leakiest of times in the Executive Branch. Last week, Wikileaks published a massive and, by all accounts genuine, trove of documents revealing that the CIA has been stockpiling, and lost control of, hacking tools it uses against targets. Particularly noteworthy were the revelations that the CIA developed a tool to hack Samsung TVs and turn them into recording devices and that the CIA worked to infiltrate both Apple and Google smart phone operating systems since it could not break encryption. No one in government has challenged the authenticity of the documents disclosed.
We do not know the identity of the source or sources, nor can we be 100% certain of his or her motivations. Wikileaks writes that the source sent a statement that policy questions “urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency” and that the source “wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyber-weapons.”
The FBI has already begun hunting down the source as part of a criminal leak investigation. Historically, the criminal justice system has been a particularly inept judge of who is a whistleblower. Moreover, it has allowed the use of the pernicious Espionage Act—an arcane law meant to go after spies—to go after whistleblowers who reveal information the public interest. My client, former NSA senior official Thomas Drake, was prosecuted under the Espionage Act, only to later be widely recognized as a whistleblower. There is no public interest defense to Espionage Act charges, and courts have ruled that a whistleblower’s motive, however salutary, is irrelevant to determining guilt.
The Intelligence Community is an equally bad judge of who is a whistleblower, and has a vested interest in giving no positive reinforcement to those who air its dirty laundry. The Intelligence Community reflexively claims that anyone who makes public secret information is not a whistleblower. Former NSA and CIA Director General Michael V. Hayden speculated that the recent leaks are to be blamed on young millennials harboring some disrespect for the venerable intelligence agencies responsible for mass surveillance and torture. Not only is his speculation speculative, but it’s proven wrong by the fact that whistleblowers who go to the press span the generational spectrum from Pentagon Papers whistleblower Daniel Ellsberg to mid-career and senior level public servants like CIA torture whistleblower John Kiriakou and NSA whistleblower Thomas Drake to early-career millennials like Army whistleblower Chelsea Manning and NSA whistleblower Edward Snowden. The lawbreaker does not get to decide who is a whistleblower.
Not all leaks of information are whistleblowing, and the word “whistleblower” is a loaded term, so whether or not the Vault 7 source conceives of him or herself as a whistleblower is not a particularly pertinent inquiry. The label “whistleblower” does not convey some mythical power or goodness, or some “moral narcissism,” a term used to describe me when I blew the whistle. Rather, whether an action is whistleblowing depends on whether or not the information disclosed is in the public interest and reveals fraud, waste, abuse, illegality or dangers to public health and safety. Even if some of the information revealed does not qualify, it should be remembered that whistleblowers are often faulted with being over- or under-inclusive with their disclosures. Again, it is the quality of the information, not the quantity, nor the character of the source.
Already, the information in the Vault 7 documents revealed that the Intelligence Community has misled the American people. In the wake of Snowden’s revelations, the Intelligence Community committed to avoid the stockpiling of technological vulnerabilities, publicly claiming that its bias was toward “disclosing them” so as to better protect everyone’s privacy. However, the Vault 7 documents reveal just the opposite: not only has the CIA been stockpiling exploits, it has been aggressively working to undermine our Internet security. Even assuming the CIA is using its hacking tools against the right targets, a pause-worthy presumption given the agency’s checkered history, the CIA has empowered the rest of the hacker world and foreign adversaries by hoarding vulnerabilities, and thereby undermined the privacy rights of all Americans and millions of innocent people around the world. Democracy depends on an informed citizenry, and journalistic sources—whether they call themselves whistleblowers or not—are a critical component when the government uses national security as justification to keep so much of its activities hidden from public view.
As we learn more about the Vault 7 source and the disclosures, our focus should be on the substance of the disclosures. Historically, the government’s reflexive instinct is to shoot the messenger, pathologize the whistleblower, and drill down on his or her motives, while the transparency community holds its breath that he or she will turn out to be pure as the driven snow. But that’s all deflection from plumbing the much more difficult questions, which are: Should the CIA be allowed to conduct these activities, and should it be doing so in secret without any public oversight?
These are questions we would not even be asking without the Vault 7 source.
