Getbig.com: American Bodybuilding, Fitness and Figure
Getbig Main Boards => Politics and Political Issues Board => Topic started by: Yamcha on March 07, 2017, 06:21:51 AM
-
Will post interesting findings below.
Here is the breakdown of the release:
-CIA malware targets iPhone, Android, smart TVs
-CIA malware targets Windows, OSx, Linux, routers
-CIA 'hoarded' vulnerabilities ("zero days")
-'Cyberwar' programs are a serious proliferation risk
-U.S. Consulate in Frankfurt is a covert CIA hacker base
-How the CIA dramatically increased proliferation risks
-Evading forensics and anti-virus
-
CIA can "hack" Samsung Smart TV's
The attack against Samsung smart TVs was developed in cooperation with the United Kingdom's MI5/BTSS. After infestation, Weeping Angel places the target TV in a 'Fake-Off' mode, so that the owner falsely believes the TV is off when it is on. In 'Fake-Off' mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server
-
Will post interesting findings below.
Here is the breakdown of the release:
-CIA malware targets iPhone, Android, smart TVs
-CIA malware targets Windows, OSx, Linux, routers
-CIA 'hoarded' vulnerabilities ("zero days")
-'Cyberwar' programs are a serious proliferation risk
-U.S. Consulate in Frankfurt is a covert CIA hacker base
-How the CIA dramatically increased proliferation risks
-Evading forensics and anti-virus
:o :o :o
-
:-\
-
:o
-
:o
I read about the CIA's ability to control cars years ago.
I wouldn't be surprised if they were behind the killing of journalist Michael Hastings. Yes, I know it's a conspiracy theory. 8)
https://news.vice.com/article/primary-sources-emails-show-fbi-worked-to-debunk-conspiracy-theories-following-michael-hastings-death (https://news.vice.com/article/primary-sources-emails-show-fbi-worked-to-debunk-conspiracy-theories-following-michael-hastings-death)
-
...
The files are the most comprehensive release of US spying files ever made public, according to Julian Assange. In all, there are 8,761 documents that account for "the entire hacking capacity of the CIA", Mr Assange claimed in a release, and the trove is just the first of a series of "Vault 7" leaks.
Already, the files include far more pages than the Snowden files that exposed the vast hacking power of the NSA and other agencies.
In publishing the documents, WikiLeaks had ensured that the CIA had "lost control of its arsenal", he claimed. That included a range of software and exploits that if real could allow unparalleled control of computers around the world.
It includes software that could allow people to take control of the most popular consumer electronics products used today, claimed WikiLeaks.
"'Year Zero' introduces the scope and direction of the CIA's global covert hacking program, its malware arsenal and dozens of "zero day" weaponized exploits against a wide range of U.S. and European company products, include Apple's iPhone, Google's Android and Microsoft's Windows and even Samsung TVs, which are turned into covert microphones," the organisation said in a release.
The public files don't include the cyber weapons themselves, according to a statement. The organisation will refrain from distributing "armed" software "until a consensus emerges on the technical and political nature of the CIA's program and how such 'weapons' should analyzed, disarmed and published", it said.
The files were made available by a source who intended for them to start a conversation about whether the CIA had gained too much power, according to the organization.
"In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA's hacking capabilities exceed its mandated powers and the problem of public oversight of the agency," a release read. "The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons."
It also redacts the details of some of the names, locations and targets that are identified in the documents.
The organization had teased the release in advance with strange messages about the release being "Year Zero", and references to "Vault 7". It had planned to release the files later on but that plan was thrown off when its press conference came under cyber attack, Mr Assange claimed.
http://www.independent.co.uk/life-style/gadgets-and-tech/news/wikileaks-cia-vault-7-julian-assange-year-zero-documents-download-spying-secrets-a7616031.html (http://www.independent.co.uk/life-style/gadgets-and-tech/news/wikileaks-cia-vault-7-julian-assange-year-zero-documents-download-spying-secrets-a7616031.html)
-
(https://i.imgtc.com/mTD8lVD.jpg)
-
Let me first say I'm just Joe Blow Citizen and don't know much CIA insider info.
BUT, I think it's fair to say Assange and Wicki-leaks have lost credibility in recent months.
The recent Russia hack , email leaks had SOME fabricated , propaganda crap within them.
Granted, some would be legit "private info" but who knows what's legit now?
For example, the infamous MI-6 agent Steele purchased dossier ,
contains many fabricated salacious details on Trump.
