Showing posts with label CIA. Show all posts
Showing posts with label CIA. Show all posts

Friday, October 25, 2019

Profiting from Lies by the News Media and former Obama Administration officials through book sales constitutes perjury in the court of public opinion and criminal conduct against the Constitution!


Many liberal members of the news media and former Obama administration officials who were charter members of the Stop-Trump movement and whose names are now associated with the Justice Department criminal probe of misconduct by public officials have made millions of dollars writing “expose” books about the Trump administration.


Any book published is a public record so any lies offered by the malicious authors or their media bosses should be used as evidence of perjury against such unscrupulous writers involved in the leaking of classified and protected government records.


As the DOJ criminal investigation accelerates and more and more reporters and Obama officials are caught in the spiderweb of corruption their own words published in books should lay the groundwork for perjury charges and they should be prosecuted to the fullest extent of the law for such a grievous violation of public law and trust.


Conspiracies seem to run deep into the lifeblood of the political establishment and the co-collaborators in the news media helping to inflame the anti-Trump news media since Trump became president.


Such efforts to undo the will of the people in electing Trump must be met with aggressive prosecution to insure such a violation of public trust never happens again.
  

Stay tuned for results from the Department of Justice criminal investigation of politics, politicians and press!

The Dawning of a New America – Shining the Light on the underbelly of Corruption on the Political Establishment in our Nation’s Capital. Freedom of the Press is no cover for Criminal Conspiracy!


If the news media colluded with “Obama administration” officials on criminal activity, have they waived their right to Constitutional Protection under the First Amendment?



Can reporters, anchors and executives of CNN, MSNBC, NBC, The New York Times and Washington Post among others be co-collaborators in criminal crimes against the US Constitution?


Should they be indicted and prosecuted for criminal conduct?


Stay tuned for results from the Department of Justice criminal investigation of politics, politicians and press!

Wednesday, March 08, 2017

The Great Deception - Russia Just Hacks Us - The Truth - We Invented Hacking!

.

One thing you have to love about the media, they will always be so preoccupied with their agenda they will have no time for historical analysis, research, and cross checking facts.  So we remain focused on how those dastardly Russians hacked us in the 2017 elections when we hacked them almost two decades ago.

Wikileaks has once again shown why they are the most loved and hated web site on Earth. Yesterday they dumped another batch of secret documents into the media charade and it showed how the Master developer and user of hacking programs of our world is none other than our very own CIA.


Fancy that, we set the standard for not simply hacking everyone, but for embedding our little packages in abut every computer in the world so it could report back to us.  Now the futuristic technology has been extended to iPhones and Smart TVs.

Did it ever occur to the media that Russian hacking might just be in retaliation for what we have already done to everyone else?  Was it not Wikileaks that spilled the beans on the USA monitoring the phones and emails of foreign leaders, friend and foe alike a few years back?


Here are two current articles about what Wikileaks leaked this time, and a third article on why our hands are not clean on hacking, we wrote the book and our own people were among the victims.


Technology

WikiLeaks publishes massive trove of CIA spying files in 'Vault 7' release

 Andrew Griffin,The Independent 


WikiLeaks has published a huge trove of what appear to be CIA spying secrets.
The files are the most comprehensive release of US spying files ever made public, according to Julian Assange. In all, there are 8,761 documents that account for "the entire hacking capacity of the CIA", Mr Assange claimed in a release, and the trove is just the first of a series of "Vault 7" leaks.
Already, the files include far more pages than the Snowden files that exposed the vast hacking power of the NSA and other agencies.
In publishing the documents, WikiLeaks had ensured that the CIA had "lost control of its arsenal", he claimed. That included a range of software and exploits that if real could allow unparalleled control of computers around the world.
It includes software that could allow people to take control of the most popular consumer electronics products used today, claimed WikiLeaks.
"'Year Zero' introduces the scope and direction of the CIA's global covert hacking program, its malware arsenal and dozens of "zero day" weaponized exploits against a wide range of U.S. and European company products, include Apple's iPhone, Google's Android and Microsoft's Windows and even Samsung TVs, which are turned into covert microphones," the organisation said in a release.
The public files don't include the cyber weapons themselves, according to a statement. The organisation will refrain from distributing "armed" software "until a consensus emerges on the technical and political nature of the CIA's program and how such 'weapons' should analyzed, disarmed and published", it said.
The files were made available by a source who intended for them to start a conversation about whether the CIA had gained too much power, according to the organisation.
"In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA's hacking capabilities exceed its mandated powers and the problem of public oversight of the agency," a release read. "The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons."
It also redacts the details of some of the names, locations and targets that are identified in the documents.
The organisation had teased the release in advance with strange messages about the release being "Year Zero", and references to "Vault 7". It had planned to release the files later on but that plan was thrown off when its press conference came under cyber attack, Mr Assange claimed.

