Showing posts with label Hacking. Show all posts
Showing posts with label Hacking. Show all posts

Wednesday, 29 June 2022

BBC Article From 1999 Shows The NSA Were Spying on Foreign Buyers of Microsoft Computers Before 2000 with Bill Gates Permission

BBC Reports On NSA Chips In Microsoft PC Computers Pre-2000

By Dark Politricks

I've saved this old 1999 BBC News report on NSA chips found in a Windows computer, due to the likelihood of it being removed at any time. 

This shows that the NSA was:
  1. Working with Microsoft Windows before 2000
  2. They had a relationship that allowed them to implant their own chips into the PC's.
  3. It is widely suggested that the chip allowed the NSA to bypass any security measures that the user of the machine may have installed.

From the article:
The approval mechanism was introduced to ensure that the weak encryption in non-US versions of Windows could not be replaced with stronger software without it being checked against a "key" embedded in Windows, proving that it had been digitally signed off by Microsoft.


You can read more about the original article and other spying techniques brought in after 9.11 like TRAPWIRE, Prism, XKeyScore, and more here > http://www.darkpolitricks.com/2022/06/bbc-article-from-1999-shows-nsa-were.html


By Dark Piolitricks

© 2022 Dark Politricks

Thursday, 10 February 2022

Alternative Search Engine

Add The #ALTNEWS Search Engine To Your Site

By Dark Politricks

UPDATE 3rd March 2022 - SORRY But GOOGLE has removed my #ALTNEWS search engine with no reason given. It may be due to the alternative content delivered, the ease of getting opposite points of view from shadow-banned sites, or it may be something else. 

However, I urge you to read an earlier article about me wanting to create a REAL #ALTNEWS search engine like I used to own. However, for that I need servers and time to code it - want to help me? Any offer is appreciated!

I apologise for the inconvenience that some of you who have been using it must be feeling. I hope to get a real search engine up as soon as possible.

You might have seen my search engine bar at the top of the site with the words "Search the #Altnews Database, to just search this site add +darkpolitricks.com" in bold.

This is a JavaScript based Google search engine that only searches the list of sites I have given it. So far I am working off the main sites from the list of 550+ sites they don't want you reading about or linking to which for some reason includes mine. You can read all about the list of 550+ sites they want to ban you from reading here.

Now you may just want to visit me and use the search bar on my site to search these sites, or you may want to bookmark a direct link to this search engine which I do on my browsers. 

If so just go to this URL and bookmark it as "ALT News" or "ALT Search" or something like that.


However, if you want to add the search engine to your own site or blog which would really be nice as it would mean that the news from these sites is more accessible despite Google's attempt to de-rank the sites. For example, my own site used to be top of Google for search terms like:
However, I am not anymore due to Google pushing me down the rankings. Luckily I am still at the top for some searches like "A Guide To No Comment Interviews" but I hold no hope of staying there. 

So until I can get the resources together to actually build my own search engine which I did use to have until the server hosting my "Super Search" ( which scanned both Google, Bing and Yahoo for the search terms going through 3 random proxies so that there was no log files or traces of your search terms, plus I removed all the JavaScript code that logs clicks, tracks you, as well as removing any results from known establishment sites like CNN, BBC, FOX etc ), took it down, then the best I can do is work with the devils own tools to create a custom Google Search Engine that only looks at certain sites.

I don't include YouTube.com but I do include Bitchute.com, BrandNewTube.com, and Rumble.com for videos, and as for other sites on the banned list, I don't choose all right or left-wing outlets but just those that appear on the ban list and alternative sites that people recommend to me. 

Some of the main ones apart from my own are:
And many others, to check news just from a certain site as my example text in the box shows, you just add a plus sign around the domain of the site you want. 

For example to see all videos on bitchute.com about WTC7 collapse you would enter WTC7 Collapse +"bitchute.com" this way you can narrow down searches to a specific site.

Remember!!!

If you find that any important sites are missing, whether they are left-wing, right-wing or anarchist or just alternative sites that may have been "cancelled" or de-ranked, then please ensure that they still exist, e.g one of the big ones PrisonPlanet.com no longer exists after Alex Jones's cancellation across the board, and please add a request in a comment on one of my posts, preferably this one, to add the site once you are sure it doesn't exist in my search engine

A quick way to find out whether a site does or does not exist is to just search for the domain name e.g +"infowars.com"

So the more people who use this search engine the better for alternative news the authorities don't want us to read. If you have your own site or blog then you can help out by adding the search engine into your own site with the following code.

This way the more people who add the search engine, the more chances people have of reading alternative news that is being hidden from the masses.

How To Add The ALTNews Search Engine To A Site

The first thing you need to do is add the following code into your site which loads up the search bar and places it into the div with the class, "gcse-search". In your browser turn on the developer toolbar, usually under any browser's settings menu option, then More Tools > Developer Tools. This should open up a new panel in your browser at one side of the screen or at the bottom.

You will see when inspecting the search box once loaded, that it is actually given an ID of gsc-iw-id1. This is important if you want to target the box and style the font or add wording like I have inside my version on this site. I will show you how to do this a little bit down the page.
<script async src="https://cse.google.com/cse.js?cx=005138288515408039386:xatdxpwn9on"></script>
<div class="gcse-search"></div>

Also, you need to make sure your site has the following heading settings for maximum compatibility with HTML 5 browsers, which most people should be using by now. If anyone is using IE still then they need to really update to a standards-compliant browser such as Firefox or all the Chromium-based browsers such as Microsoft's EDGE, Chrome, Opera, or Brave.

<!DOCTYPE html>
<meta name="viewport" content="width=device-width, initial-scale=1">

If you want to add some text into it like I do to inform people what the search bar is for, that toggles on/off whenever you click inside the box, and returns the text when you come out of it, then you need to place some extra JavaScript somewhere on your page. 

If you are using widgets then add a JavaScript/Text widget to the bottom of your layout as you will need to add some JavaScript code inside it that will target the box by its ID, add text inside and make it bold. 

Plus you will need to add event handlers that will remove the text when you put your cursor inside (called "focus"), and also return this text when you come out of the box (called "blur") - or in IE's old JScript language, "onfocus" and "onblur".

I use a window.onload event to make sure all external objects from Google such as the search bar  has loaded before I attempt to add wording inside of the box, otherwise, you may cause a JavaScript error by attempting to get a reference to the search bar when it has not been loaded into the HTML page yet.

I first add a helper function with a single letter G, (for GetMe), and I point it towards the document.querySelector function. This way we can easily target the search engine with CSS selectors, IDs, or an elements Class.

G = function(v){return document.querySelector(v)};

Now we add the code that puts the wording into the text box when the page loads and disappears when you enter it to add your own search, and re-appears when you come out. 

You can obviously change this wording to whatever you want but ensure it is worded the same everywhere it appears in the code.

window.addEventListener("load", function() 
{
	if(G("#gsc-i-id1")){
		G("#gsc-i-id1").value = "Search the #Altnews Database, to just search this site add +yourdomain.com";
G("#gsc-i-id1").style.fontWeight="bold";
	}
	G("#gsc-i-id1").addEventListener("focus",function(){
		G("#gsc-i-id1").value="";
	});
	G("#gsc-i-id1").addEventListener("blur",function(){
		if(G("#gsc-i-id1").value==""){
			G("#gsc-i-id1").value = "Search the #Altnews Database, to just search this site add +yourdomain.com";
G("#gsc-i-id1").style.fontWeight="bold";
		}
	});	
});

And that should be it, whether you are using WordPress, Blogger, or your own code you can now add the #ALTNews Search Engine to your own site and help us find articles that the establishment and their Silicon Valley lackeys are trying to hide from people much more easily.