Jesselyn Radack is a national security and human rights attorney who heads the “Whistleblower & Source Protection” project at ExposeFacts. Twitter: @jesselynradack
The WikiLeaks exposure of thousands of documents relating to the Central Intelligence Agency’s (CIA) hacking program, which was expanded dramatically under President Barack Obama between 2013 and 2016, has created something of a panic in the users of cell phones, online computers and even for smart television viewers. The documents describe “more than a thousand hacking systems, trojans, viruses and other ‘weaponized’ malware” and one document even identifies attempts to enable CIA controllers to take control of automobiles that have “On Star” or similar satellite interactive features.
According to analysts who have gone through the documents, any electronic device that is connected to the internet is reported to be vulnerable to being taken over and “weaponized,” manipulated through its microphone or camera function even if it appears to be turned off. Apple, Google, Android and Microsoft products were among the technologies that were targeted, with the security systems being constantly probed for vulnerabilities. When a flaw was discovered it was described as “zero day” because the user would have zero time to react to the detection and exploitation of the vulnerability.
And they are indeed everywhere. Ron Paul has described a woman’s test on the Amazon marketed interactive voice controlled device called Alexa, asking it if it were reporting to the CIA. Alexa, which allegedly cannot tell a lie, refused to answer.
According to Wikipedia, “Alexa is an intelligent personal assistant developed by Amazon Lab126, made popular by the Amazon Echo. It is capable of voice interaction, music playback, making to-do lists, setting alarms, streaming podcasts, playing audiobooks, and providing weather, traffic, and other real time information.” One reviewer observed “In a good but scary feature, Amazon Echo can learn a person’s habits over time. It will get used to the way a person talks, his/her habits and routines and will save all the data in the cloud.”
Alexa demonstrates that CIA and NSA intrusion into the lives of ordinary people is not unique. In the cyber-sphere there are many predators. Amazon has apparently run special sales to get Alexa devices into as many homes as possible, presumably for commercial reasons, to have a machine in one’s home that will eventually replace the cookies on computers that collect information on what people are interested in buying. The company’s president Jeff Bezos also recently completed a deal worth $600 million for Amazon to provide cloud hosting services for the Agency. And there are, of course, two clear conflicts of interest in that deal as Bezos is selling a device that can be hacked by the government while he also owns The Washington Post newspaper, which, at least in theory, is supposed to be keeping an eye on the CIA.
But spying for profit and spying by the government are two different things and the WikiLeaks revelations suggest that the CIA has had a massive program of cyberespionage running for a number of years, even having created a major new division to support the effort called the Directorate for Digital Innovation, with an operation component called the Center for Cyber Intelligence. Media reports also suggest that a major hub for the operation was the American Consulate General in Frankfurt Germany, where the Agency established a base of operations.
First of all, it is necessary to make an attempt to understand why the CIA believes it needs to have the capability to get inside the operating systems of phones and other devices which rely on the internet. It should be pointed out that the United States government already has highly developed capabilities to get at phones and other electronics. It is indeed the principal raison d’etre of the National Security Agency (NSA) to do so and the FBI also does so when it initiates wiretaps during criminal and national security investigations.
Beyond that, since the NSA basically collects all electronic communications in the United States as well as more of the same fairly aggressively overseas, it would seem to be redundant for the CIA to be doing the same thing. The CIA rationale is that it has a different mission than the NSA. It exists to conduct espionage against foreign intelligence targets, which frequently requires being able to tap into their personal phones or other electronic devices by exploiting vulnerabilities in the operating systems. As the targets would be either sources or even prospective agents, the Agency would have to protect their identity in the highly compartmented world of intelligence, making outsourcing to NSA problematical.
This need to develop an independent capability led to the development of new technologies by the CIA working with its British counterparts. There were apparently successful efforts to target Samsung “smart” televisions, which would use their speakers to record conversations even when the set was turned off. The project was called “Weeping Angel,” and other hacking programs were called “Brutal Kangaroo,” “Assassin,” “Hammer Drill,” “Swindle,” “Fine Dining” and “Cutthroat,” demonstrating that government bureaucrats sometimes possess a dark sense of humor.
Being able to enter one’s home through a television would be considered a major success in the intelligence world. And the ability to access cell phones at source through obtaining full control of the operating system rather than through their transmissions means that any security system will be ineffective because the snoopers will be able to intrude and hear the conversation as it is spoken before any encryption is applied. CIA and its British allies were reportedly able to take control of either Android or i-Phones through vulnerabilities in their security systems by using their attack technologies.
