Category Archives: Wikileaks

– NSA Controlled, FBI Supported. A Chinese owned company.

Elite Tip Hand In Attempt To Take Down Trump

Welcome to the smartest, most active, and the most loving audience in the world. We started this channel to garnish prayer to change to help save America and stop the coming World Conflict and so far, so good. ==========

Source: http://ift.tt/2uvBmOc

Elite Tip Hand In Attempt To Take Down Trump

Welcome to the smartest, most active, and the most loving audience in the world. We started this channel to garnish prayer to change to help save America and stop the coming World Conflict and so far, so good. ==========

Source: http://ift.tt/2uvBmOc

Elite Tip Hand In Attempt To Take Down Trump

Welcome to the smartest, most active, and the most loving audience in the world. We started this channel to garnish prayer to change to help save America and stop the coming World Conflict and so far, so good. ==========

Source: http://ift.tt/2uvBmOc

Elite Tip Hand In Attempt To Take Down Trump

Welcome to the smartest, most active, and the most loving audience in the world. We started this channel to garnish prayer to change to help save America and stop the coming World Conflict and so far, so good. ==========

Source: http://ift.tt/2uvBmOc

#Vault7: CIA’s ‘Pandemic’ turns file servers into ‘Patient Zero’ | Galactic Connection

The latest WikiLeaks ‘Vault7’ release details an alleged CIA project allowing the spy agency to give file servers the capability to infect machines which access them remotely.

‘Pandemic’ reveals the role of a persistent implant for Microsoft Windows file servers, accessed by remote machines to run programs, according to a statement from WikiLeaks.

The project acts as a ‘Patient Zero’ – a term used to describe the first identified carrier of a communicable disease during an outbreak.

‘Pandemic’ disguises itself on the infected source machine where the targeted files remain unchanged.

It’s modified when in transit from the source file server to the remote machine. When executed on the new machine ‘Pandemic’ will install the program, an iteration of which will now contain modified code.

‘Pandemic’ can replace up to 20 programs, with a maximum size of 800MB.

According to WikiLeaks “a single computer on a local network with shared drives that’s infected with the ‘Pandemic’ implant will act like a ‘Patient Zero’ in the spread of a disease.” 

The latest release, which consists of five files, does not make clear if the infected machines become new pandemic servers, although WikiLeaks claims this is technically feasible.

According to the ‘Pandemic’ documentation its installation takes between 10 to 15 seconds.

The release is the latest in WikiLeaks’ ‘Vault7’ series, detailing hacking techniques allegedly sourced from within the CIA.

Previous releases have revealed techniques used to weaponize mobile phones, conduct surveillance via Smart TVs and load and execute malware on a target machine.

Source: #Vault7: CIA’s ‘Pandemic’ turns file servers into ‘Patient Zero’ | Galactic Connection

Seth Rich Was Huma Abedin’s Liasion to Leak Clinton Emails After She Was Blackmailed by Anonymous. Huma was the leak!

I know the Seth Rich murder has been covered ad naseum. So I’m gonna make this brief and to the point.

I just wanted to point out a couple things that I saw reported back when it happened that I havent heard a word about since.

In August of 2016 I was browsing through a 4chan forum and I took this screenshot of a conversation (screenshot below) where Anonymous was claiming that they had hacked into Huma Abedin’s personal computer and had intercepted Huma in real time, sending the Saudis a compromising video that she had taken of Hillary. It is not stated what exactly was on the video but my guess is that it probably had something to do with the sexual abuse of a minor.

(Apparently Angela Merkel was also in one of the “compromising videos” with Hillary. God only knows what it shows them doing.)

Huma Abedin’s family is in Saudi Arabia and this is where her loyalty lies.

Anonymous confronted Huma and faced with the threat of being exposed, she agreed to give them info (the emails that were later printed by Wikileaks) if they agreed to keep quiet about what they found her doing.

According to Anonymous, Huma told them that she would give them the info they’d asked for via an insider…a liasion.

Guess who that liasion was? SETH RICH!!

Now does it make sense why they are trying to confuse this story?

HUMA WAS THE LEAK!!

Anonymous then gave the emails to Wikileaks to publish.