Remember to let me know of any sites I may have missed in any comments if you are using it!

By Dark Politricks

© 2022 Dark Politricks

Thursday, 28 October 2021

An interview with Gary McKinnon about UFO's, Free Energy and UK Law

An interview with Gary McKinnon about UFO's, Free Energy and UK Law

By Dark Politricks

An old but interesting interview with Gary McKinnon the famous UK hacker who claims to have found evidence of aliens inside NASA computer systems. I bring this up because Julian Assange is fighting not to be sent to the US for a charge of "HACKING", when in fact he did no such thing and the US's informant recanted all his evidence in an interview with an Icelandic newspaper. 

Gary McKinnon was also charged with hacking in the early 2000's and the US had waited until the new one sided extradition treaty with the UK had become law before charging him. However after public outcry and the knowledge that he had "Asperger's Syndrome", noticed by someone watching an interview with Gary on TV, led to a massive public backlash and even the Tory Home Secretary at the time decided to overrule any court decision saying, he would NOT survive in a US prison, a bit like how the judge in the Assange case said that he wouldn't survive in a US prison. If they cannot even keep high profile suspects like Jeffery Epstein alive under mysterious circumstances then what hope do people like Assange and McKinnon stand?

I hope the lawyers behind Assange bring this up in the US appeal, as at the time the US were labelling Gary as the most "dangerous hacker in the world". When in fact as you will see he did rather little hacking, and was just using the blank admin passwords on unsecure Navy computers to access them. So if we are not going to extradite the worlds most "dangerous" hacker, why should we be contemplating extraditing a non hacker, a journalist, which can be proven by the recanted evidence of the now locked up Sigurdur Ingi Thordarson.

The reason the US may have wanted Gary McKinnon so badly, despite him saving them millions in security audits by showing which servers needed real security if a port probing, blank admin accessing, total non hacker, as Gary freely admits he was, could get into their systems. Was that he found out about the secret space program, and lists off world fleet personnel, none that worked on Naval Ships in the US Navy. I think it had more to do with the fact he was telling the world he had found evidence of the US photo shopping out images of alien craft on the moon before making them public to libraries and universities than any "hacking" he may have done.

This is an older interview and not the original one I had due to it being taken down from YouTube - I wonder why? However it is good enough and comes from BitChute.com.

Within the interview he discusses:
  • Why the American government want him so much and how the UK government capitulated without a fight.
  • How he was a clueless hacker who didn't cover his tracks whilst investigating US computer systems.
  • How he gained access to high grade military and NASA computer system by basic port scanning unsecured US Navy computers, and logging in easily due to the administrator accounts having blank passwords. This isn't really hacking it's as it's pretty easy to run a port scan, I've even made by own port scanners apps in C# such as the one below, and PHP for the web, that let me access a computer and tell me which ports are open. You can even get apps for your phone that do this now, or use one of the many free online port scanners that let you know which ones are open. Therefore it's pretty easy to find out how you can try accessing any computer in question by a certain port. No hacking is actually required, especially if the US were so silly as to have blank admin passwords which gave anyone access to the servers at administrator level. For example here is my own Port Scanner Windows App that I wrote one bored day, which shows me ports that are open on a server, a reverse DNS lookup to find the HOST, the country it is in by a simple geo-IP lookup, a ping test as if you were doing one in a command prompt and an HTTP "Ping" test to see if I can access the IP address or related server on the Internet and the type of Web Server they are using.           
As you can see the information about the server behind the IP address gives me quite a lot of information about the server type, the location of the machine and list of open or closed ports I could then use to try and enter that machine with other tools. Therefore the hack Gary did was very simple and many real hackers would not even consider this REAL Hacking at all.



  • How the US government claims that he caused $5,000 of damage to every computer port he accessed which coincidentally is the minimum amount required by US law to be charged with the crimes he has been charged with. In fact he has saved the US military millions in security analysis by showing them which servers are vulnerable to attack, and if he managed to port scan and access admin accounts you can be sure Russia, China and Israel already have done so.
  • Why he believes that the US government has access to alien technology such as free energy which should be distributed to the people of the world.
  • How NASA has a special agency that's purpose is to remove evidence of UFO's from photos that are then distributed to the public e.g universities and science labs with only the new airbrushed version.
  • How he read the testimony of one of these photographers and proved she was telling the truth by accessing the system in question and seeing first hand one of these images in a before and after shot where before it contained some sort of alien looking craft and afterwards it didn't.
  • How he found a list of names of off world Ship personnel that were not Naval and therefore could be linked to the Secret Space Program. Watch some Richard Dolan videos to find out more about that juicy story.
  • What he feels his chances are of spending 70 years in an American prison and how he is challenging the unfair extradition law between the UK and US which means a UK citizen can be sent off to the USA without evidence of a crime having been committed.
I did have an original interview with Gary in a pub garden where he spoke frankly about all the above issues but YouTube in their infinite wisdom has removed it so I have found the next best thing, an interview by Richard D Hall with Gary McKinnon from 2015.



By Dark Politricks

© 2018 By Dark Politricks


Monday, 2 August 2021

Utopia P2P – A new de-centralised censorship-free and secure decentralized ecosystem

Should we all move to UTOPIA?

By Dark Politricks

utopia-network.io

I came across this advert on my site, and went into have a look as it seemed interesting, and indeed it is. 

It seems to be offering the ability to communicate with other people without worrying about being tracked, intercepted, or hacked by companies or intelligence agencies.

I watched the video and it looked quite good, giving us all the standard blurb about Companies, Governments, and Intelligence agencies watching your every move on the current Internet using tools like PRISM and XKeyScore with the NSA forcing computer companies to install patches that give them back door access to your devices without you knowing about it.

Everything is stored and analysed, GPS location, preferences on websites, private messages, and other information which is being stored and collected by not just companies like

I do like the last line from the advert, "Freedom is not given it has to be taken..", very true, and we have been handing our freedoms away for protection against the very often manufactured "war on terror". A never ending war, designed to replace the Cold War, and keep the money rolling into the MIC's pockets as governments go to fight around the world.

They are constantly chasing and manufacturing new terrorist threats. Many which are actually made up from CIA or other intelligence agencies backing and training them, with Saudi or Qatari support. 

Or at home in the USA the FBI, used under cover agents and informers to plant ideas inside others heads like the recent attempt to kidnap the Michigan Govenor, Gretchen Whitmer. In fact, the men who were arrested for hatching the plot allege that without coercion from FBI informants, the plot may never have materialized. They arrested 13 men but 12 of them were FBI informants, who played a large role in fomenting the plan, as BuzzFeed News said the informants "had a hand in nearly every aspect of the alleged plot, starting with its inception.".

Just look at the mess Syria is in, with America basically invading a third of Syria to steal it's oil, and to starve the Syrians by controlling their wheat fields, as well as protecting the last enclaves of jihadists they has trained to other throw Syrian President Assad. 

He went and got the help from Russia and Iran to clear these ISIS / DAESH terrorists out and they were nearly done apart from Idlib. However the Western Axis of War has taken control of that area and is now protecting them from being flushed out of Syria completely.

The US has no right to be there, they have broken international law by just invading a country with no legitimate reason. 

