Roger Stone – Napolitano Was Right – Obama Spying Is Watergate Times Ten

By Rick Wells

Steve Malzberg asked Roger Stone for his take on “the revelation that the British Intelligence Services and other European nations as well, did, in fact monitor the correspondence, the phone calls, , the communications between certain Trump insiders, campaign workers, whatever, and Russians who they were talking to, supposedly.”

Malzberg says, “This was an accusation first leveled by Judge Andrew Napolitano on Fox, he was lambasted for it, Sean Spicer repeated it, the British Government denied it, Napolitano was taken off Fox, I think for a week. And now, I believe, he’s been proven 100 percent correct.  What’s your take on that?”

Stone says, “This is a very standard operating procedure for the intelligence agencies. They go to a third party nation and they ask them to conduct the surveillance so that the CIA can play dumb, so they have not violated the law, technically. Judge Napolitano turns out to be absolutely right and I think folks at Fox, at management, owe him an apology.

Stone says, “I want to learn more about this because I still think we are going to learn that the deep state, that the seventeen intelligence agencies have promulgated this myth of Russian collusion because it is the rationale that they used to surveill Donald Trump and his aides.”

Stone notes, “And that would mean that there is no Russian collusion, proving, Steve, that their motive was solely political.” He observes, “That’s Watergate, Watergate times ten.

 

‘Top secret CIA virus control system’: WikiLeaks releases ‘Hive’ from #Vault7 series

Hive, the latest batch of WikiLeaks documents exposing alleged CIA hacking techniques from ‘Vault 7’, details how the agency can monitor its targets through the use of malware and carry out specific tasks on targeted machines.

*

Described as a multi-platform malware suite, Hive provides “customisable implants” for Windows, Solaris, MikroTik (used in Internet routers), Linux platforms, and AVTech Network Video Recorders, used for CCTV recording. Such implants allow the CIA to communicate specific commands.

Screenshot 2017-04-14 11.50.30

A 2015 User Guide reveals the initial release of Hive came in 2010, and describes the software implant as having two primary functions – a beacon and interactive shell. Both are designed to provide an initial foothold to deploy other “full featured tools.”

The implants communicate via HTTPS with the webserver of a cover domain. Each cover domain is connected to an IP address at a commercial Virtual Private Server (VPS) provider. This forwards all incoming traffic to what’s called a ‘Blot’ server.

The redirected traffic is examined to see if it contains a valid beacon. If it does, it’s sent to a tool handler, known as Honeycomb, where the CIA can initiate other actions on the target computer.

The user guide details the commands that are available, including uploading and deleting files and executing applications on the computer.

Screenshot 2017-04-14 11.52.34

To hide the presence of such malware, WikiLeaks notes that the public HTTPS interface (a protocol for secure communication over a computer network within an encrypted connection) “utilizes unsuspicious-looking cover domains,” meaning those targeted would be unaware of the CIA’s interference.

A ‘self-delete’ function is described in documentation accompanying Hive, revealing that the implant destroys itself if it’s not signalled for a predetermined amount of time. Binary information regarding Hive is deleted from the host, leaving a log and configuration file containing only a timestamp.

The self-delete was known to cause issues for the developers after running into complications caused by disparities in system clocks.

Screenshot 2017-04-14 11.53.54

WikiLeaks says anti-virus companies and forensic experts have noticed “possible state-actor” malware using similar back-end infrastructure, but were unable to connect the back-end to CIA operations.

The Hive documents released Friday may allow experts to examine this kind of communication between malware implants and backend servers, WikiLeaks says.

The CIA’s Hive project was created by its Embedded Development Branch (EDB). This branch was also responsible for projects detailed in WikiLeaks’ ‘Dark Matter’ leak, revealing the CIA’s attacks on Apple firmware.

READ MORE: #Vault7: WikiLeaks releases ‘Dark Matter’ batch of CIA hacking tactics for Apple products

40 targets in 16 countries: Scale of CIA-linked #Vault7 hacking tools revealed by Symantec

Hacking tools linked to the CIA in the recent WikiLeaks Vault 7 release were used to target at least 40 organizations in 16 countries, according to internet security firm Symantec.

