Julian Assange On Seth Rich

Julian Assange seems to suggest on Dutch television program Nieuwsuur that Seth Rich was the source for the Wikileaks-exposed DNC emails and was murdered.

Previously:
John Podesta Threatened To Make An Example Of Leaker

 
 

The CIA Implanted Microphones Into The Skin Of CATS

The CIA tried to turn a CAT into a cyborg spy by implanting it with a microphone and antenna

The CIA Implanted Microphones Into The Skin Of CATS

The CIA once implanted microphones into a cat in a bizarre attempt to spy on Soviet Russia.

The cat had a microphone, antenna and battery pack surgically embedded into its skin so the feline could act as a covert recording device.

Recently declassified documents show how the scientists responsible for the cruel research were praised by spy chiefs for their ‘pioneering’ work.

[pdf-embedder url=”https://commonsenseevaluation.com/wp-content/uploads/2017/04/Acoustic-Kitty.pdf” title=”Acoustic Kitty”]
The CIA once implanted microphones into a cat in a bizarre attempt to spy on Soviet Russia. Declassified documents reveal that the work was praised by CIA chiefs as a ‘remarkable scientific achievement’

The strange eavesdropping technique, though never used in the field, resurfaced this week when WikiLeaks tweeted a link to declassified CIA memos, first released in 2001.

The research was dubbed ‘Project Acoustic Kitty’ and cost $13 million (£10 million) over its five-year development in the 1960s.

The cat’s tail was used as an antenna with a wire travelling all the way up its spine to a microphone in the animal’s ear.

The equipment’s battery pack was sewn into the cat’s chest.

Victor Marchetti, a former CIA officer, told The Telegraph that year of the gruesome creation.

He said: ‘They slit the cat open, put batteries in him, wired him up’.

‘They made a monstrosity. They tested him and tested him.

‘They found he would walk off the job when he got hungry, so they put another wire in to override that,’ he added.

The final 1967 report on the project concluded it was non-practical, signalling the end of the research.

But the memo hailed the ‘remarkable scientific achievement’ reached by the American spy agency.

‘The work done on this problem over the years reflects great credit on the personnel who guided it,’ the document concluded.


The cats had microphones, antennae and battery packs surgically embedded into their skin so the felines could act as covert recording devices.

 
 
via

Fact-Sheet On Syria’s White Helmets

Who are the White Helmets? This is a question that everyone should be asking themselves.

Fact-Sheet On Syria’s White Helmets

The White Helmets – here are a few facts that you need to know. Share this with your family and friends who rely on the Western Mainstream Media:

 
• The White Helmets, also called Syria Civil Defence, are not who they claim to be. The group is not Syrian; it was created with USA/UK funding under the supervision of a British military contractor in 2013 in Turkey.

• The name “Syria Civil Defence” was stolen from the legitimate Syrian organization of the same name. The authentic Syria Civil Defence was founded in 1953 and is a founding member of the International Civil Defense Organization (1958).

• The name “White Helmets” was inappropriately taken from the legitimate Argentinian relief organization Cascos Blancos / White Helmets. In 2014, Cascos Blancos / White Helmets was honored at the United Nations for 20 years of international humanitarian assistance.

• The NATO White Helmets are primarily a media campaign to support the ‘regime change’ goals of the USA and allies. After being founded by security contractor James LeMesurier, the group was “branded” as the White Helmets in 2014 by a marketing company called “The Syria Campaign” managed out of New York by non-Syrians such as Anna Nolan. “The Syria Campaign” was itself “incubated” by another marketing company named “Purpose”.

• The White Helmets claim to be “neutral, impartial and humanitarian” and to “serve all the people of Syria” is untrue. In reality, they only work in areas controlled by the violent opposition, primarily terrorists associated with Nusra/AlQaeda (recently renamed Jabhat Fath al Sham).

• The White Helmets claim to be unarmed is untrue. There are photos which show their members carrying arms and celebrating Nusra/AlQaeda military victories.