At least Russia and Iran were invited to the country to help the Syrians fight off the western backed rebels ISIS, al-Nusra, Free Syrian Army, plus the many others including al-Qaeda who I thought were supposed to be the USA's mortal enemy after 9.11 yet they are supporting and training them and their "offshoots" in Syria. 

It is yet another despotic attack by the USA on another country who stirred up a small civil unrest making it seem larger than it was, then saying Assad had no legitimacy, using fake gas attacks to blame on him for breaching the USA's "red lines", under Obama. Something that has been totally debunked by the whistle-blowers from the OPCW, and reported but hardly spread by the mainstream media at all.

We all know about the revelations of Edward Snowden and how the NSA have programs like PRISM and XKeyScore that enable them to track someone online or in real time with easy search tools, aided by the help of Google, so that they can use a nice search engine type format to just enter someone's name, email address or phone no to get information on them and then hack into devices that the person owns.

All with the help of a corrupt FISA court that never turns down requests for phone tapping warrants and there you go, that's how Tucker Carlson got caught up in a now admitted NSA spying plot due to him being engaged with some individuals the NSA was watching as his FOX NEWS team tried to use those men to arrange an interview with Russian President Putin.

Watch this advert for the de-centralised encrypted app Utopia, and it seems to offer quite a lot of features including, private encrypted messaging and emails that cannot be intercepted by anyone, not even the NSA

You can even build anonymous websites inside this domain that uses new de-centralised technology to keep everyone secret, as the advert on this page > says "Make your website or streaming service securely and anonymously available inside Utopia by configuring Packet Forwarding for any of your uNS records. By tunnelling data between the user who owns a uNS name and any other network user. This allows websites to be hosted inside Utopia."

You can even transfer money between people, no wonder it is called Utopia, lets just hope it is not a creation of the CIA or NSA, to get everyone on board so they can watch us eh! 

I wouldn't be surprised if it were a way to get people off the dark net which is becoming very unstable due to the number of sites being removed due to law enforcement crackdowns.

Is UTOPIA a replacement for TOR and the ability to create a whole new "de-centralised" Internet, with websites, email, messaging, money transfers?



Apparently the foundation of Utopia’s economy is an internal Cryptocurrency – Crypton. Users can buy, sell, exchange, or even mine coins via special built-in tools. So you can be making money just by using it.

What do you think?

I am downloading it now and taking it for a spin!

utopia-network.io

By Dark Politricks

© 2021 Dark Politricks

Saturday, 3 March 2018

Why you should read MY ARTICLES on darkpolitricks.com #altnews

By Dark Politricks

Who should follow me? Well let me lay it out for you in one article which you can find on darkAnyone who interested in news that is:

-Anti Establishment -
-Anti War / Peace e.g Not thinking a Russian is under your bed when you go to bed.
-Doesn't support the Petrodollar and the US doing anything for Israel and Saudi Arabia because they probably cleared Fort Knox out decades ago.
-Free Health care for everybody - even in the richest country on earth e.g USA

-A cut back on the US Empire by shutting at least half of their military bases around the world, ending the multi trillion dollar wars in Afghanistan, Iraq, Syria, Yemen, Somalia and all the other places we don't realise. Navy SEALS and Army Rangers are probably stalking, raping, killing in Africa right now then blaming it on the local militias as false flags.

Just as the Israeli's did in Iraq. Dress up as US soldiers then film themselves driving the roads just randomly shooting people to foment resentment and internal strife - plus guerrilla war against the USA.

-That false flags exist > http://www.darkpolitricks.com/2011/06/9-11-sceptics-versus-logic-reason-and-scientific-principles/

-That Russia isn't a utopia but we made a promise to them that we would not move NATO an inch forward towards it if they allowed the Berlin Wall to crumble and the Eastern Block to crack. Can you imagine the USA's response if there were as many Russian bases surrounding the states as there are US bases around Russia/China.

-Education should be free for life for everybody. To retrain for the new economies and just to learn philosophy in your 50's because you want to. You know that Stalin and many other dictators favourite philosopher was Plato and his book "the Republic" because Plato decided the only way to control society was to have a dictator who could get things done properly, but who didn't want the job, and had enough philosophical knowledge to treat his people fairly and equally.

Shame that link is always mentioned between dictators and Plato as we currently live in an Oligarchy of the rich 1% corporatist war machine, money fakers from Wall St who own Congress at the moment. A dictator may get decisions made and done quickly but the people need to put forward THEIR ideas for policies and have politicians come and get your vote.

-Ban lobbyists like the NRA and AIPAC and any group that has revolving door at Congress/Parliament (in any country) that pays off Senators and Congressman (oh and Obama with his half million dollar speeches in Wall St for weakening any regulations with the already piss poor Dodd Frank act) and then gives them jobs as lobbyists to make even more money.

If they are going to ban Redacted Tonight, an American based news show, presented by Americans on American issues just because it has links to the Russian state then they need to ban the BBC, AIPAC, AL-Jazeera and any other foreign "agents", as they are being called.

-The emergency laws enacted after 9.11 that allowed the President to declare war without Congress's permission is not over due for repeal but dangerous and anti-constitutional.

Only Congress can declare War. I suppose this is why we have so many "humanitarian emergencies to involve black hawk helicopters and missile launchers in' protecting the people by dropping "The Mother Of All Bombs" on buildings killing US citizens.

-Having to put masking tape over your webcams and cover microphones, turning GPS off on your phone or even removing batteries (if even possible anymore) to stop triangulation pings, and having GCHQ and the NSA listen and watch you like George Orwell's 1984 is not a 'FREE SOCIETY'.

When George W Bush after 9.11 lied and said the terrorists did this because they hate us for our freedoms we just handed them all away. Laws such as the PATRIOT ACT, NDA, Authorization for Use of Military Force (AUMF), Torture, lack of Habeas Corpus, GITMO. Plus Allowing kids brought up on computer games shooting people with missiles to work in Las Vegas and kill REAL people in Afghanistan then imprisoning/or killing whistle-blowers and journalists who reveal the truth about Prism, xKeyScore, DNC / Podesta emails that showed Democrat primary fraud. Plus there are people who the US tried to extradite from the UK for almost a decade because they found before and after shots from NASA where alien ships had been removed from pictures before being handed out to universities such as Gary McKinnon .

That is an Oligarchy, power by the few.

A free county should have the politicians work for US not the other way round where institutional corporatism has seen Wall St, Silicon Valley and the MIC tell their puppets in Congress what to vote for. They don't care about you, they care about getting a nice cushy job for doing favours for whatever department they are running in Washington/London/Paris after their political career.

Harry Truman said 'No man can get rich in politics unless he’s a crook! It can’t be done.' - just look at how many millionaire politicians are in positions of power at the moment e.g Nancy Pelosi.

-If Iran cannot have nukes nor can Israel. Israel is not even in the NPA and we know they gave US secrets to the Russian through the worst US traitor ever, Jonathan Pollard who was freed after 30 years as a bargaining chip to stop illegal Israeli settlements - how did that go. He got over 60 CIA double agents killed due to his info on NATO plans for a nuclear retaliation > https://www.theguardian.com/world/2015/nov/20/spy-jonathan-pollard-to-be-free-after-30-years-but-still-a-thorn-in-us-israeli-ties

-Talking about nukes, at least we now have a treaty with Iran, which Trump wants to screw up. It ensures excess radioactive material is sent to Russia to be destroyed and that they won't go over a certain percentage needed to make nukes. It is in the Koran not to make such a destructive weapon and Iran has said many time both the mullahs and politicians that they would never build or use one. Iran never dropped missiles on Iraq in their 80's war despite the CIA giving Saddam Hussein the position of Iranian troops knowing he would gas them, killing hundreds of innocent people on a passenger flight, then later telling him it was ok to invade Kuwait > http://www.darkpolitricks.com/transcript-of-meeting-between-saddam-hussein-and-us-ambassador/

When he did invade Kuwait for slant drilling for Oil (drilling at an angle to get Oil from Iraq's water rather than their own) the US turned on him like all good US dictator allies have done to them when they are past their usefulness.