*

READ MORE: WikiLeaks publishes #Vault7: ‘Entire hacking capacity of the CIA’

The techniques detailed in Vault 7 were almost certainly developed and used by the same group, Symantec said Monday. The tech company has corroborated a number of the tool “development timelines” put forward by WikiLeaks.

While Symantec does not specifically mention the CIA – instead referring to the group responsible for the attacks as ‘Longhorn’ – the latest revelation gives further credence to WikiLeaks’ assertion that Vault 7 is part of the intelligence service’s “hacking tools”.

Screen Shot 2017-04-10 at 10.32.14 AM

“The tools used by Longhorn closely follow development timelines and technical specifications laid out in documents disclosed by WikiLeaks,” a Symantec statement said.

“The Longhorn group shares some of the same cryptographic protocols specified in the Vault 7 documents, in addition to following leaked guidelines on tacts to avoid detection. Given the close similarities between the tools and techniques, there can be little doubt that Longhorn’s activities and the Vault 7 documents are the work of the same group.”

Screen Shot 2017-04-10 at 10.33.28 AM

Longhorn has been active since at least 2011, according to Symantec, infiltrating targets in the financial, telecoms, aerospace and natural resources industries.

READ MORE: #Vault7: WikiLeaks reveals ‘Marble’ tool could mask CIA hacks with Russian, Chinese, Arabic

“All the the organizations targeted would be of interest to a nation-state attacker. Longhorn has infected 40 targets in at least 16 countries across the Middle East, Europe, Asia, and Africa. On one occasion a computer in the United States was compromised but, following infection, an uninstaller was launched within hours, which may indicate this victim was infected unintentionally,” Symantec added.

WikiLeaks recently published a tranche of information purportedly comprising files from a CIA center in Langley, Virginia. The hacks detailed in the documents included using of malware and trojans designed by a CIA Engineering Development Group to be “unaccountable” and “untraceable”, Julian Assange said.

READ MORE: #Vault7: Key revelations from WikiLeaks’ release of CIA hacking tools

A WikiLeaks description of a “Fire and Forget” process for a tool called Archangel is “closely matched” with a Longhorn tool called “Backdoor.Plexor”, according to Symantec.

Meanwhile, WikiLeaks’ release of a development timeline for malware called Fluxwire closely aligns with a Longhorn tool tracked and labeled Corentry by Symantec. Evidence of Longhorn’s use of advance “zero day” techniques leaves “little doubt” about the group’s link to Vault 7, the internet firm adds.

The CIA has refused to comment on the authenticity of the WikiLeaks documents, which so far have been published in four batches online.

“The American public should be deeply troubled by any WikiLeaks disclosure designed to damage the Intelligence Community’s ability to protect America,” the CIA said in a statement last month.

“Such disclosures not only jeopardize US personnel and operations, but also equip our adversaries with tools to do us harm.”

Intel Agencies Obstruct Trump On Leaks – Reassign Analysts To Aleutians, Sudan, Yemen

By Rick Wells

It was one thing when the John Kerry State Department refused to provide Hillary Clinton emails while the enemy Democrats were in power or when DHS and DOJ were obstructionists in prosecutions, investigations or FOIA requests under Lynch, Comey and Jihadi Jeh Johnson. That was a little surprising at first but we soon learned as the Obama regime dragged on that it was not a government as much as it was a mechanism of social manipulation and perpetrator protection.

What is surprising is that the stonewalling and obstructionism is continuing under President Trump, with some of the denials directly impacting him in a negative manner. Most prominent and incredible are the revelations that the intelligence community is stonewalling the investigation into leaks of classified information to the “press” about Trump associates. In doing so the deep state operatives are not only telling the president to “stick it,” they’re telling members of Congress the same thing.

Fox News cites one unnamed source who sits on the House Intelligence Committee, likely a Republican, who said, “Our requests are simply not being answered. The agencies are not really helping at all and there is truly a massive web for us to try and wade through.”

The same story was told to them by a Senate Intelligence Committee member who said, “Any information that will help find the wide extent on the unmasking and surveillance is purposely not being provided.”

