In light of the Wikileaks Vault 7, Vault 7, and project Marble revelations - the hack implicates the NSA and CIA left clues to implicate China.
The source code released reveals Marble contains test examples in Chinese, Russian, Korean, Arabic and Farsi.
“This would permit a forensic attribution double game, for example by pretending that the spoken language of the malware creator was not American English, but Chinese, but then showing attempts to conceal the use of Chinese, drawing forensic investigators even more strongly to the wrong conclusion,”
Wikileaks: Marble
--------------------------
From
ActivitPost:
With each release from these Vault 7 leaks, it becomes more apparent that everything we thought the CIA might get in this
1984-esque world — they already have. ...
Over the course of the last 4 months, the deep state has claimed — without evidence — that Russia has interfered in US elections. With this technology, the CIA could theoretically present the evidence it needs to “prove” Russian meddling. ...
the CIA could create a virus that would potentially devastate entire systems — and then blame it on anyone they want.
As
Leak of Nations reports, in the second batch of ‘Vault 7’ documents, WikiLeaks released a user guide for Sonic Screwdriver – an implant on the Apple Thunderbolt-to-USB converter that allows code to be booted onto an attached device, even if the device is password-protected. What this means is that the CIA can infect the firmware of Macs at the core of the system with a trojan horse. Having a proverbial ocean of computers to choose from,
the CIA could then pick one of those infected computers, launch an attack, use Marble to cover it up and blame it on whomever they wish.
It is no wonder Ubuntu founder Mark Shuttleworth called this
“a trojan horse of monumental proportions.”
For now, however, the only one to be caught hacking US elections is the Department of Homeland Security. As the
Free Thought Project previously reported, the Department of Homeland Security, under the Obama administration,
attempted to hack the Indiana State electoral system nearly 15,000 times.
Prior to the hacks in Indiana, it was the State of Georgia to expose DHS meddling in their elections. ...
http://www.activistpost.com/2017/03/...n-chinese.html
--------------------
Our National Police State.
Slay the Monster: http://ronpaulinstitute.org/archives...-police-state/
the power of the Deep State is even more forbidding – and seemingly invincible – than anyone knew. Joyful anticipation because, for the first time,... it is dawning on the most unlikely people that we are, for all intents and purposes, living in a police state. …
The material in “Vault 7” is extensive: it ranges from examining the ways in which a Samsung television set that is seemingly turned off can be – and no doubt has been – used to spy on the conversations and activities of a room’s occupants, to the various ways in which our spooks infiltrate and subvert common electronic devices, such as the iPhone, in order to gather information. “Infected phones,” we are told in the introduction to the material, “can be instructed to send the CIA the user’s geolocation, audio and text communications as well as covertly activate the phone’s camera and microphone.” The CIA is even working on remotely controlling the electronic steering systems installed in cars – a perfect route to pulling off an assassination that looks like an “accident.” Not that the intelligence services of the “leader of the Free World” would ever consider such an act. ...
As these viruses and other invasive programs are unleashed on an unsuspecting public, they fall into the hands of a variety of bad actors: foreign governments, criminals, and teenagers on a lark ... This plague is being spread over the Internet by a veritable army of CIA hackers: “By the end of 2016 … the CIA’s hacking division, which formally falls under the agency’s Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other ‘weaponized’ malware.” The inevitable end result: a world infected with so much malware that computers become almost useless ... In short, a war that made us less safe. ...
[CIA/NSA False Flag Hacking and Spying] the CIA’s Remote Devices Branch’s “Umbrage group,” ... “collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.” The idea is to mask the Agency’s cyberwar operations … The process of attribution, WikiLeaks explains, is “analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible. As soon one murder in the set is solved then the other murders also find likely attribution.” … It simply draws on computer code used by its adversaries ... and inserts it into its own handcrafted malware and other invasive programs, thus leaving Russian (or Chinese, or North Korean) fingerprints on the handiwork of CIA hackers. … So now we learn that the CIA has perfected the art of imitating its rivals, mimicking the Russians – or whomever – in a perfect setup for a “false flag” scenario. ...
We have created a monster, a Deep State with such unchecked power, armed with such Orwellian technology, that it represents a clear and present danger to our constitutional republic. This threat is underscored not only by the latest WikiLeaks revelations, but also by the intelligence community’s intervention in our domestic politics, which has been documented in the headlines of the nation’s newspapers for the past few months. … Accelerated by our foreign policy of perpetual war, the national security bureaucracy has accumulated immense power, and our elected leaders have neglected to provide any oversight. Indeed, they are at its mercy. ...
Either we slay the monster or it will enslave us.
--------------------
Connect With Us