• The White Helmets claim to be apolitical and non-aligned is untrue. In reality they actively promote and lobby for US/NATO intervention in violation of the norms of authentic humanitarian work.

• The Right Livelihood description that “Syria Civil Defence” saved over 60,000 people and “support in the provision of medical services to nearly 7 million people” is untrue. In reality the zones controlled by terrorists in Syria have few civilians remaining. That is why we see “cat” video/media stunts featuring the White Helmets.

• The NATO White Helmets actually undermine and detract from the work of authentic organizations such as the REAL Syria Civil Defence and Syrian Arab Red Crescent.

• The recent Netflix movie about the White Helmets is not a documentary; it is a self promotional advertisement. The directors never set foot in Syria. The Syrian video, real or staged, was provided by the White Helmets themselves. From the beginning scenes showing a White Helmet actor telling his little boy not to give mommy a hard time until the end, the video is contrived and manipulative. The video was produced by a commercial marketing company Violet Films/Ultra Violet Consulting which advertises its services as “social media management”, “crowd building” and “campaign implementation”.

The true face of the White Helmets:


 

The REAL Syria Civil Defence

http://www.globalresearch.ca/the-real-syria-civil-defence-exposes-natos-white-helmets-as-terrorist-linked-imposters/5547528

Who are the Syria White Helmets?

http://21stcenturywire.com/2016/06/21/who-are-the-syria-white-helmets/

White Helmets Deceive Right Livelihood and CodePink

http://truepublica.org.uk/global/white-helmets-deceive-right-livelihood-codepink/

White Helmets cat video showing terrorist zone with no civilians.  “The homeowners abandoned this district and its kittens.”  How fake does it get?

https://www.youtube.com/watch?v=UkfcE-Drnas

White Helmets are caught staging rescue only to claim they were making a mannequin challenge video.

http://archive.is/5D2Ew

 


 

 
via

Wikileaks: CIA Malware For Windows “Grasshopper”

RELEASE: CIA malware for Windows “Grasshopper” — which includes its own language

Wikileaks: CIA Malware For Windows "Grasshopper"

Grasshopper basically allows the Deep State to do anything it wants remotely to a Windows machine. It doesn’t seem to matter if it is Windows XP, Windows 7, Windows 8, or Windows Server versions 2003 or 2008. Almost all the attacks and hijacks bypassed the major intrusion detection systems (MS Security, Symantec, Kapersky, and Rising). No matter how locked down or safe you thought your Windows install was, you were wrong.

Oh even better. It looks like these were designed specifically to avoid the major security programs.

From Wikileaks:

Grasshopper

7 April, 2017

Today, April 7th 2017, WikiLeaks releases Vault 7 “Grasshopper” — 27 documents from the CIA’s Grasshopper framework, a platform used to build customized malware payloads for Microsoft Windows operating systems.

Grasshopper is provided with a variety of modules that can be used by a CIA operator as blocks to construct a customized implant that will behave differently, for example maintaining persistence on the computer differently, depending on what particular features or capabilities are selected in the process of building the bundle. Additionally, Grasshopper provides a very flexible language to define rules that are used to “perform a pre-installation survey of the target device, assuring that the payload will only [be] installed if the target has the right configuration”. Through this grammar CIA operators are able to build from very simple to very complex logic used to determine, for example, if the target device is running a specific version of Microsoft Windows, or if a particular Antivirus product is running or not.

Grasshopper allows tools to be installed using a variety of persistence mechanisms and modified using a variety of extensions (like encryption). The requirement list of the Automated Implant Branch (AIB) for Grasshopper puts special attention on PSP avoidance, so that any Personal Security Products like ‘MS Security Essentials’, ‘Rising’, ‘Symantec Endpoint’ or ‘Kaspersky IS’ on target machines do not detect Grasshopper elements.