WikiLeaks claims to have 8,761 documents detailing efforts to circumvent the security features on a broad range of electronic devices to enable them to be remotely tapped, the information having apparently been passed to WikiLeaks by a disgruntled government contractor, though the Russians are perhaps inevitably also being blamed. The U.S. government has apparently been aware of the theft of the information for the past year and one presumes it has both done damage control and is searching for the miscreant involved. Also, there have been security fixes on both Apple and Android phones in the past year that might well have rendered the attack technologies no longer effective.
So many will shrug and wonder what the big deal is. So the CIA is tapping into the electronics of suspected bad guys overseas. Isn’t that what it’s supposed to do? That question has to be answered with another question: How do we know if that is all the CIA is doing? Technology that can attack and take control of a telephone or television or computer overseas can also do the same inside the United States. And the Agency can always plausibly claim that a connection with a suspect overseas leads back to the U.S. to enable working on related targets on this side of the Atlantic.
Another issue is the possibility to engage in mischief, with potentially serious consequences. The WikiLeaks documents suggest that the CIA program called UMBRAGE had been able to acquire malware signatures and attack codes from Russia, China, Iran and other places. It does that so it can confuse detection systems and preserve “plausible denial” if its intrusion gets caught, disguising its own efforts as Russian or Chinese to cast the blame on the intelligence services of those countries. It has been alleged that the hack of the Democratic National Committee computers was carried out by Moscow employed surrogates and part of the evidence produced was signature malware that had left “fingerprints” linked to Russian military intelligence in Ukraine. What if that hack was actually done by the CIA for domestic political reasons?
Critics have also pointed out that President Obama in 2014 had come to an agreement with major communications industry executives to share with manufacturers information regarding the vulnerabilities in their systems so they could be addressed and made secure. This would have benefited both the industry and the general public. The agreement was obviously ignored in the CIA case and is just another sign that one cannot trust the government.
However, the real downside regarding the CIA hacking is something that might not even have occurred yet. It is an unfortunate reality that government spying operations largely lack regulation, oversight or any effective supervision by Congress or anyone else outside the agencies themselves. Even if knowledge about communications vulnerabilities has not been employed illegally against American targets or to mislead regarding domestic hacks, the potential to use those capabilities once they are in place will likely prove too hard to resist. As such, no home or work environment will any more be considered a safe place and it is potentially, if not actually, the greatest existing threat to Americans’ few remaining liberties.
New revelations from Wikileaks’ ‘Vault 7’ leak shed a disturbing light on the safeguarding of privacy. Something already known and largely suspected has now become documented by Wikileaks. It seems evident that the CIA is now a state within a state, an entity out of control that has even arrived at the point of creating its own hacking network in order to avoid the scrutiny of the NSA and other agencies.
Reading the revelations contained in the documents released by WikiLeaks and adding them to those already presented in recent years by Snowden, it now seems evident that the technological aspect regarding espionage is a specialty in which the CIA, as far as we know, excels. Hardware and software vendors that are complicit — most of which are American, British or Israeli — give the CIA the opportunity to achieve informational full-spectrum dominance, relegating privacy to extinction. Such a convergence of power, money and technology entails major conflicts of interest, as can be seen in the case of Amazon AWS (Amazon’s Cloud Service), cloud provider for the CIA, whose owner, Jeff Bezos, is also the owner of The Washington Post. It is a clear overlap of private interests that conflicts with the theoretical need to declare uncomfortable truths without the need to consider orders numbering in the millions of dollars from clients like the CIA.
While it is just one example, there are thousands more out there. The perverse interplay between media, spy agencies and politicians has compromised the very meaning of the much vaunted democracy of the land of the Stars and Stripes. The constant scandals that are beamed onto our screens now serve the sole purpose of advancing the deep interest of the Washington establishment. In geopolitical terms, it is now more than obvious that the deep state has committed all available means toward sabotaging any dialogue and détente between the United States and Russia. In terms of news, the Wikileaks revelations shed light on the methods used by US intelligence agencies like the CIA to place blame on the Kremlin, or networks associated with it, for the hacking that occurred during the American elections.
Perhaps this is too generous a depiction of matters, given that the general public has yet to see any evidence of the hacking of the DNC servers. In addition to this, we know that the origin of Podesta’s email revelations stem from the loss of a smartphone and the low data-security measures employed by the chairman of Hillary Clinton’s presidential campaign. In general, when the 16 US spy agencies blamed Russia for the hacking of the elections, they were never specific in terms of forensic evidence. Simply put, the media, spies and politicians created false accusations based on the fact that Moscow, together with RT and other media (not directly linked to the Kremlin), finally enjoy a major presence in the mainstream media. The biggest problem for the Washington establishment lies in the revelation of news that is counterproductive to the interests of the deep state. RT, Sputnik, this site and many others have diligently covered and reported to the general public every development concerning the Podesta revelations or the hacking of the DNC.
