Ten Things We Didn’t Know About the CIA Before Last Week

Recent events in Washington have also shown us that the CIA is in opposition to even mild civic nationalism. It now seems very unlikely that there is a White, patriotic, racially-conscious faction there.

WIKILEAKS’ Vault 7 release of Central Intelligence Agency (CIA) documents yesterday opened eyes worldwide about an agency President John F. Kennedy once vowed to “splinter… into a thousand pieces and scatter it into the winds.”

Here’s a list of ten things we didn’t know about the CIA before last week’s leak:

1. The CIA has an illegal domestic spying apparatus similar to the NSA’s

Perhaps one of the most revealing things that we just learned is that the CIA’s domestic surveillance capabilities rival and may well surpass those of the National Security Agency (NSA).

While both agencies were required under the Obama administration to report vulnerabilities found in hardware and software to manufacturers, each failed to do so — endangering national security and personal privacy by weakening encryption and in the NSA’s case installing “back doors” in consumer electronic devices. Obama’s likely intentional loophole which allowed such mischief was that the agencies didn’t have to disclose any exploit found “if it helped them.”

In 2014, Michael Daniel, a former National Security Council cybersecurity coordinator and special adviser to the president on cybersecurity issues, told WIRED that the government doesn’t stockpile large numbers of “zero days” (vulnerabilities not deployed yet and hard for security professionals to counter because they are so new) for use.

“There’s often this image that the government has spent a lot of time and effort to discover vulnerabilities that we’ve stockpiled in huge numbers … The reality is just not nearly as stark or as interesting as that,” he said.

Yet the agencies did just that — hoarding zero-day vulnerabilities, exposing systems to other malicious hackers — whether they are foreign governments or criminals, violating the Consumer Protection Act.

In doing so, both agencies also violated the Fourth Amendment which protects against unauthorized search or seizure. The CIA admitted in 2014 to the Guardian that it was obliged to follow federal surveillance laws, laws that we now know both the NSA and CIA have broken an unfathomable amount of times.

We know the NSA violated surveillance restrictions thousands of times — so the question must be posed: How many times did the CIA violate those same surveillance restrictions?

How can Americans trust the CIA or the NSA, when the two agencies made us less safe by breaking the law and endangering private information such as bank account numbers and credit card numbers, by keeping security holes open in the devices of millions of Americans, just so they could exploit them? As security expert Bruce Schneier said back in 2013, “It’s sheer folly to believe that only the NSA can exploit the vulnerabilities they create.”

2. The CIA has a secret base in Germany

The CIA has a secret U.S. hacking base at the consulate in Frankfurt, Germany that it disguises as a State Department facility. The CIA even instructed its employees at the base on how to avoid German security and gave them a cover story. This base is now under investigation by German authorities.

CIA hackers operating out of the Frankfurt consulate ( “Center for Cyber Intelligence Europe” or CCIE) are given diplomatic (“black”) passports and State Department cover. The instructions for incoming CIA hackers make Germany’s counter-intelligence efforts appear inconsequential: “Breeze through German Customs because you have your cover-for-action story down pat, and all they did was stamp your passport”

Your Cover Story (for this trip)
Q: Why are you here?
A: Supporting technical consultations at the Consulate.

3. The CIA has a cyber group dedicated to forging other countries’ digital fingerprints in false-flag attacks

The CIA has a secret espionage group called UMBRAGE that is dedicated to forging the malware “signatures” of other countries — including Russia.

The group collects and maintains a substantial library of attack techniques stolen from malware produced in other countries.

With UMBRAGE and related projects, the CIA can not only increase its total number of attack types, but also misdirect attribution by leaving behind the “fingerprints” of the groups from which the attack techniques were stolen — allowing them to create cyber false-flag attacks in which they can attack targets in the U.S. or elsewhere — and blame another country for the resulting damage.

4. The CIA can spy on you through your “smart TV” and tap into the microphone

What was absent from Edward Snowden’s leaks was evidence of the ability for the NSA to spy on you through your smart TV. The CIA has found a way to do so through a program it called “Weeping Angel.”

5. The CIA can spy on you through any tablet or phone

While the NSA displayed similar capabilities to breach a phone or tablet’s security and hijack its camera or intercept text messages, the CIA proved it could do more.

Through its Mobile Devices Branch (MDB) they can exploit Android and Apple phones and tablets to do numerous attacks to remotely hack and control popular smart phones. Infected phones then can be instructed to send the CIA the user’s geo-location, audio, and text communications, as well as covertly activate the phone’s camera and microphone.

6. The CIA can transcribe your Skype conversations

Kim Dotcom and 0hour explain how this is done:

7. The CIA has exploits for every major Anti-virus software provider and major personal computer software programs, including Microsoft Word, VLC, and all operating systems

Wikileaks notes that a program called Fine Dining provides 24 decoy applications for CIA spies to use. To witnesses, the spy appears to be running a program showing videos (e.g. VLC), presenting slides (Prezi), playing a computer game (Breakout2, 2048) or even running a fake virus scanner (Kaspersky, McAfee, Sophos). But while the decoy application is on the screen, the underlying system is automatically infected and ransacked. This would allow CIA agents to pose as testing a company’s security and appear as if they were really an IT technician, when in reality they were pillaging data. Wikileaks also revealed that the CIA has exploits for Windows, Linux, and Mac OSX systems, as well as general software exploits for various applications on all three OS versions.