Technology

WikiLeaks claims the CIA built special tools for hacking iPhones and other Apple products

 Kif Leswing,Business Insider


(AP) 
Documents published on Tuesday by WikiLeaks claim to be evidence that the "CIA lost control of the majority of its hacking arsenal." 

According to the WikiLeaks files, it appears that the CIA has teams specifically dedicated to breaking into Apple products, including iOS, the software that runs on iPhones and iPads, and even Apple's line of routers, AirPort
The WikiLeaks files suggest that the CIA may have access to undiscovered and unreported bugs, or exploits, in iOS, the iPhone operating system. 
"While our initial analysis indicates that many of the issues leaked today were already patched in the latest iOS, we will continue work to rapidly address any identified vulnerabilities," Apple said in a statement. 
Here's Apple's complete statement on the WikiLeaks files: 
"Apple is deeply committed to safeguarding our customers’ privacy and security.  The technology built into today’s iPhone represents the best data security available to consumers, and we’re constantly working to keep it that way. Our products and software are designed to quickly get security updates into the hands of our customers, with nearly 80 percent of users running the latest version of our operating system. While our initial analysis indicates that many of the issues leaked today were already patched in the latest iOS, we will continue work to rapidly address any identified vulnerabilities.  We always urge customers to download the latest iOS to make sure they have the most recent security updates.”
There is also evidence in the 7,818 web pages and attached files that the CIA has tools to gain unauthorized access to Android devices, smart TVs, and other computers. 

'Nothing interesting or new' about the published exploits

(A screenshot of purported exploits the CIA was aware of and documented.WikiLeaks)
 
Will Strafach, a security professional with extensive experience with iOS exploits and CEO of Sudo Security Group, cast doubt about the "leaked iOS stuff from CIA" on Twitter, saying that there appeared to be "nothing interesting or new."
"So far, there is zero cause for concern," Strafach told Business Insider. "They definitely have vulnerability research (looks very similar to my own company's internal wiki), but nothing which should be if any concern to a user on the latest iOS."
Apple regularly fixes the kind of bugs and potential exploits that the CIA purportedly developed and bought. For maximum security, you should update to the latest version of iOS on your iPhone or iPad in Settings > General > Software Update
In a statement accompanying the document release, Wikileaks claimed that there was a group inside the CIA specifically dedicated to hacking iPhones and iPads. Wikileaks wrote: 
Despite iPhone's minority share (14.5%) of the global smart phone market in 2016, a specialized unit in the CIA's Mobile Development Branch produces malware to infest, control and exfiltrate data from iPhones and other Apple products running iOS, such as iPads. CIA's arsenal includes numerous local and remote "zero days" developed by CIA or obtained from GCHQ, NSA, FBI or purchased from cyber arms contractors such as Baitshop. The disproportionate focus on iOS may be explained by the popularity of the iPhone among social, political, diplomatic and business elites.


The U.S. has a long history of hacking other democracies
December 20, 2016


The former commander in chief of the Allied forces in Europe, Gen. Dwight David “Ike” Eisenhower poses for a photographer at NATO Paris headquarters in 1951. (AFP/Getty Images)

Why do democratic governments so often engage in violent covert actions?

The United States is roiled by controversy over Russia’s broad covert operation to undermine the legitimacy of the 2016 presidential election and Western democracy in general. But the U.S. government has interfered in other democracies’ decisions with violent clandestine operations that go back generations.
During the George W. Bush administration, the American public learned about post-9/11 covert actions that many found disturbing, including secret memos authorizing torture of terrorist suspects; a highly secretive program of “extraordinary renditions,” which involved the government-sponsored capture and transfer of detainees from U.S. jurisdiction to other states without due legal process for purposes of detention and interrogation; and “black sites,” or secret prisons operated by the CIA.