Here is that screenshot from 4chan. This was big news back then in forums like 4Chan and GLP…but it never seemed to reach any of the mainstream alternative sites and it seems to have been forgotten about since…

14976792_10154723665877427_4872008347056034377_o

14918750_10154723666077427_3486454069327294367_o.jpg

Source: Seth Rich Was Huma Abedin’s Liasion to Leak Clinton Emails After She Was Blackmailed by Anonymous. Huma was the leak! | Alternative

Wikimedia Lawsuit Against NSA Surveillance Just Approved to Move Forward | Galactic Connection

(ANTIMEDIAA federal appeals court has unanimously reversed part of a lower court’s dismissal of a lawsuit filed by the American Civil Liberties Union for Wikimedia, which challenges the NSA’s mass surveillance and collection of internet communications.

The suit was originally filed in 2015 by the ACLU on behalf of the Wikimedia Foundation, Amnesty International, and Human Rights Watch, among others, and centered around the NSA’s “Upstream” surveillance program, which intercepts data from the internet backbone cables carrying the online messages, web searches, and emails of U.S. citizens. Upstream operates under Section 702 of the Foreign Intelligence Surveillance Act, a statute the government uses to conduct warrantless surveillance on Americans who communicate with targets located outside of the United States…

Source: Wikimedia Lawsuit Against NSA Surveillance Just Approved to Move Forward | Galactic Connection

Wikileaks: CIA Now Controls Your COmputer

dr-william-mount211111111111211A few days ago we discussed the fact that the New Computer Virus taking control of Banks and failing Hospitals was released by Microsoft and the “CURE” for the virus was created even before the Virus was released – forcing you to update into “Windows 11” and their “Smart Cloud.”

Now it has been brought forward – thanks to the Chinese Run Corporation of Wikileaks – that the CIA is now taking control of all computers that run Windows 8-10, 9 was a flop and never released.

Primary CIA Virus is Hera – Running XP through Windows 10
Secondary: Hera for Windows 8-10.

So apparently we have 3 Microsoft/CIA Viruses to worry about:

1) Wannacry
2) AfterMidnight
3) Assassin

This program – unlike any other News Program on the internet – is about solutions.

We state what the news is and then how to protect yourself form this madness…

So here is what you can do to protect yourself.

Continue reading Wikileaks: CIA Now Controls Your COmputer

#Vault7 ‘Athena’: CIA’s anti-Windows malware ‘better than bombing things’

The latest in WikiLeaks’ series of #Vault7 leaks was released Friday detailing malware that provides remote beacon and loader capabilities on target computers using several Microsoft Windows operating systems. Read Full Article at RT.com

via #Vault7 ‘Athena’: CIA’s anti-Windows malware ‘better than bombing things’ — RT – Daily news

Did Wash Post Publish Dubious Russia Story to Distract From Seth Rich Bombshell? » Alex Jones’ Infowars: There’s a war on for your mind!

The Washington Post published its dubious story on President Trump leaking classified information to the Russians less than an hour after the bombshell news broke that murdered DNC staffer Seth Rich was in contact with Wikileaks and that DC Police were ordered to cover it up.

The coincidental timing has led many Trump supporters to accuse the Post of publishing their story in an attempt to distract the rest of the media from focusing on the massive new revelations in the Seth Rich case.

Source: Did Wash Post Publish Dubious Russia Story to Distract From Seth Rich Bombshell? » Alex Jones’ Infowars: There’s a war on for your mind!

“Worst-Ever Recorded” Ransomware Attack Strikes Over 57,000 Users Worldwide, Using NSA-Leaked Tools | Zero Hedge

The ransomware has been identifed as WannaCry

* * *

Update 4: According to experts tracking and analyzing the worm and its spread, this could be one of the worst-ever recorded attacks of its kind. The security researcher who tweets and blogs as MalwareTech told The Intercept “I’ve never seen anything like this with ransomware,” and “the last worm of this degree I can remember is Conficker.” Conficker was a notorious Windows worm first spotted in 2008; it went on to infect over nine million computers in nearly 200 countries. As The Intercept details,

Today’s WannaCry attack appears to use an NSA exploit codenamed ETERNALBLUE, a software weapon that would have allowed the spy agency’s hackers to break into any of millions of Windows computers by exploiting a flaw in how certain version of Windows implemented a network protocol commonly used to share files and to print. Even though Microsoft fixed the ETERNALBLUE vulnerability in a March software update, the safety provided there relied on computer users keeping their systems current with the most recent updates. Clearly, as has always been the case, many people (including in governments) are not installing updates. Before, there would have been some solace in knowing that only enemies of the NSA would have to fear having ETERNALBLUE used against them–but from the moment the agency lost control of its own exploit last summer, there’s been no such assurance.

Today shows exactly what’s at stake when government hackers can’t keep their virtual weapons locked up.