Now what is revealed through Wikileaks’ publications in Vault 7 is the ability of a subsection of the CIA, known as Umbrage, to use malware, viruses, trojans and other cyber tools for their own geopolitical purposes. The CIA’s Umbrage collects, analyzes and then employs software created variously from foreign security agencies, cyber mafia, private companies, and hackers in general. These revelations become particularly relevant when we consider the consequences of these actions. The main example can be seen in the hacking of the DNC. For now, what we know is that the hacking – if it ever occurred – is of Russian origin. This does not mean at all that the Kremlin directed it. It could actually be very much the opposite, its responsibility falling into the category of a cyber false-flag. One thing is for sure: all 16 US intelligence agencies are of the view that “the Russians did it”. That said, the methods used to hack vulnerabilities cannot be revealed, so as to limit the spread of easily reusable exploits on systems, such as the one that hosted the DNC server. It is a great excuse for avoiding the revelation of any evidence at all.
So, with little information available, independent citizens are left with very little information on which to reliably form an opinion on what happened. There is no evidence, and no evidence will be provided to the media. For politicians and so-called mainstream journalists, this is an acceptable state of affairs. What we are left with instead is blind faith in the 16 spy agencies. The problem for them is that what WikiLeaks revealed with Vault 7 exposes a scenario that looks more likely than not: a cyber false-flag carried out by the Central Intelligence Agency using engineered malware and viruses made in Russia and hypothetically linking them back to hacking networks in Russia. In all likelihood, it looks like the Democrats’ server was hacked by the CIA with the clear objective of leaving Russian fingerprints and obvious traces to be picked up by other US agencies.
In this way, it becomes easier to explain the unique views of all 16 spy agencies. Thus, it is far more likely that the CIA intentionally left fake Russian fingerprints all over the DNC server, thereby misleading other intelligence agencies in promoting the narrative that Russia hacked the DNC server. Of course the objective was to create a false narrative that could immediately be picked up by the media, creating even more hysteria surrounding any rapprochement with Russia.
Diversification of computer systems.
The revelations contained in the Wikileaks vault 7 (less than 1 % of the total data in Wikileaks’ possession has been released to date) have caused a stir, especially by exposing the astonishing complicity between hardware and software manufacturers, often intentionally creating backdoors in their products to allow access by the CIA and NSA. In today’s digital environment, all essential services rely on computer technology and connectivity. These revelations are yet more reason why countries targeted by Washington, like China, Russia, Iran and North Korea, should get rid of European and American products and invest in reducing technological dependence on American products in particular.
The People’s Republic has already started down this track, with the replacement of many network devices with local vendors like Huawei in order to avoid the type of interference revealed by Snowden. Russia has been doing the same in terms of software, even laying the groundwork to launch of its own operating system, abandoning American and European systems. In North Korea, this idea was already put into practice years ago and is an excellent tool for deterrence for external interference. In more than one computer security conference, US experts have praised the capabilities of the DPRK to isolate its Internet network from the rest of the world, allowing them to have strong safety mechanisms. Often, the only access route to the DPRK systems are through the People’s Republic of China, not the easiest way for the CIA or NSA to infiltrate a protected computer network.
An important aspect of the world in which we live today involves information security, something all nations have to deal with. At the moment, we still live in a world in which the realization of the danger and effect of hacking attacks are not apparent to many. On the other hand, militarily speaking, the diversification and rationalization of critical equipment in terms of networks and operability (smartphones, laptops, etc) has already produced strong growth in non-American and European manufacturers, with the aim of making their systems more secure.
This strengthening of technology also produces deleterious consequences, such as the need for intelligence agencies to be able to prevent the spread of data encryption so as to always enjoy access to any desired information. The birth of the Tor protocol, the deployment of Bitcoin, and apps that are more and more encrypted (although the WikiLeaks documents have shown that the collection of information takes place on the device before the information is encrypted) are all responses to an exponential increase in the invasion of privacy by federal or American government entities.