Iran NEVER dropped bombs on Baghdad or other Iraqi cities as they believed killing innocent people by their weapons was anti-Islamic.

Why is this never mentioned when talk of Iran wanting to wipe Israel off the map with nukes is discussed > http://www.darkpolitricks.com/does-irans-president-want-israel-wiped-off-the-map/ > and why is Israels's "Samson Option" > https://www.youtube.com/watch?v=qF5px7PsWjw > destroying the world if threatened, taking the whole Bible story temple/or Eastern/Western capital countries with them if threatened with annihilation.  

 

Tent cities in the richest country on earth due to Wall St kicking people out of their homes due to gambling their pension money. People going bankrupt or even dying because they cannot afford health insurance, kids with a trillion dollars worth of student debt and a country that basically runs on WAR is not a country with a light on the hill for others to look up to but the evil we need to fight before it kills us all.

When you finally wake up and realise we are not the good guys but the baddies then it may come as a shock to the system but facts are facts.

Just 3 books to read that might change your mind. If you have not woken up yet.

War is racket - by Smedley Darlington Butler - America's most decorated soldier.

Confessions of an Economic Hit Man - The shocking story of how America really took over the world.

Conspiracy the Secret History: In Search of the American Drug Lords - Barry and The Boys From Dallas To Mena - How the Iran/Contra scandal was all about using Mena Airport in Arkansas to fly guns down to the right wing rebels and coke back to Mena airport where the CIA used Ricky Freeway Ross (who made a $1 million a day) to sell thew new cheaper more addictive drug Crack in LA.

They always tipped him off giving him a head start on any police raid on his cooking houses that were always based next to freeways so he could get away fast. Supposedly a photo is supposed to exist that Barry Seal (the pilot shot by the CIA not Colombians as the 'official' story goes) had a secret photo of both Jeb and George W Bush collecting their own stash of coke at Mena, as well as the famous photo of Pablo Escobar helping load the coke onto the plane that started Ronald Reagan's 'war on drugs'. All as he secretly gave Iran arms to pass to Hezbollah who had US hostages in Lebanon.

It is most likely the reason Clinton was given the President's position due to Mena airport being in his state. When they investigated Barry's body they found a phone number and it was the personal phone no of the Vice President and ex head of the CIA, conspirator of the assassination of JFK whose Dad, Prescott Bush, wanted the USA to join Germany and become a Nazi nation during WWII - George H Bush.

Oh and the journalist who broke the story in his series the Dark Alliance series was found dead, apparently by suicide with 2 gun shots in his head.

A lot of people connected with the Clinton's have been found murdered or dead in very strange ways since they came on the scene and it seems to continue with the killing of Seth Rich who was in contact with WikiLeaks and used a USB stick to quickly transfer data from DNC computers. It just isn't possible for a remote hacker say Russians to transfer that much data over the web at that transfer speed. It had to be an "inside job" so to speak, and he paid for it very quickly.

So that's what I am about - come and join me, and if you can donate or visit advertisers then you will really help me out.



By Dark Politricks

© 2018 Darkpolitricks

Thursday, 22 February 2018

If you have to investigate Trump then you must investigate Hillary Clinton

If you investigate Trump over collusion with a foreign government you have to with Hillary Clinton

By Dark Politricks 
Secular Talk

This video is worth watching if you are still getting mad about #Russiagate, thinking Russia was hacking into machines and trying to fix the US election.

Don't worry it was a millionaire who owned a BOT farm, which placed adverts for cat lovers, black lives matter, anti-Trump and anti-Clinton adverts just to gain click-bait from them and therefore money. You can read more about that here.

Trump may have got information from the Russians but Clinton got her foreign information from Ukraine through a middle man - ex UK spy - who got it from ...... Russia.

So if there is going to be an investigation on Trump and Russia, then there should be one on Hillary and her own dossier, her failure to hand over private "hacked" servers to the FBI, and their excuse for losing to Trump on Russia and a push for WWIII .
,WWIII
This is all over a #NothingBurger and #RussiaGate, something even MSM news watchers are getting tired of.

I will let Kyle tell the story for you and watch the CNN host get stunned by calls from his viewers about his constant going on about Russia just so the Democrats don't have to analyse their last election and where they went wrong.

They went wrong by not including progressive ideas and just attacking Trump. The leaked DNC emails showed they were corrupt for giving Hilary front row, smearing Bernie, and keeping all the money for her to spend on the election.

How did that work without Bernies policies and more of free Medicare, free University, less war, more jobs and a crack down on Wall St. The party lost millions of supporters as well as politicians and it will be hard to get them back if all they talk about is Russia.

All this could have been paid for by the trillion dollars of debt that Trump has already added to the national debt with help from the Democrats when they all voted for him to have his $800 billion for the military and his "wall" with Mexico.

A few closures of foreign military bases as well which are well overdue such as in the UK, Germany and other spots not geo-politically placed to surround Russia or China.

Watch and learn.



So even CNN hosts are shocked when their callers ring in and complaining that they don't care about his spiel on #Russiagate. He does it just to keep his company owners and advertisers happy, and of course blame President Trump on Russia and being Putins puppet, NOT the fact that the Democrats put the most hated politician in the country up against him.

The Democrats need some real policies.

In fact the "dove" party is driving the country towards a war with Russia and all over stupid Russian Facebook adverts and a few meetings that were bugged illegally through FISA court warrants obtained by using leaked info to Yahoo to back them up.

All so the NSA could bug and listen to Trump and everyone 2 hops away from him, his family and friends and their family and friends. I wrote about this two hops NSA FISA scam the other day.

So it's a video worth watching seeing that the "left" (who are now right wing) are pushing for war, and calling for Trump to "defend the country". There were even people on Chis Hayes show who claimed it was just as bad as Pearl Harbour and 9.11, that is apart from no-one died and we got a numpty for President instead of a career politician who wants war with Russia.

Madness!

 
By Dark Politricks
 
© 2018 Dark Politricks

Wednesday, 12 April 2017

CIA's Vault 7 Hacking Squad

CIA's Vault 7 Hacking Squad


By Dark Politricks

Vault 7: WikiLeaks reveals CIA's own internal hacking squad

I cannot remember when it was I wrote the article but you can check out some of the ways the authorities are listening to you on this older article I wrote some time ago.

I even warned about WebCams on TVs and phones listening and filming you.

In fact I have warned about that for a long time now. When TRAPWIRE is recording you from every CCTV, NSA is listening in on every phone call and text you send, the CIA is now watching you jerk off to Judge Judy through your TV.

It may sound ridiculous but can you imagine a room full of men, yes even very professional men, who when they get a nice shot of hot babe doing something in front of her TV, do you honestly believe they are not going to get their colleagues to come and have a gander and all have a good laugh?

It is just office mentality full of fools with dangerous tools.