Most credible journalists view the Russian whore "golden showers" on Trump, as fiction.
Just because it's something you want to hear, doesn't guarantee it's 100% truth.
Proof of the bolded? Please.
-
AP: WikiLeaks publish 1000s of what they say are CIA documents
https://www.apnews.com/4112d8fe79ec4cae8391359973382ac7/WikiLeaks-publish-1000s-of-what-they-say-are-CIA-documents (https://www.apnews.com/4112d8fe79ec4cae8391359973382ac7/WikiLeaks-publish-1000s-of-what-they-say-are-CIA-documents)
PARIS (AP) — WikiLeaks on Tuesday published thousands of documents purportedly taken from the Central Intelligence Agency's Center for Cyber Intelligence, a dramatic release that appears to provide an eye-opening look at the intimate details of America's cyberespionage toolkit.
The dump could not immediately be authenticated by The Associated Press and the CIA declined comment, but WikiLeaks has a long track record of releasing top secret government documents. Experts who've started to sift through the material said it appeared legitimate (Howard ;) ) — and that the release was almost certain to shake the CIA.
"There's no question that there's a fire drill going on right now," said Jake Williams, a security expert with Augusta, Georgia-based Rendition Infosec. "It wouldn't surprise me that there are people changing careers — and ending careers — as we speak."
If it did prove legitimate, the dump would represent yet another catastrophic breach for the U.S. intelligence community at the hands of WikiLeaks and its allies, which have repeatedly humbled Washington with the mass release of classified material, including hundreds of thousands of documents from the State Department and the Pentagon.
WikiLeaks, which had been dropping cryptic hints about the release for a month, said in a lengthy statement that the CIA had "recently" lost control of a massive arsenal of CIA hacking tools as well as associated documentation. The radical transparency organization said that "the archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner" and that one of them "provided WikiLeaks with portions of the archive."
Jonathan Liu, a spokesman for the CIA, said: "We do not comment on the authenticity or content of purported intelligence documents."
Williams, who has experience dealing with government hackers, said that the voluminous files' extensive references to operation security meant they were almost certainly government-backed.
"I can't fathom anyone fabricated that amount of operational security concern," he said. "It rings true to me."
"The only people who are having that conversation are people who are engaging in nation-state-level hacking," he said.
-
The factual proof on ANY Wiki-Leaks released info from the Russia hack is suspect.
In my observation, that source is suspect and not credible now.
THAT's the core of the differences between Trump supporters and those who question him.
I trust major media outlets MORE then talk radio or Briet-Bart.
Your side is the opposite.
Simple answer with a BIG difference is what sources we trust.
Wikileaks' sources are anonymous though... nobody knows who gave Assange the DNC emails.
I am failing to follow your logic.
EDIT: also, the emails themselves (regardless of whoever the sources are) are legitimate. You won't find anyone arguing that they are false. I've posted that most of the DNC emails are DKIM certified. Look into that.
-
There was no russian hack - Assange said it came from a source within the DNC remember?
-
In a truly remarkable bit of honesty and candor regarding the U.S. national-security establishment, new Senate minority leader Charles Schumer has accused President-elect Trump of “being really dumb.”… for taking on the CIA and questioning its conclusions regarding Russia.
“Let me tell you, you take on the intelligence community, they have six ways from Sunday at getting back at you…. He’s being really dumb to do this.”
Really niggles the neurons.
-
Overview: CIA has more hacking capabilities than the NSA, including hundreds of zero-day exploits to gain access to 99% of devices on the planet without revealing these exploits to manufacturers as the US government has agreed to.
ELI5: Zero day vulnerability refers to a hole in software that is unknown to the vendor. This security hole is then exploited by hackers before the vendor becomes aware and hurries to fix it—this exploit is called a zero day attack.
-
Overview: CIA has more hacking capabilities than the NSA, including hundreds of zero-day exploits to gain access to 99% of devices on the planet without revealing these exploits to manufacturers as the US government has agreed to.
ELI5: Zero day vulnerability refers to a hole in software that is unknown to the vendor. This security hole is then exploited by hackers before the vendor becomes aware and hurries to fix it—this exploit is called a zero day attack.
Libfags just love the govt being able to do this.
-
Let me first say I'm just Joe Blow Citizen and don't know much CIA insider info.
BUT, I think it's fair to say Assange and Wicki-leaks have lost credibility in recent months.