The NSA denied it was happening, saying, “Allegations that the National Security Agency is ‘withholding information’ from congressional intelligence committees investigating Russian interference in the 2016 election are categorically untrue.”

They added, NSA fully supports the committees’ work. We have already made available significant information in response to their requests, and we look forward to continuing to work with them in the execution of their important responsibilities.” That sounds eerily like Clinton’s statements about the 33,000 email pages of spam that were held up as proof of their cooperation.

Surely President Trump can find a solution to this problem without too much effort. It would seem that within the web of think tanks and retired experts in DC there would be twenty people with top level security clearances, ten of which could be assigned as a special operations unit to the NSA and another ten to the CIA. They would need to be familiar with the capabilities and procedures so that they couldn’t be lied to about whether or not something could be done and the amount of time required.

Then President Trump could simply send them out as information posses, with instructions to not leave the facility they where they went for the documents until they were in their possession. If they needed a military escort in order to secure its release, that would be pre-arranged with the Pentagon or whatever was the most appropriate military facility.

He’s the Commander-in-Chief, for crying out loud. How difficult can this be? If the recalcitrant analyst persisted, he could be escorted off property, his access cards confiscated and a transfer to the Aleutian Islands or similar “prime” duty station set up for the following day. There would be plenty of empty time in a hellhole like that to think about their attitude and what could be done to improve their willingness to work with others andfollow instructions.

After one or two postcards home from the reassigned troublemakers, the rest of the malcontents would likely decide that it’s better to do their job than to freeze or get shot at on some misguided principle. As cold as DC is in the winter, it’s nothing like Alaska, the information would start flowing immediately. Maybe they need analysts in Libya, Yemen, or Somalia. The possibilities for motivational readjustment assignments are endless.

#Vault7: WikiLeaks release shows CIA ‘Grasshopper’ used stolen ‘Russian mafia’ malware

WikiLeaks has released the fourth part of ‘Vault 7’, named ‘Grasshopper’, the latest in a series of leaks detailing alleged CIA hacking techniques. It details malicious software WikiLeaks claims was taken from “suspected Russian organized crime.”

*

The latest release consists of 27 documents WikiLeaks claims come from the CIA’s ‘Grasshopper framework’, a platform for building malware for use on Microsoft Windows operating systems.

Screenshot 2017-04-07 11.29.05

In a statement from WikiLeaks, ‘Grasshopper’ was described as providing the CIA with the ability to build a customized implant which will behave differently, depending on the security capabilities of a computer.

Screenshot 2017-04-07 11.30.27

According to WikiLeaks, Grasshopper performs “a pre-installation survey of the target device, assuring that the payload will only [be] installed if the target has the right configuration.”

This allows CIA operators to detect if a target device is running a specific version of Microsoft Windows or if an antivirus is running, according to the statement.

Screenshot 2017-04-07 11.32.01

Grasshopper allows tools to be installed and run on a machine without detection using PSP avoidance, allowing it to avoid Personal Security Products such as ‘MS Security Essentials’, ‘Rising’, ‘Symantec Endpoint’ or ‘Kaspersky IS’.

One of the so-called persistence mechanisms, which allows malware to avoid detection and remain on a computer system indefinitely, is known as ‘Stolen Goods’.

In the WikiLeaks release, it is credited to Umbrage, a group within the CIA’s Remote Development Branch (RDB) which was linked in the ‘Year Zero’ release to collecting stolen malware and using it to hide its own hacking fingerprints.

READ MORE: #Vault7: How CIA steals hacking fingerprints from Russia & others to cover its tracks

The components of the Stolen Goods mechanism were taken from a malware known as Carperb, “a suspected Russian organized crime rootkit,” alleges WikiLeaks.

Stolen Goods targets the boot sequence of a Windows machine, loading a driver onto the system that allows it to continue executing code when the boot process is finished.

WikiLeaks confirmed that the CIA did not merely copy and paste the suspected Russian malware but appropriated “[the] persistence method, and parts of the installer,” which were then modified to suit the CIA’s purposes.