I have a list of things you can try to do to mitigate the issue of living in a global Police State where once again it seems England and GCHQ, got on their knees in front of the CIA, and gobbled up all the work not covered by laws that protect UK citizens - are there even any left?

The article comes from WikiLeaks site if you want to read it there.

 WikiLeaks.org

A few days ago WikiLeaks began its new series of leaks on the U.S. Central Intelligence Agency. Code-named "Vault 7" by WikiLeaks, it is the largest ever publication of confidential documents on the agency.

The first full part of the series, "Year Zero", comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA's Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election.

Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized "zero day" exploits, malware remote control systems and associated documentation.

This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

"Year Zero" introduces the scope and direction of the CIA's global covert hacking program, its malware arsenal and dozens of "zero day" weaponized exploits against a wide range of U.S. and European company products, include Apple's iPhone, Google's Android and Microsoft's Windows and even Samsung TVs, which are turned into covert microphones.

Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA). The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force — its own substantial fleet of hackers. The agency's hacking division freed it from having to disclose its often controversial operations to the NSA (its primary bureaucratic rival) in order to draw on the NSA's hacking capacities.

By the end of 2016, the CIA's hacking division, which formally falls under the agency's Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other "weaponised" malware. Such is the scale of the CIA's undertaking that by 2016, its hackers had utilized more code than that used to run Facebook. The CIA had created, in effect, its "own NSA" with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.

In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA's hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.

Once a single cyber 'weapon' is 'loose' it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.

Julian Assange, WikiLeaks editor stated that "There is an extreme proliferation risk in the development of cyber 'weapons'. Comparisons can be drawn between the uncontrolled proliferation of such 'weapons', which results from the inability to contain them combined with their high market value, and the global arms trade. But the significance of "Year Zero" goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective."

Wikileaks has carefully reviewed the "Year Zero" disclosure and published substantive CIA documentation while avoiding the distribution of 'armed' cyberweapons until a consensus emerges on the technical and political nature of the CIA's program and how such 'weapons' should analyzed, disarmed and published.

Wikileaks has also decided to redact and anonymise some identifying information in "Year Zero" for in depth analysis. These redactions include ten of thousands of CIA targets and attack machines throughout Latin America, Europe and the United States. While we are aware of the imperfect results of any approach chosen, we remain committed to our publishing model and note that the quantity of published pages in "Vault 7" part one (“Year Zero”) already eclipses the total number of pages published over the first three years of the Edward Snowden NSA leaks.

Analysis

CIA malware targets iPhone, Android, smart TVs.

CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA's DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details).

The EDG is responsible for the development, testing and operational support of all backdoors, exploits, malicious payloads, trojans, viruses and any other kind of malware used by the CIA in its covert operations world-wide.

The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell's 1984, but "Weeping Angel", developed by the CIA's Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.

The attack against Samsung smart TVs was developed in cooperation with the United Kingdom's MI5/BTSS. After infestation, Weeping Angel places the target TV in a 'Fake-Off' mode, so that the owner falsely believes the TV is off when it is on. In 'Fake-Off' mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.

As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.

The CIA's Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones. Infected phones can be instructed to send the CIA the user's geolocation, audio and text communications as well as covertly activate the phone's camera and microphone.

Despite iPhone's minority share (14.5%) of the global smart phone market in 2016, a specialized unit in the CIA's Mobile Development Branch produces malware to infest, control and exfiltrate data from iPhones and other Apple products running iOS, such as iPads. CIA's arsenal includes numerous local and remote "zero days" developed by CIA or obtained from GCHQ, NSA, FBI or purchased from cyber arms contractors such as Baitshop. The disproportionate focus on iOS may be explained by the popularity of the iPhone among social, political, diplomatic and business elites.

A similar unit targets Google's Android which is used to run the majority of the world's smart phones (~85%) including Samsung, HTC and Sony. 1.15 billion Android powered phones were sold last year. "Year Zero" shows that as of 2016 the CIA had 24 "weaponized" Android "zero days" which it has developed itself and obtained from GCHQ, NSA and cyber arms contractors.

These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the "smart" phones that they run on and collecting audio and message traffic before encryption is applied.

CIA malware targets Windows, OSx, Linux, routers

The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized "zero days", air gap jumping viruses such as "Hammer Drill" which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( "Brutal Kangaroo") and to keep its malware infestations going.

Many of these infection efforts are pulled together by the CIA's Automated Implant Branch (AIB), which has developed several attack systems for automated infestation and control of CIA malware, such as "Assassin" and "Medusa".

Attacks against Internet infrastructure and webservers are developed by the CIA's Network Devices Branch (NDB).

The CIA has developed automated multi-platform malware attack and control systems covering Windows, Mac OS X, Solaris, Linux and more, such as EDB's "HIVE" and the related "Cutthroat" and "Swindle" tools, which are described in the examples section below.

CIA 'hoarded' vulnerabilities ("zero days")

In the wake of Edward Snowden's leaks about the NSA, the U.S. technology industry secured a commitment from the Obama administration that the executive would disclose on an ongoing basis — rather than hoard — serious vulnerabilities, exploits, bugs or "zero days" to Apple, Google, Microsoft, and other US-based manufacturers.

Serious vulnerabilities not disclosed to the manufacturers places huge swathes of the population and critical infrastructure at risk to foreign intelligence or cyber criminals who independently discover or hear rumors of the vulnerability. If the CIA can discover such vulnerabilities so can others.

The U.S. government's commitment to the Vulnerabilities Equities Process came after significant lobbying by US technology companies, who risk losing their share of the global market over real and perceived hidden vulnerabilities. The government stated that it would disclose all pervasive vulnerabilities discovered after 2010 on an ongoing basis.

"Year Zero" documents show that the CIA breached the Obama administration's commitments. Many of the vulnerabilities used in the CIA's cyber arsenal are pervasive and some may already have been found by rival intelligence agencies or cyber criminals.

As an example, specific CIA malware revealed in "Year Zero" is able to penetrate, infest and control both the Android phone and iPhone software that runs or has run presidential Twitter accounts. The CIA attacks this software by using undisclosed security vulnerabilities ("zero days") possessed by the CIA but if the CIA can hack these phones then so can everyone else who has obtained or discovered the vulnerability. As long as the CIA keeps these vulnerabilities concealed from Apple and Google (who make the phones) they will not be fixed, and the phones will remain hackable.

The same vulnerabilities exist for the population at large, including the U.S. Cabinet, Congress, top CEOs, system administrators, security officers and engineers. By hiding these security flaws from manufacturers like Apple and Google the CIA ensures that it can hack everyone &mdsh; at the expense of leaving everyone hackable.

'Cyberwar' programs are a serious proliferation risk

Cyber 'weapons' are not possible to keep under effective control.

While nuclear proliferation has been restrained by the enormous costs and visible infrastructure involved in assembling enough fissile material to produce a critical nuclear mass, cyber 'weapons', once developed, are very hard to retain.

Cyber 'weapons' are in fact just computer programs which can be pirated like any other. Since they are entirely comprised of information they can be copied quickly with no marginal cost.

Securing such 'weapons' is particularly difficult since the same people who develop and use them have the skills to exfiltrate copies without leaving traces — sometimes by using the very same 'weapons' against the organizations that contain them. There are substantial price incentives for government hackers and consultants to obtain copies since there is a global "vulnerability market" that will pay hundreds of thousands to millions of dollars for copies of such 'weapons'.

Similarly, contractors and companies who obtain such 'weapons' sometimes use them for their own purposes, obtaining advantage over their competitors in selling 'hacking' services.