We live in a world that has an enormous dependence on the Internet and computer technology. The CIA over the years has focused on the ability to make sure vulnerable systems are exploited as well as seeking out major security flaws in consumer products without disclosing this to vendors, thereby taking advantage of these security gaps and leaving all consumers with a potential lack of security. Slowly, thanks to the work and courage of people like Snowden and Assange, the world is beginning to understand how important it is to keep personal data under control and prevent access to it by third parties, especially if they are state actors. In the case of national security, the issue is expanded exponentially by the need to protect key and vital infrastructure, considering how many critical services operate via the Internet and rely on computing devices.
The wars of the future will have a strong technological basis, and it is no coincidence that many armed forces, primarily the Russian and Chinese, have opted in recent years toward training troops, and conducting operations, not completely relying on connectivity. No one can deny that in the event of a large-scale conflict, connectivity is far from guaranteed. One of the major goals of competing nations is to penetrate the military security systems of rival nations and be able to disarm the internal networks that operate major systems of defense and attack.
The Wikileaks revelations are yet another confirmation of how important it is to break the technological unipolar moment, if it may be dubbed this way, especially for nations targeted by the United States. Currently Washington dictates the technological capacities of the private and government sectors of Europe and America, steering their development, timing and methods to suit its own interests. It represents a clear disadvantage that the PRC and its allies will inevitably have to redress in the near future in order to achieve full security for its vital infrastructure.
Instead of high-quality education, these institutions are fostering a global neo-feudal system reminiscent of the British Raj
By Dr. Mathew Maavak | RT | May 30, 2025
In a move that has ignited a global uproar, US President Donald Trump banned international students from Harvard University, citing “national security” and ideological infiltration. The decision, which has been widely condemned by academics and foreign governments alike, apparently threatens to undermine America’s “intellectual leadership and soft power.” At stake is not just Harvard’s global appeal, but the very premise of open academic exchange that has long defined elite higher education in the US.
But exactly how ‘open’ is Harvard’s admissions process? Every year, highly qualified students – many with top-tier SAT or GMAT test scores – are rejected, often with little explanation. Critics argue that behind the prestigious Ivy League brand lies an opaque system shaped by legacy preferences, DEI imperatives, geopolitical interests, and outright bribes. George Soros, for instance, once pledged $1 billion to open up elite university admissions to drones who would read from his Open Society script.
China’s swift condemnation of Trump’s policy added a layer of geopolitical irony to the debate. Why would Beijing feign concern for “America’s international standing” amid a bitter trade war? The international standing of US universities has long been tarnished by a woke psychosis which spread like cancer to all branches of the government.
So, what was behind China’s latest gripe? ... continue
This site is provided as a research and reference tool. Although we make every reasonable effort to ensure that the information and data provided at this site are useful, accurate, and current, we cannot guarantee that the information and data provided here will be error-free. By using this site, you assume all responsibility for and risk arising from your use of and reliance upon the contents of this site.
This site and the information available through it do not, and are not intended to constitute legal advice. Should you require legal advice, you should consult your own attorney.
Nothing within this site or linked to by this site constitutes investment advice or medical advice.
Materials accessible from or added to this site by third parties, such as comments posted, are strictly the responsibility of the third party who added such materials or made them accessible and we neither endorse nor undertake to control, monitor, edit or assume responsibility for any such third-party material.
The posting of stories, commentaries, reports, documents and links (embedded or otherwise) on this site does not in any way, shape or form, implied or otherwise, necessarily express or suggest endorsement or support of any of such posted material or parts therein.
The word “alleged” is deemed to occur before the word “fraud.” Since the rule of law still applies. To peasants, at least.
Fair Use
This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc. We believe this constitutes a ‘fair use’ of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. For more info go to: http://www.law.cornell.edu/uscode/17/107.shtml. If you wish to use copyrighted material from this site for purposes of your own that go beyond ‘fair use’, you must obtain permission from the copyright owner.
DMCA Contact
This is information for anyone that wishes to challenge our “fair use” of copyrighted material.
If you are a legal copyright holder or a designated agent for such and you believe that content residing on or accessible through our website infringes a copyright and falls outside the boundaries of “Fair Use”, please send a notice of infringement by contacting atheonews@gmail.com.
We will respond and take necessary action immediately.
If notice is given of an alleged copyright violation we will act expeditiously to remove or disable access to the material(s) in question.
All 3rd party material posted on this website is copyright the respective owners / authors. Aletho News makes no claim of copyright on such material.