As security researcher Matthew Hickey, who tracked the leaked NSA tools last month, put it, “I am actually surprised that a weaponized malware of this nature didn’t spread sooner.”

Update 3: Microsoft  has issued a statement, confirming the status the vulnerability…

Today our engineers added detection and protection against new malicious software known as Ransom:Win32.WannaCrypt.

In March, we provided a security update which provides additional protections against this potential attack.

Those who are running our free antivirus software and have Windows updates enabled, are protected. We are working with customers to provide additional assistance.

Source: “Worst-Ever Recorded” Ransomware Attack Strikes Over 57,000 Users Worldwide, Using NSA-Leaked Tools | Zero Hedge

WikiLeaks Reveals “Archimedes”: Malware Used To Hack Local Area Networks » The Event Chronicle

By Zero Hedge

In its seventh CIA leak since March 23rd, WikiLeaks has just revealed the user manual of a CIA hacking tool known as ‘Archimedes’ which is purportedly used to attack computers inside a Local Area Network (LAN).  The CIA tool works by redirecting a target’s webpage search to a CIA server which serves up a webpage that looks exactly like the original page they were expecting to be served, but which contains malware. It’s only possible to detect the attack by examining the page source.  Per WikiLeaks:

Today, May 5th 2017, WikiLeaks publishes “Archimedes”, a tool used by the CIA to attack a computer inside a Local Area Network (LAN), usually used in offices. It allows the re-directing of traffic from the target computer inside the LAN through a computer infected with this malware and controlled by the CIA. This technique is used by the CIA to redirect the target’s computers web browser to an exploitation server while appearing as a normal browsing session.

The document illustrates a type of attack within a “protected environment” as the the tool is deployed into an existing local network abusing existing machines to bring targeted computers under control and allowing further exploitation and abuse.

Source: WikiLeaks Reveals “Archimedes”: Malware Used To Hack Local Area Networks » The Event Chronicle

WikiLeaks Reveals CIA Tool ‘Scribbles’ For Document Tracking | Threatpost | The first stop for security news

 

WikiLeaks released details on what it said is a Central Intelligence Agency document tracking program called Scribbles, part of the agency’s effort to keep tabs on documents leaked to whistleblowers and journalists. Scribbles allegedly embeds a web beacon-style tag into watermarks located on Microsoft Word documents that can report document analytics back to the CIA.

WikiLeaks released information Friday about Scribbles as part of its ongoing  Vault 7 Dark Matter release that began last month. Also released is what WikiLeaks said is Scribbles’ source code.

A user manual describing Scribbles said the tool can be used to generate batch copies of identical or unique files, each with distinctive watermarks that includes a web beacon-like tag. A web beacon (or web bug) is a transparent graphic image that can be used to report back if a document has been opened and the IP address of the computer that requested the image file.

According to WikiLeaks, Scribble works exclusively with Microsoft Office documents. The tool, according to the user guide has been “successfully tested” to work with Microsoft Office 2013 (on Windows 8.1 x64) and Office 97-2016 running on Windows 98 and above.

WikiLeaks’ copy of the CIA’s Scribbles user manual says the tool will not work on encrypted or password-protected documents. The CIA also warns that if a document with a Scribbles’ watermark is opened in an alternative document viewing program, such as OpenOffice or LibreOffice, it may result in revealing watermarks and URLs for the user…

Source: WikiLeaks Reveals CIA Tool ‘Scribbles’ For Document Tracking | Threatpost | The first stop for security news

(45) 4.22 Update – Wikileaks Shenganigans, Operation Gotham Shield (NY Blackout!) & BIG Solar Storm

https://www.youtube.com/watch?v=T5IM3P9Md-4

Published on 22 Apr 2017

YouTube Vid: “Pizzagate Pedogate Dutch Whistleblower Real Big Money Revelations by an Insider ” – https://goo.gl/SR2IyH
The Hill: “Assange says WikiLeaks will show ‘all sorts of illegal actions by the CIA'” – https://goo.gl/5XDFuQ
SOTT: “False flag alert: Operation Gotham Shield will simulate nuke detonation over Manhattan” – https://goo.gl/LO6wkg
Solarham: Check current solar weather – http://solarham.net/

VIDEO: iPhones Are iSpies – Wikileaks “Vault 7” Revelations Continue To Terrify

(Roqayah Chamseddine) Since launching in 2006, Wikileaks has reportedly released over 10 million documents, including controversial disclosures that have helped unravel war crimes, uncover corporate secrets and even brought to light explosive revelations stemming from Hillary Clinton’s most recent presidential run.Read more »

via VIDEO: iPhones Are iSpies – Wikileaks “Vault 7” Revelations Continue To Terrify — Stillness in the Storm