Over the last three years the United States intelligence sector, which consists of government agencies such as the CIA and NSA and their contractors, such as Booz Allan Hamilton, has been subject to unprecedented series of data exfiltrations by its own workers.

A number of intelligence community members not yet publicly named have been arrested or subject to federal criminal investigations in separate incidents.

Most visibly, on February 8, 2017 a U.S. federal grand jury indicted Harold T. Martin III with 20 counts of mishandling classified information. The Department of Justice alleged that it seized some 50,000 gigabytes of information from Harold T. Martin III that he had obtained from classified programs at NSA and CIA, including the source code for numerous hacking tools.

Once a single cyber 'weapon' is 'loose' it can spread around the world in seconds, to be used by peer states, cyber mafia and teenage hackers alike.

U.S. Consulate in Frankfurt is a covert CIA hacker base

In addition to its operations in Langley, Virginia the CIA also uses the U.S. consulate in Frankfurt as a covert base for its hackers covering Europe, the Middle East and Africa.

CIA hackers operating out of the Frankfurt consulate ( "Center for Cyber Intelligence Europe" or CCIE) are given diplomatic ("black") passports and State Department cover. The instructions for incoming CIA hackers make Germany's counter-intelligence efforts appear inconsequential: "Breeze through German Customs because you have your cover-for-action story down pat, and all they did was stamp your passport"

Your Cover Story (for this trip) Q: Why are you here? A: Supporting technical consultations at the Consulate.

Two earlier WikiLeaks publications give further detail on CIA approaches to customs and secondary screening procedures.

Once in Frankfurt CIA hackers can travel without further border checks to the 25 European countries that are part of the Shengen open border area — including France, Italy and Switzerland.

A number of the CIA's electronic attack methods are designed for physical proximity. These attack methods are able to penetrate high security networks that are disconnected from the internet, such as police record database. In these cases, a CIA officer, agent or allied intelligence officer acting under instructions, physically infiltrates the targeted workplace. The attacker is provided with a USB containing malware developed for the CIA for this purpose, which is inserted into the targeted computer. The attacker then infects and exfiltrates data to removable media. For example, the CIA attack system Fine Dining, provides 24 decoy applications for CIA spies to use.

To witnesses, the spy appears to be running a program showing videos (e.g VLC), presenting slides (Prezi), playing a computer game (Breakout2, 2048) or even running a fake virus scanner (Kaspersky, McAfee, Sophos). But while the decoy application is on the screen, the underlaying system is automatically infected and ransacked.

How the CIA dramatically increased proliferation risks

In what is surely one of the most astounding intelligence own goals in living memory, the CIA structured its classification regime such that for the most market valuable part of "Vault 7" the CIA's weaponized malware (implants + zero days), Listening Posts (LP), and Command and Control (C2) systems — the agency has little legal recourse.

The CIA made these systems unclassified.

Why the CIA chose to make its cyberarsenal unclassified reveals how concepts developed for military use do not easily crossover to the 'battlefield' of cyber 'war'.

To attack its targets, the CIA usually requires that its implants communicate with their control programs over the internet. If CIA implants, Command & Control and Listening Post software were classified, then CIA officers could be prosecuted or dismissed for violating rules that prohibit placing classified information onto the Internet. Consequently the CIA has secretly made most of its cyber spying/war code unclassified. The U.S. government is not able to assert copyright either, due to restrictions in the U.S. Constitution. This means that cyber 'arms' manufactures and computer hackers can freely "pirate" these 'weapons' if they are obtained. The CIA has primarily had to rely on obfuscation to protect its malware secrets.

Conventional weapons such as missiles may be fired at the enemy (i.e into an unsecured area). Proximity to or impact with the target detonates the ordnance including its classified parts. Hence military personnel do not violate classification rules by firing ordnance with classified parts. Ordnance will likely explode. If it does not, that is not the operator's intent.

Over the last decade U.S. hacking operations have been increasingly dressed up in military jargon to tap into Department of Defense funding streams. For instance, attempted "malware injections" (commercial jargon) or "implant drops" (NSA jargon) are being called "fires" as if a weapon was being fired. However the analogy is questionable.

Unlike bullets, bombs or missiles, most CIA malware is designed to live for days or even years after it has reached its 'target'. CIA malware does not "explode on impact" but rather permanently infests its target. In order to infect target's device, copies of the malware must be placed on the target's devices, giving physical possession of the malware to the target. To exfiltrate data back to the CIA or to await further instructions the malware must communicate with CIA Command & Control (C2) systems placed on internet connected servers. But such servers are typically not approved to hold classified information, so CIA command and control systems are also made unclassified.

A successful 'attack' on a target's computer system is more like a series of complex stock maneuvers in a hostile take-over bid or the careful planting of rumors in order to gain control over an organization's leadership rather than the firing of a weapons system. If there is a military analogy to be made, the infestation of a target is perhaps akin to the execution of a whole series of military maneuvers against the target's territory including observation, infiltration, occupation and exploitation.

Evading forensics and anti-virus

A series of standards lay out CIA malware infestation patterns which are likely to assist forensic crime scene investigators as well as Apple, Microsoft, Google, Samsung, Nokia, Blackberry, Siemens and anti-virus companies attribute and defend against attacks.

"Tradecraft DO's and DON'Ts" contains CIA rules on how its malware should be written to avoid fingerprints implicating the "CIA, US government, or its witting partner companies" in "forensic review". Similar secret standards cover the use of encryption to hide CIA hacker and malware communication (pdf), describing targets & exfiltrated data (pdf) as well as executing payloads (pdf) and persisting (pdf) in the target's machines over time. CIA hackers developed successful attacks against most well known anti-virus programs. These are documented in AV defeats, Personal Security Products, Detecting and defeating PSPs and PSP/Debugger/RE Avoidance. For example, Comodo was defeated by CIA malware placing itself in the Window's "Recycle Bin". While Comodo 6.x has a "Gaping Hole of DOOM".

CIA hackers discussed what the NSA's "Equation Group" hackers did wrong and how the CIA's malware makers could avoid similar exposure.

Examples

The CIA's Engineering Development Group (EDG) management system contains around 500 different projects (only some of which are documented by "Year Zero") each with their own sub-projects, malware and hacker tools.

The majority of these projects relate to tools that are used for penetration, infestation ("implanting"), control, and exfiltration.

Another branch of development focuses on the development and operation of Listening Posts (LP) and Command and Control (C2) systems used to communicate with and control CIA implants; special projects are used to target specific hardware from routers to smart TVs.

Some example projects are described below, but see the table of contents for the full list of projects described by WikiLeaks' "Year Zero".

UMBRAGE

The CIA's hand crafted hacking techniques pose a problem for the agency. Each technique it has created forms a "fingerprint" that can be used by forensic investigators to attribute multiple different attacks to the same entity.

This is analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible. As soon one murder in the set is solved then the other murders also find likely attribution.

The CIA's Remote Devices Branch's UMBRAGE group collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation.

With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the "fingerprints" of the groups that the attack techniques were stolen from.

UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.

Fine Dining

Fine Dining comes with a standardized questionnaire i.e menu that CIA case officers fill out. The questionnaire is used by the agency's OSB (Operational Support Branch) to transform the requests of case officers into technical requirements for hacking attacks (typically "exfiltrating" information from computer systems) for specific operations. The questionnaire allows the OSB to identify how to adapt existing tools for the operation, and communicate this to CIA malware configuration staff. The OSB functions as the interface between CIA operational staff and the relevant technical support staff.