But as our research has found, those operations were a continuation of U.S. policy, not a break with it.
Here’s how we did our research — and what we found
We examined unclassified Central Intelligence Agency documents and historical academic research on U.S. interventions to identify 27 U.S. clandestine operations carried out between 1949 and 2000.

Most U.S. “secret wars” were against other democratic states.
Unclassified documents published by the U.S. national security archive at George Washington University show that the British government helped the United States overthrow Mohammad Mosaddegh, a democratically elected prime minister of Iran, and tried to block the release of information about its involvement in the coup.

But that’s just one example. In 1954, an anti-Communist “army” trained and armed by the CIA deposed democratically elected president Jacobo Arbenz Guzman in Guatemala — leading to years of violent civil war and rightist rule. Fifty-seven years later, Guatemalan President Alvaro Colom, on behalf of the state, asked Guzman’s family for forgiveness.

And in 1981, President Ronald Reagan authorized the funding for the CIA-led “secret wars” against the democratically elected Sandinista government in Nicaragua. These are but a few examples of the U.S. covert operations abroad.

Kissinger: Trump has opportunity to make history in U.S. foreign relations

During an interview aired Dec. 18, former secretary of state Henry Kissinger said of foreign leaders' relationship to President-elect Donald Trump, "It is a shocking experience to them that he came into office, at the same time, an extraordinary opportunity." Kissinger says of foreign leaders of Trump, "It is a shocking experience to them that he came into office, at the same time, an extraordinary opportunity." (Reuters)

We also examined the nationality of detainees in the “war on terror” between 2001 and 2006, when the United States was casting the broadest net to find and detain prisoners. The individuals detained by the U.S. military on the orders of the U.S. administration were placed at the Guantanamo Bay detention camp in Cuba or transferred to Abu Ghraib in Iraq. There is a public record of their detention.

In parallel to the U.S. military operations, the CIA seized several people in foreign territories suspected of hostile actions against the United States. Held incommunicado and without due process of law, these individuals were placed in the CIA’s secret prisons or sent to states known for forced disappearances and torture.

We compiled the list of individuals covertly detained by the CIA from reports by international human rights groups and independent news organizations providing investigative reporting on the CIA renditions program. Our analysis further confirmed that the United States was substantially more likely to use clandestine coercion against citizens of democratic states.

Why do democratic governments engage in frequent violent covert actions?

Policymakers worry whether their actions will be perceived as legitimate. Legitimacy comes in part from keeping policies consistent with citizens’ interests and expectations.

For instance, since wars and violence are inimical to citizens’ interest in self-preservation and freedom, policymakers are predisposed to value peace. Democratic governments will launch open violence only if they think they can persuade citizens that those actions are legitimate.

While working covertly to bring down democracies, the United States also worked to engineer public support for overt use of force, if necessary. For instance, in 1954, the Eisenhower administration spread fearmongering propaganda about the “communist leanings” of the Guatemalan president. The U.S. news media subsequently misrepresented the coup as a successful restoration of democracy in Guatemala, carried out by local freedom fighters.

The news media did not report what it did not know: that the CIA had masterminded and funded the revolt. Similarly, the British government used the BBC’s Persian service to spread anti-Mosaddegh attitudes before the 1954 Iranian coup.

When democratic governments can’t get their citizens to support coercive policies abroad, they — at times — can and do resort to covert force.

Mariya Y. Omelicheva is associate professor in the department of political science at the University of Kansas.

Christian Crandall is professor in the department of psychology at the University of Kansas.

Ryan Beasley is senior lecturer in the school of international relations at St. Andrews University.
.      

Wednesday, October 16, 2013

Main Street Media Blows it Again - Fails to Report on Intelligence Disasters Right Under their Noses

.


 CIA FBI NSA DIA - Whose Spying on Them? 
 
Thank God for the Guardian and Telegraph of England or we Americans would have no idea what our own intelligence agencies having been doing to us and people around the world.
 
One might think our news media people are in cahoots with our intelligence (or is it unintelligence) people the way the media fails to cover and follow up on major breaking news regarding the intelligence disasters in America.
 
The following release is about a new book by a former KGB major and one of the most significant defections to America during the Cold War, Victor Sheymov.