Unaccounted Power is Dragging Global Society Into An Orwellian Dystopia

WikiLeaks dropped a bombshell on the U.S. Central Intelligence Agency. Code-named “Vault 7”, the whistleblowing site began releasing the largest publication of confidential documents, that have come from the top secret security network at the Cyber Intelligence Center. Long before the Edward Snowden revelations, Julian Assange noted how “The Internet, our greatest tool of emancipation,…

via Unaccounted Power is Dragging Global Society Into An Orwellian Dystopia — Prepare for Change

Manhunt underway for CIA ‘traitor’ who leaked ‘Vault 7’ to WikiLeaks – report — RT America

The FBI and CIA are investigating hundreds of possible suspects in one of the biggest security breaches in CIA history, CBS News reports. The WikiLeaks “Vault 7” release, which contained thousands of top-secret documents, revealed the agency’s hacking tools.

A joint investigation and manhunt by the Federal Bureau of Investigation and the Central Intelligence Agency into the source of WikiLeaks’ “Vault 7” dump last month has begun, CBS News justice and homeland security correspondent Jeff Pegues reported Wednesday evening.

The release last month brought to light the CIA’s digital arsenal for hacking into computer systems and smart devices such as phones and televisions. Thousands of top-secret classified files that had previously been guarded within a “highly secure section of the intelligence agency,” as CBS News sources described it, were made available to the world for free by WikiLeaks.

The source of the leak, the FBI and CIA reportedly believe, was one of the hundreds of agents or contractors who had physical access to the material, not an outside hacker. That suspicion seems to align with what WikiLeaks said in their press release announcing the Vault 7 release on March 7.

“The archive appears to have been circulated among former US government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive,” the pro-transparency group said.

Unnamed US intelligence sources told Reuters within a day of the release that the CIA had been anticipating it since near the end of 2016.

The FBI and CIA coordinated reviews of the incident and a criminal investigation was opened within a day of the release, the Washington Post reported at the time, based on an unnamed former intelligence official who said to expect “another major mole hunt.”

Former CIA Deputy Director Mike Morell told CBS News less than a week after the release that the leak “has to be an inside job,” as the data was on a CIA top secret network “not connected to any other network.”…

Still working through the publication, but what @Wikileaks has here is genuinely a big deal. Looks authentic.

What makes this look real?
Program & office names, such as the JQJ (IOC) crypt series, are real. Only a cleared insider could know them.

Source: Manhunt underway for CIA ‘traitor’ who leaked ‘Vault 7’ to WikiLeaks – report — RT America

WikiLeaks releases ‘Hive’, latest in #Vault7 series — RT News

WikiLeaks has released ‘Hive’, the fifth installment in a series of leaks exposing alleged CIA hacking techniques known as ‘Vault 7’. The latest batch consists of six documents.

WikiLeaks describes Hive as a “back-end infrastructure malware with a public-facing HTTPS interface,” used to transfer information from machines targeted by the CIA and to allow commands to be communicated in order to execute specific tasks on those machines.

To hide the presence of such malware, WikiLeaks notes that the public HTTPS interface (a protocol for secure communication over a computer network within an encrypted connection) “utilizes unsuspicious-looking cover domains,” meaning those targeted would be unaware of the CIA’s interference.

WikiLeaks notes anti-virus companies and forensic experts have noticed “possible state-actor” malware using similar back-end infrastructure, but were unable to connect the back-end to CIA operations.

READ MORE: WikiLeaks ‘hostile intel,’ Assange & his followers ‘demons’: CIA chief goes ballistic

The Hive documents released Friday may allow experts to examine this kind of communication between malware implants and backend servers, WikiLeaks says.

The CIA’s Hive project was created by its Embedded Development Branch (EDB). This branch was also responsible for projects detailed in WikiLeaks’ ‘Dark Matter’ leak, revealing the CIA’s attacks on Apple firmware.

: WikiLeaks releases ‘Dark Matter’ batch of CIA hacking tactics for Apple products https://on.rt.com/86rt 

A 2015 User Guide reveals the initial release of Hive was in 2010, and describes the software implant as having two primary functions – a beacon and interactive shell. Both are designed to provide an initial foothold to deploy other “full featured tools.”