Among the list of possible targets of the collection are 'Asset', 'Liason Asset', 'System Administrator', 'Foreign Information Operations', 'Foreign Intelligence Agencies' and 'Foreign Government Entities'. Notably absent is any reference to extremists or transnational criminals. The 'Case Officer' is also asked to specify the environment of the target like the type of computer, operating system used, Internet connectivity and installed anti-virus utilities (PSPs) as well as a list of file types to be exfiltrated like Office documents, audio, video, images or custom file types. The 'menu' also asks for information if recurring access to the target is possible and how long unobserved access to the computer can be maintained. This information is used by the CIA's 'JQJIMPROVISE' software (see below) to configure a set of CIA malware suited to the specific needs of an operation.

Improvise (JQJIMPROVISE)

'Improvise' is a toolset for configuration, post-processing, payload setup and execution vector selection for survey/exfiltration tools supporting all major operating systems like Windows (Bartender), MacOS (JukeBox) and Linux (DanceFloor). Its configuration utilities like Margarita allows the NOC (Network Operation Center) to customize tools based on requirements from 'Fine Dining' questionnaires.

HIVE

HIVE is a multi-platform CIA malware suite and its associated control software.

The project provides customizable implants for Windows, Solaris, MikroTik (used in internet routers) and Linux platforms and a Listening Post (LP)/Command and Control (C2) infrastructure to communicate with these implants.

The implants are configured to communicate via HTTPS with the webserver of a cover domain; each operation utilizing these implants has a separate cover domain and the infrastructure can handle any number of cover domains.

Each cover domain resolves to an IP address that is located at a commercial VPS (Virtual Private Server) provider. The public-facing server forwards all incoming traffic via a VPN to a 'Blot' server that handles actual connection requests from clients. It is setup for optional SSL client authentication: if a client sends a valid client certificate (only implants can do that), the connection is forwarded to the 'Honeycomb' toolserver that communicates with the implant; if a valid certificate is missing (which is the case if someone tries to open the cover domain website by accident), the traffic is forwarded to a cover server that delivers an unsuspicious looking website.

The Honeycomb toolserver receives exfiltrated information from the implant; an operator can also task the implant to execute jobs on the target computer, so the toolserver acts as a C2 (command and control) server for the implant.

Similar functionality (though limited to Windows) is provided by the RickBobby project.

See the classified user and developer guides for HIVE.

Frequently Asked Questions

Why now? WikiLeaks published as soon as its verification and analysis were ready.

In Febuary the Trump administration has issued an Executive Order calling for a "Cyberwar" review to be prepared within 30 days.

While the review increases the timeliness and relevance of the publication it did not play a role in setting the publication date.

Redactions Names, email addresses and external IP addresses have been redacted in the released pages (70,875 redactions in total) until further analysis is complete.

Over-redaction: Some items may have been redacted that are not employees, contractors, targets or otherwise related to the agency, but are, for example, authors of documentation for otherwise public projects that are used by the agency.

Identity vs. person: the redacted names are replaced by user IDs (numbers) to allow readers to assign multiple pages to a single author. Given the redaction process used a single person may be represented by more than one assigned identifier but no identifier refers to more than one real person.

Archive attachments (zip, tar.gz, ...) are replaced with a PDF listing all the file names in the archive. As the archive content is assessed it may be made available; until then the archive is redacted.

Attachments with other binary content are replaced by a hex dump of the content to prevent accidental invocation of binaries that may have been infected with weaponized CIA malware. As the content is assessed it may be made available; until then the content is redacted. The tens of thousands of routable IP addresses references (including more than 22 thousand within the United States) that correspond to possible targets, CIA covert listening post servers, intermediary and test systems, are redacted for further exclusive investigation. Binary files of non-public origin are only available as dumps to prevent accidental invocation of CIA malware infected binaries.

Organizational Chart

The organizational chart corresponds to the material published by WikiLeaks so far.

Since the organizational structure of the CIA below the level of Directorates is not public, the placement of the EDG and its branches within the org chart of the agency is reconstructed from information contained in the documents released so far. It is intended to be used as a rough outline of the internal organization; please be aware that the reconstructed org chart is incomplete and that internal reorganizations occur frequently.

Wiki pages

"Year Zero" contains 7818 web pages with 943 attachments from the internal development groupware. The software used for this purpose is called Confluence, a proprietary software from Atlassian. Webpages in this system (like in Wikipedia) have a version history that can provide interesting insights on how a document evolved over time; the 7818 documents include these page histories for 1136 latest versions. The order of named pages within each level is determined by date (oldest first). Page content is not present if it was originally dynamically created by the Confluence software (as indicated on the re-constructed page).

What time period is covered?#

The years 2013 to 2016. The sort order of the pages within each level is determined by date (oldest first).

WikiLeaks has obtained the CIA's creation/last modification date for each page but these do not yet appear for technical reasons. Usually the date can be discerned or approximated from the content and the page order. If it is critical to know the exact time/date contact WikiLeaks.

What is "Vault 7"

"Vault 7" is a substantial collection of material about CIA activities obtained by WikiLeaks.

When was each part of "Vault 7" obtained?

Part one was obtained recently and covers through 2016. Details on the other parts will be available at the time of publication.

Is each part of "Vault 7" from a different source?

Details on the other parts will be available at the time of publication.

What is the total size of "Vault 7"?

The series is the largest intelligence publication in history.

How did WikiLeaks obtain each part of "Vault 7"?

Sources trust WikiLeaks to not reveal information that might help identify them.

Isn't WikiLeaks worried that the CIA will act against its staff to stop the series?

No. That would be certainly counter-productive.

Has WikiLeaks already 'mined' all the best stories?

No. WikiLeaks has intentionally not written up hundreds of impactful stories to encourage others to find them and so create expertise in the area for subsequent parts in the series. They're there. Look. Those who demonstrate journalistic excellence may be considered for early access to future parts.

Won't other journalists find all the best stories before me?

Unlikely. There are very considerably more stories than there are journalists or academics who are in a position to write them.

Read the full article and support WikiLeaks here WikiLeaks.org.

How to Protect Yourself

The ways to protect yourself from unwanted spying and trojans in your phone and PC are getting smaller and smaller. Even phone apps for virus checkers are actually spyware pretending to be virus checkers.

I have a list of many of the ways you can be spied upon by hackers or the CIA on this page but you can be in no doubt their technological skills are far greater than ours.

I think the only way is to go backwards to use tools that cannot be hacked.


  • Buy a TV without a webcam or even not a smart TV then buy a Roku to make it smart with catch up channels and Netflix.
  • Train pigeons like Pablo Escobar did in his prison to send messages to other people or actually talk face to face on a bench in a park with no phones on you.
  • You could put masking tape over your web cam when you are not using it and reattach when you want to Skype someone.
  • You could get an old Nokia and take the whole battery and even SIM out so that no GPS tracking can be done and with the battery removed they cannot even triangulate your whereabouts.
  • If you are going somewhere where you don't want anyone to know can you take your battery and SIM card out, if you can, and most smart phones make it very hard to, then do so.
  • Buy a 2nd "dumb phone" meant for OAP's, the battery is easily removable and they don't come with all the Logging Apps, Fake Games and GPS tracking jazz of smart phone. I would guess at least 20% of the games on Facebook that people constantly annoy you with are actually viruses or secret open door apps that send traffic using your own credit to wherever it needed to go.
  • Leave your phone at home if you don't need it.
  • Your TV is turned off and you are about to make love to your girl on the sofa. What you don't know is the TV is in "Fake Off" mode, where the geeks at GCHQ who have trouble meeting women as they were hired for their autistic skills, re-attach the tape and detach any external speakers. Try and stop a crowd getting a PornoTube video at work.
  • Don't use Wickr, WhatsApp or Telegram, who tell you they are encrypted end to end to talk important info. The CIA will have an unencrypted version of the message before you sent it.