READ MORE: WikiLeaks publishes #Vault7: ‘Entire hacking capacity of the CIA’

The latest release came with an emblem containing a grasshopper and the words: “Look before you leap,” a possible reference to how the latest leaked tools would allow the CIA to prepare a machine for future hacking, without raising suspicion.

The rootkits can be installed and used as a ‘man on the inside’ who can allow more malicious software through undetected in future, if the CIA felt it necessary. If suspicions were raised on initial installation, they would know not to proceed with a more extensive operation.

Also detailed in the release are Buffalo and Bamboo, modules that hide malware inside DLL’s, a collection of shared libraries, on a Windows system.

The two modules operate in slightly different ways: Buffalo runs immediately on installation whereas Bamboo requires a reboot to function properly.

The goal of today’s release is to help users seeking to defend their systems against any existing compromised security systems, Wikileaks stated.

Also detailed in the release is ScheduledTask, a component of ‘Grasshopper’ that allows it to utilize Windows Task Scheduler to schedule executables.

The component would allow the executables to automatically run at startup or logon, before killing it at the end of its duration. Included in ScheduledTask are commands that allow the executables names and description to be hidden.

The release is the fourth in a series called ‘Vault 7’ which WikiLeaks claims contains documents taken from within the CIA. Releases so far include ‘Zero Days’ which detailed the CIA’s hacking of Samsung smart TVs and ‘Marble’, which allowed the CIA to disguise their hacks and attribute them to someone else, including Russia.

READ MORE: #Vault7: WikiLeaks reveals ‘Marble’ tool could mask CIA hacks with Russian, Chinese, Arabic

What You Need To Know About The Susan Rice Scandal

Published on Apr 4, 2017

As CNN anchors Don Lemon, Jim Sciutto, and others try to push the Susan Rice scandal under the rug, the internet answers back. In this video, we go over the latest information you need to know about Susan Rice scandal, its implications on possible legal action against the Obama administration.

ThePuppyman12

Luke, the most trusted name in independent news! Keep it up!
Fight the NWO With Kunal

The Deep State Shadow Government wants to remain in control.
Droopy Dog

Cernovich is great! Almost always right. I trust him as much as any other journalist.
Darko Kovacevic

Mike Cernovich In conjunction with other great people are ripping the deep state to shreds be on the lookout in the coming weeks for serious stories to come out … his sources are real & Mike is basically the new TROJAN HORSE that the so called left did not see coming.
WTF BBQ

I’ll bet you my lunch money that none of these criminals will go to Jail.
Danny

total waste, this is a distraction, for all of the war crimes committed by Obama and company.
death 2 globalism

Obama has politicized intelligence numerous times. The discussions did not contain illegal activity but they unmasked it anyway! An absolute disgrace!

*(Obama’s McCarthyism at it best) – Mark Levin Interviews FNC’s Housley: We ‘WILL KNOW’ If Obama, Jarret, Lynch Knew About ‘UNMASKING’

Paul G

This is the biggest scandal in the last 40 years and media is quiet. They are traitors of american people
Crabby Appleton

So true. They are complicit in treason against the American People.
Smoke

My opinion it started the day Trump did the Birther Stuff then it got enhanced when announced his run June 2015 ish, and really got wound up when he won the nomination, and went into super mode when he won.
JA H

These arrogant buffoons clearly never thought there would be another Republican in the white house, or surely they wouldn’t have been so sloppy with their corruption. Or maybe they’re just that dumb and think everybody else is too.
Armand Rodriguez

You have to be a fool to believe Obama and his people didn’t do this for 8 years to many many people.
Jim Dandy

On CNN this morning Cuomo dismissed this as the Trump administration simply “scandal shopping” in an attempt to divert attention from the real issue of Russian interference in our election process!
linda kutz

Subpoenaing Susan Rice to testify under oath is a joke. She needs to testify under sodium pentothal. Of course it was for political reasons. The only security any of the politicians care about is their own.
MrMetonicus

Hillary gets hacked, thousands of emails revealing corruption are found. Trump gets surveiled, and they find nothing. MSM & Dems: we have to find out more about Trump’s collusions with the Russians.