Source: WikiLeaks releases ‘Hive’, latest in #Vault7 series — RT News

Do you have a Windows Computer? Wikileaks is WARNING all CUSTOMERS with THIS Latest Release — NESARA-NEWS

Today, April 7th 2017, WikiLeaks releases Vault 7 “Grasshopper” — 27 documents from the CIA’s Grasshopper framework, a platform used to build customized malware payloads for Microsoft Windows operating systems.CIA malware re-installs itself every 22 hours by corrupting Windows Update – even if disabled. The documents WikiLeaks publishes today provide an insights into the process…

Schermata 2017-04-07 alle 18.37.18

via Do you have a Windows Computer? Wikileaks is WARNING all CUSTOMERS with THIS Latest Release — NESARA- REPUBLIC NOW – GALACTIC NEWS

Susan Rice Unmasks Then Bang Wikileaks Drops Another Log on the Fire! 

By Lisa Haven

Earlier this year it was revealed by Julian Assange, Wikileaks, via their Vault 7 release, that the CIA created a secondary NSA surveillance system—one with less oversight than that of the NSA. It was also discovered that the CIA could implant virtual forensic fingerprints on computers and frame someone for a crime they didn’t commit, through a project known as UMBRAGE. Furthermore, Wikileaks revealed how the CIA could remotely take over the controls on vehicles and cause undetectable assassinations.

A few weeks later Wikileaks placed another nail in the CIA coffin with their release of Dark Matter, a program which proves they are implanting technology in iPhones during their creation. Meaning all the CIA has to do is access the “chip” to hear any and everything you are saying.

Now, as of March 31st, Wikileaks dropped yet another section of the Vault 7 files with their latest release of Marble Framework. Here’s more on this report…

Source: Susan Rice Unmasks Then Bang Wikileaks Drops Another Log on the Fire! | Police State

Steve Pieczenik: Vault 7 Is Aimed To Take Down CIA

Published on 18 Mar 2017

SUBSCRIBE to see more similar videos https://goo.gl/scaine

Most Recent Upload https://goo.gl/lPjw8n

White Hats Strike Back vs. The Shadow Government

https://www.youtube.com/watch?v=aDPMNOgOz4E

 

Vault7: WikiLeaks Reveals ‘Marble’ Tool That Can Frame Russia, China, & More For Cyber Attacks – Collective Evolution

Wikileaks just released another set of documents from Vault 7 that detail the CIA’s secret anti-forensic program, Marble Framework, which allows them to prevent forensic investigators from pinning hacking attacks, viruses, and trojans to the agency. It shows just how protected the CIA is from being held accountable for unethical or illegal actions. advertisement – learn moreAccording to Wikileaks, the program allows them to direct blame away from the CIA and onto another party by hiding fragments of texts that would allow the author of the malware to be identified…

Source: Vault7: WikiLeaks Reveals ‘Marble’ Tool That Can Frame Russia, China, & More For Cyber Attacks – Collective Evolution

Wikileaks Bomb! Bush Stopped Pedophile Investigations!

On Monday February 27th, 2012, WikiLeaks began publishing The Global Intelligence Files, over five million e-mails from the Texas headquartered “global intelligence” company Stratfor. The e-mails date between July 2004 and late December 2011. They reveal the inner workings of a company that fronts as an intelligence publisher, but provides confidential intelligence services to large corporations, such as Bhopal’s Dow Chemical Co., Lockheed Martin, Northrop Grumman, Raytheon and government agencies, including the US Department of Homeland Security, the US Marines and the US Defence Intelligence Agency. The emails show Stratfor’s web of informers, pay-off structure, payment laundering techniques and psychological methods…

https://www.youtube.com/watch?v=ppCabw0ruQE

https://www.youtube.com/watch?v=QH476wd2UEM

Source: Wikileaks Bomb! Bush Stopped Pedophile Investigations! | Alternative

Wikileaks Drops New Bombshell Against CIA! 

WikiLeaks has published hundreds more files today which it claims show the CIA went to great lengths to disguise its own hacking attacks and point the finger at Russia, China, North Korea and Iran.

This could lead forensic investigators into wrongly concluding that CIA hacks were carried out by the Kremlin, the Chinese government, Iran, North Korea or Arabic-speaking terror groups such as ISIS.

Prelude to a False Flag?

See the first video for the Wiki Bombshell Against CIA and see the second video for Wikileaks documentary…

https://www.youtube.com/watch?v=FGg-zVu5FnA

https://www.youtube.com/watch?v=3KPzab0SaU4

Source: Wikileaks Drops New Bombshell Against CIA! (Video) | Prophecy