8. The CIA can hack vehicle control modules in cars, trains, and planes

Ex-FBI agent Ted L. Gunderson said that the way that the elite get rid of people is through train, car, and plane accidents. While the capabilities of hacking vehicles may not be something new, the evidence that the CIA has this capability warrants looking back at several suspicious incidents in the past few decades which raised flags as being possible assassinations rather than simply unfortunate accidents. Yesterday We Are Change reported on journalist Michael Hastings’ suspicious death, but many others that raise suspicion include John F. Kennedy Jr’s death and Senator Paul Wellstone — both powerful political dissenters that died in strange plane crashes.

9. The CIA has an “air gap” virus that can infect systems even if not connected to the internet

Air gapping is a technique this reporter personally learned about in 2015 when a whistleblower personally came to me with what sounded like insane information.

What is air gapping? Well, it’s hacking a computer that isn’t connected to the Internet.

Using the GSM network, electromagnetic waves, and a basic low-end mobile phone; and through intercepting RF radio signals; researchers in Israel found they could extract data from computers, Wired has now reported. Two weeks ago Wired reported that a drone can be given that type of capability, too.

The CIA’s “Hammer Drill” infects software distributed on CD/DVDs, they have infectors for removable media such as USBs, and systems to hide data in images or in covert disk areas (“Brutal Kangaroo”).

10. The CIA has a Meme Warfare Center. The meme war – is real.

The CIA actually has a meme warfare center which it uses to spread memes — giving cause for concern to anyone worried about government propaganda. Meme warfare is real, and the CIA has apparently been using it to spread disinformation. This is Operation Mockingbird in the 21st Century.

The CIA is not a friend to the people of the U.S., historically serving only Wall Street and its owners, and the military-industrial complex elite. The CIA has been caught before spying domestically in the 1960s and 70s, including spying on journalists under Operation CELOTEX I-II and others in 702 documents called the “family jewels,” that catalog the agency’s domestic wiretapping operations, failed assassination plots, mind-control experiments and more during the early years of the CIA.

* * *

Source: Anonymous News

Previous post

Real Power and Fake People

Next post

Talmudic Logic Deployed to Explain Why White "Nazis" are Still to Blame for Fake Hate Crimes Carried Out by a Negro

Notify of
Inline Feedback
View all comments
Bruce Arney
Bruce Arney
19 March, 2017 1:16 pm

An interesting article with real-life applications. Wall Street interests and the military-industrial complex are the big players and the driving factor, but that does not rule out the fact that there may be WN’s in the intelligence community, however.

Bruce Arney
Bruce Arney
19 March, 2017 1:21 pm

If drones can hack into computers not connected to the internet, nuclear research facilities in Iran would be very vulnerable, as would any nuclear facility. Allowing drones into restricted airspace would be suicidal, given the agenda of the powers that be. One drone flying under radar could hack into sensitive areas without detection. A double edged sword, to be sure.

Bruce Arney
Bruce Arney
19 March, 2017 1:43 pm

I don’t know that we can infer there are no racially aware patriots in the intelligence (the Pale) community. Edward Snowden was quite patriotic, even to the point of joining the armed forces during the Iraq war. People are attracted to elite groups largely because of the special status afforded them, but also by real deep-seated Patriotic urges. When patriots join the Pale of intelligence agencies, they carry with them the remnants of morality, knowing right from wrong. Seeing children killed by drones does get next to most human beings. I think we can safely infer that there are, indeed, some agents sympathetic to our racial cause. Whether they come out of the woodwork, when the time comes, remains to be seen, however.

Reply to  Bruce Arney
19 November, 2020 6:45 pm

Greetings Bruce. Patriotism and morality is illegal!

ulysses freire da paz jr
ulysses freire da paz jr
Reply to  Truthweed
20 November, 2020 3:38 pm

Greetings Truthweed

“Good people have teddy bears and dildos

Nazis ”have traditional families. What do you think – who does the future belong to?

comment image  

Reply to  ulysses freire da paz jr
20 November, 2020 6:15 pm

Ulysses, tomorrow belongs to us!

27 May, 2017 2:06 pm

Time to reduce the CIA and FBI. Get them back to manageable entities. Add more oversight into their operations by a non-dept. board.

Reply to  jobe
19 November, 2020 6:43 pm

Greetings jobe. A ‘non-dept.’ [independent] board is by definition Jewish. A highly-dependent-uncorrupted-non-scoundrel-patriotic accountable board is needed.

19 November, 2020 6:35 pm

Regarding “The CIA has an “air gap” virus that can infect systems even if not connected to the internet.” I recall that a bugged computer that is not connected to the Internet can contain software that sends signals by raising or lowering its operating temperature as programmed. Another nearby computer (connected to the Internet) can detect the unconnected computer’s temperature state, e.g. hot,cold, hot,hot, cold,hot. etc. and this signal can be transmitted to the spies.

dan quixote
dan quixote
Reply to  Truthweed
21 November, 2020 1:20 am

I am unfamiliar with that particular method of signaling (temperature variation) but don’t doubt it, that is the principle of how it works. There are a thousand ways this can
an be done, there are many components that emit radiation, and that radiation can interfere with other components, thus establishing a channel of communication. And it doesn’t need to be software, it is likely that all hardware has some exploit built in it that can be utilized under the right conditions.

It is wise to assume all computers are insecure.

21 November, 2020 12:37 am

Here’s an example of a plane ‘acciden’t.