Learn to live without technology. Get into the mindset of someone in the 90's where we all knew everyone's phone number in our heads and it was only 10p to use a phone box - not that I see many boxes anymore. No-one carried phones and spend all day and night on them. The worse you could expect was some crackling and beeps on a hacked into house phone.

People we are entering a global world where rich banksters and corrupt politicians bend over to the international corporations and allow them to do what they want. Be careful.

Read the original article at darkpolitricks.com and please help us out by visiting our advertisers.

By Dark Politricks 


© 2017 Dark Politricks

Tuesday, 28 January 2014

The Syrian Electronic Army - A Russian Payback for the NSA and PRISM?

The Syrian Electronic Army - A Russian Payback for the NSA and PRISM?

By Dark Politricks

After recent attacks by the Syrian Electronic Army on big western media and personal targets I think something else is going on than just a renegade bunch of pro-Assad hackers getting lucky by hacking certain websites.

In recent weeks the Syrian Electronic Army has attacked big targets such as Microsoft, Skype,  CNN, the BBC and even Barack Obama's Twitter and Facebook accounts.
It seems to me that someone is sending the west a message.

A message that is meant to mean a lot more than just signalling that they are just a group of good Syrian hackers.

I think the message is meant to say a lot more than: "look I can hack your twitter account", and from a recent talk given by the Israeli PM on the need for Internet security, I think the west are getting a little jittery about their technological supremacy when it comes to obtaining personal information for their own ends.

The recent hack attack on the President of the USA's social media accounts seem to me to be a warning  from a certain country that "you may have the NSA / GCHQ and back doors into all US social media accounts BUT we do as well".

The message from the Syrian Electronic Army when they hacked the account was to remind people being mis-informed by their media and politicians that the Syrian rebels were NOT the moral equivalent of the US "founding fathers" as some idiots were claiming but in fact they were al-Qaeda linked terrorists committing horrible atrocities.

The Syrian Electronic Army reminded the west through the Presidents hacked accounts that the US backed al-Qaeda linked rebels in Syria are committing terrorist attacks that would be condemned if they occurred in any other country than Syria.

From the article:

President Obama’s official Twitter and Facebook accounts – which have a combined audience of 76 million followers – were hacked by the Syrian Electronic Army and used to promote a link to a video which highlights how US-backed rebels are committing terror attacks in Syria.
The account was compromised less than a day after Obama's presidential campaign website was also hacked by the SEA.


As a techie I work with computers every day. I see our own servers being constantly probed with attempts to hack and control them through XSS, SQL Injection and other methods. I even created my own software defence system for a certain big website I had created that our company sells a lot.

After all these years one thing is perfectly clear from analysing the hacks, the majority of them come from Russian servers.

All techies know the Russian Mafia has control of numerous botnets to use for DDOS attacks and other forms of hacking.

The official definition of a BotNet is:

A network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g. to send spam.
Many techie magazines have spoken of the recent sophisticated TARGET hack which compromised up to 70 million consumers credit card details and shown how the code that was used could be linked back to older Russian malware.

This TARGET hack attack was so sophisticated no existing anti-virus software could detect it and it has been used in up to 6 other attacks in recent months since the Black Friday shopping weekend in America.

From BGR.

Target on Friday further revealed the scope of the hacking attack it suffered during the busy 2012 Black Friday and Christmas shopping season, saying that additional personal data has been stolen by hackers, on top of credit/debit card information and encrypted pins. The company said that the stolen info includes names, mailing addresses and phone numbers or email address from as many as 70 million Target customers. The number is significantly higher than the previous estimate, which suggested that up to 40 million credit and debit card numbers were stolen.

The investigators have also revealed that any known antivirus software couldn’t detect the malware used, with hackers having also added in features that covered the fact that they were actually copying data from the credit and debit cards swiped in point-of-sale (POS) machines. Interestingly, the malware was programmed to steal data during prime business hours (i.e from 10:00 a.m. to 5:00 p.m. local time) and store it on an internal Target server that was also controlled by the hackers.

“What’s really unique about this one is it’s the first time we’ve seen the attack method at this scale,” iSight Partners senior vice president Tiffany Jones said. “It conceals all the data transfers. It makes it really hard to detect in the first place.”


So not only do we have Russian linked undetectable hacks going on inside the USA that are stealing money direct from people's credit cards, but we have on the scene a new group of Syrian hackers who seem to be capable of hacking into nearly every major social media website account - just as the NSA can do with their PRISM software.

Whether these hacks are happening through social engineering methods e.g sending a link in an email to trick people to enter their bank or website account details or through the use of comprimised networks, keyloggers, Trojans and other forms of viruses I don't know, but they seem to be succeeding whenever they try.

We all know that Russia is Syria's ally.

Therefore is it too much of a stretch to believe that the Syrian Electronic Army has Russian help or is even formed by Russian military skilled in the art of electronic warfare?

It is only a guess but all these hack attacks on the west come just after Edward Snowden has revealed the scale of the Wests own ability to obtain personal data from the Internet.

Not only that but he has proven that all the major social networks from Twitter to Facebook can be accessed at will by the NSA/GCHQ to obtain users information.

Therefore I am wondering, is this Russia sending back a message that they are perfectly capable of using their own methods to obtain important data or crash / hack websites?

Whether Snowden has anything to do with this or not I have no idea but I think the probability is pretty low. As Glenn Greenwald said if he were a Russian spy they wouldn't have kept him waiting in an airport lounge for months and instead would have lauded him as a hero before rushing him to safety to debrief him of all his secrets ASAP.

The Russians may not host the major backbone servers that the Internet is based upon.

They may not even host any of the major social media sites like Twitter or Facebook that have 500 million users and therefore make it much easier to access the databases of such sites.

However they do have years of hacking experience and probable control of millions of personal PC's that could be used without the owner's knowledge in a coordinated hack attack.

You may even be sitting on an infected computer right now.

One of the first things many sophisticated viruses do is block ports and install their own firewall and virus checking software so that another virus cannot remove them from the infected machine. Therefore you may think your computer is safe from your regular scans but in reality it could be compromised and sending occasional packets of data in DDOS attacks controlled by Russian software.

As I said, this is all conjecture, but the timing of attacks and the targets (western news broadcasters and western shoppers) make it seem like this sort of message is being sent.

The Russian Mafia, who were mainly ex KGB agents when the USSR split up, were the first criminal gangs to start to use hacking and viruses to steal identities, bank accounts and other forms of financial fraud.

Whilst script kiddies in the west were just happy to see their Macro viruses spread the net wiping files from computers before being emailed on to more computers using the infected PC's email contact list - the Russians were out to make big bucks from their hacking.

Therefore it would come as no surprise to me if I was to learn that the Syrian Electronic Army is full of Russian cyber attack specialists and that the hack attacks against the west will continue to rise with ever more sophisticated hacks on the same lines as the TARGET hack.

I may be wrong but it's something to think about.....  

View the original article Are the Russians telling the West that they can hack just as well as the NSA can too? at darkpolitricks.com.