 
More important, it is about how he was treated by the American intelligence agencies after he came here to help out.
 
The most disastrous sky scandals of the past 20 years, the Aldrich Ames CIA fiasco and the Robert Hanssen FBI fiasco both centered on Victor and the KGB interest in his activities once he defected to America.  You might say they were prepared to do all possible to infiltrate the CIA and make certain Victor had a very short stay here in the states.  Need I say more?
 
His story may help tear the gates off Hell and expose more of the surreptitious actions by our national security protectors when it comes to intelligence agencies out of control who show a total disregard for the laws of the land and our place in the world.
 
 
Terrorism, counter-intelligence and national security sound patriotic until one explores the depths of the dark side of life where the intelligence games are played out and learns of the victims of these games caught up in power struggles, egos and fanaticism that defy all principles of individual freedom and rights.
 
Whether the CIA, the FBI or the NSA, are we really safer with them on our side?  If so why are so many scandals carried out in the very offices of our own protectors?
 
 
Well once again the media has failed to not only grasp, but to find, a story that lays out the "Bare" facts about the dark side of intelligence.  Thank God for Amazon, where one can still find the truth by reading the latest books on Kindle like Victor Sheymov's incredible expose, TieBreaker - Tower of Secrets II, the sequel to his riveting book Tower of Secrets.
 
 
Here is the release our Main Street media are too busy to report on.  Once again the New York Times, Washington Post, Wall Street Journal, NBC-ABC-CBS news and all the other so called viable news media in America should be ashamed.
 
As David Ignatius, Associate Editor of The Washington Post said,  "Sheymov knew the secrets that spy services die to protect."
 
Look for the truth in the London Telegraph or Coltons Point Times.
 
 
CYBER BOOKS PUBLISHING
 
FOR IMMEDIATE RELEASE
   
October 2013                                                   contact@cyberbookspublishing.com

Cybersecurity Expert Reveals the Seismic Faults in the Spying Business

TIEBREAKER: Tower of Secrets II

By Victor Sheymov

In one of the most daring operations of the Cold War the CIA exfiltrated Victor Sheymov, his wife and young daughter, and brought them to the US.  Sheymov, as a key player of KGB cyber communications security, had extraordinary knowledge of the whole KGB organization, and the CIA awarded him the highest grade of the intelligence medal for the services he rendered to the United States. Yet for the ten years that he and his family remained under deep cover, unbeknownst to the KGB, working at the highest levels of the NSA and British Intelligence, the CIA itself turned out to be Sheymov’s most insidiously persistent, and dangerous enemy. Why?

TIEBREAKER is the fascinating story of how Victor Sheymov figured out the reason behind the campaign to destroy him and his family, and the cause of the CIA’s catastrophic intelligence failures that the public had a chance to have a glimpse at with the arrest of Aldrich Ames in 1994.

Sheymov then found himself at the center of the next intelligence crisis with the arrest in 2001 of his longtime FBI liaison, Robert Hanssen.

And now Victor Sheymov, world-class cyber security expert and inventor of a breakthrough cybersecurity technology, finds himself at the heart of the search of  the solution to the rapidly growing global threat to cyber security.

Sheymov analyzes the factual failure of the firewall technology and the basis of this breakthrough concept in his other new book,

CYBERSPACE AND SECURITY:

A Fundamentally New Approach

Cyberspace is defined, and differentiated from out physical space. New method of consummations, Variable Cyber Coordinates (VCC) that provides for superior level of security is described and detailed.
 
TOWER OF SECRETS
 
Sheymov told the story of his meteoric career in the KGB, and his disillusionment with Communism and the Soviet system that led to his decision to defect, in his first book.
 
Superlative...a breathtaking true story...a towering book, fascinating and hair-raising...far more exciting than the most exciting accomplished fiction of the spy genre. Associated Press 
 
Sheymov knew the secrets that spy services die to protect.   David Ignatius, Associate Editor of The Washington Post, author of Agents of InnocenceBody of Lies

While the story ends abruptly with Sheymov's escorted arrival in N.Y.C., it seems likely that the information he subsequently furnished hastened the Cold War's end. A top-level insider's dramatic, stranger-than-fiction disclosures in the great game of espionage.     Kirkus Reviews
.