One of the persistence mechanisms used by the CIA here is ‘Stolen Goods’ – whose “components were taken from malware known as Carberp, a suspected Russian organized crime rootkit.” confirming the recycling of malware found on the Internet by the CIA. “The source of Carberp was published online, and has allowed AED/RDB to easily steal components as needed from the malware.”. While the CIA claims that “[most] of Carberp was not used in Stolen Goods” they do acknowledge that “[the] persistence method, and parts of the installer, were taken and modified to fit our needs”, providing a further example of reuse of portions of publicly available malware by the CIA, as observed in their analysis of leaked material from the italian company “HackingTeam”.

The documents WikiLeaks publishes today provide an insights into the process of building modern espionage tools and insights into how the CIA maintains persistence over infected Microsoft Windows computers, providing directions for those seeking to defend their systems to identify any existing compromise.

Leaked Documents

Grasshopper-v2_0_2-UserGuide
Grasshopper-v1_1-AdminGuide
StolenGoods-2_1-UserGuide
GH-Run-v1_1-UserGuide
GH-ServiceProxy-v1_1-UserGuide

 

“Grasshopper” re-installs itself every 22 hours by corrupting Windows Update… even if is disabled.


 

 

CIA Vault 7 Part 3 “Marble” Allows CIA To Cover Their Tracks!

Vault 7 Part 3: WikiLeaks releases the CIA ‘Marble’ dump

CIA Vault 7 Part 3 "Marble" Allows CIA To Cover Their Tracks
WikiLeaks has released the latest batch of documents detailing CIA hacking tactics. The third release, named ‘Marble’, contains 676 source code files for the agency’s secret anti-forensics framework.Marble Framework, which WikiLeaks explains is part of the CIA’s Core Library of malware, is used to hamper forensic investigators from attributing viruses, trojans and hacking attacks to the CIA. WikiLeaks said Marble was in use at the agency as recently as 2016.

WikiLeaks said Marble hides fragments of texts that would allow for the author of the malware to be identified. WikiLeaks stated the technique is the digital equivalent of a specialized CIA tool which disguises English language text on US produced weapons systems before they are provided to insurgents.

It’s “designed to allow for flexible and easy-to-use obfuscation” as “string obfuscation algorithms” often link malware to a specific developer, according to the whistleblowing site.

The source code released reveals Marble contains test examples in Chinese, Russian, Korean, Arabic and Farsi.

“This would permit a forensic attribution double game, for example by pretending that the spoken language of the malware creator was not American English, but Chinese, but then showing attempts to conceal the use of Chinese, drawing forensic investigators even more strongly to the wrong conclusion,” WikiLeaks explains, “But there are other possibilities, such as hiding fake error messages.”

From Wikileaks:

Marble Framework

31 March, 2017

Today, March 31st 2017, WikiLeaks releases Vault 7 “Marble” — 676 source code files for the CIA’s secret anti-forensic Marble Framework. Marble is used to hamper forensic investigators and anti-virus companies from attributing viruses, trojans and hacking attacks to the CIA.

Marble does this by hiding (“obfuscating”) text fragments used in CIA malware from visual inspection. This is the digital equivallent of a specalized CIA tool to place covers over the english language text on U.S. produced weapons systems before giving them to insurgents secretly backed by the CIA.

Marble forms part of the CIA’s anti-forensics approach and the CIA’s Core Library of malware code. It is “[D]esigned to allow for flexible and easy-to-use obfuscation” as “string obfuscation algorithms (especially those that are unique) are often used to link malware to a specific developer or development shop.

The Marble source code also includes a deobfuscator to reverse CIA text obfuscation. Combined with the revealed obfuscation techniques, a pattern or signature emerges which can assist forensic investigators attribute previous hacking attacks and viruses to the CIA. Marble was in use at the CIA during 2016. It reached 1.0 in 2015.

The source code shows that Marble has test examples not just in English but also in Chinese, Russian, Korean, Arabic and Farsi. This would permit a forensic attribution double game, for example by pretending that the spoken language of the malware creator was not American English, but Chinese, but then showing attempts to conceal the use of Chinese, drawing forensic investigators even more strongly to the wrong conclusion, — but there are other possibilities, such as hiding fake error messages.

The Marble Framework is used for obfuscation only and does not contain any vulnerabilties or exploits by itself.

 
via

Load More