The recent Russia hack , email leaks had SOME fabricated , propaganda crap within them.
Granted, some would be legit "private info" but who knows what's legit now?
For example, the infamous MI-6 agent Steele purchased dossier ,
contains many fabricated salacious details on Trump.
Most credible journalists view the Russian whore "golden showers" on Trump, as fiction.
Just because it's something you want to hear, doesn't guarantee it's 100% truth.
Not sure if Russian hacking center can connect to internet :-X
(https://s28.postimg.org/grval6isd/aa_319.png)
-
The factual proof on ANY Wiki-Leaks released info from the Russia hack is suspect.
In my observation, that source is suspect and not credible now.
THAT's the core of the differences between Trump supporters and those who question him.
I trust major media outlets MORE then talk radio or Briet-Bart.
Your side is the opposite.
Simple answer with a BIG difference is what sources we trust.
Lol! there is no help for you Howard. Really??!! They love people like you that will listen to them no matter how many times they lie or spin a story.
You don't have any proof that whatever Wikileaks released was fake or not. If it was fake though the "Democrats" would not be pressing the Trump / Russian connection. Please post a link where any material posted by Wikileaks has been refuted.
Remember Wasserman Schultz stepped down after Wikileaks exposed her. If it was fake I am sure they would have refuted it and she would not have stepped down.
http://www.politico.com/story/2016/07/wasserman-schultz-wont-preside-over-dnc-convention-226088 (http://www.politico.com/story/2016/07/wasserman-schultz-wont-preside-over-dnc-convention-226088)
-
EDIT: also, the emails themselves (regardless of whoever the sources are) are legitimate. You won't find anyone arguing that they are false. I've posted that most of the DNC emails are DKIM certified. Look into that.
Yes, what is he babbling about? Not one person has denied that they are real and legitimate. That's the hilarious part of this. They cannot deny how corrupt they are. They can only try and deflect that it was a conspiracy. Once again, I could care less how Assange got this info as it exposed who Howard, Grasping, Al hold up as heroes and patriots. Yes, even Trump said that there needs to be better ability to stop these hacks, but the info presented is now there for all to see and it shows them for the losers they are.
Sorry, they are who they are. Deflect, deflect, deflect, but that is who they are and who those guys support. Doesn't say much for them.
-
Let me first say I'm just Joe Blow Citizen and don't know much CIA insider info.
BUT, I think it's fair to say Assange and Wicki-leaks have lost credibility in recent months.
The recent Russia hack , email leaks had SOME fabricated , propaganda crap within them.
Granted, some would be legit "private info" but who knows what's legit now?
For example, the infamous MI-6 agent Steele purchased dossier ,
contains many fabricated salacious details on Trump.
Most credible journalists view the Russian whore "golden showers" on Trump, as fiction.
Just because it's something you want to hear, doesn't guarantee it's 100% truth.
You are so full of it.
-
BUT, I think it's fair to say Assange and Wicki-leaks have lost credibility in recent months.
The recent Russia hack , email leaks had SOME fabricated , propaganda crap within them.
What specifically was fabricated?
-
(https://i.redd.it/cq7hjh50v1ky.png)
This could get interesting if Assange is threatened or assassinated.
-
(https://i.redd.it/51e7h160v1ky.jpg)
This will really throw Howard for a loop.
-
VCL Player is compromised...
https://wikileaks.org/ciav7p1/cms/page_15729131.html (https://wikileaks.org/ciav7p1/cms/page_15729131.html)
-
RELEASE: CIA Vault 7 Year Zero decryption
passphrase: SplinterItIntoAThousandP iecesAndScatterItIntoThe Winds
https://twitter.com/wikileaks/status/839100031256920064 (https://twitter.com/wikileaks/status/839100031256920064)
-
There are dozens hundreds of files discussing a program called Cinnamon, which is malware that targets Cisco's 881 Integrated Services Router.
This router combines internet access, security and wireless services onto one "secure" device.
Another CISCO router with confirmed vulnerabilities is SUP720
-
Lol; CIA claims to have the "dankest of trojans"
(https://pic.al/gBg.jpg)
-
Snowden:
"Still working through the publication, but what @Wikileaks has here is genuinely a big deal. Looks authentic."
"What makes this look real?
Program & office names, such as the JQJ (IOC) crypt series, are real. Only a cleared insider could know them."
"The CIA reports show the USG developing vulnerabilities in US products, then intentionally keeping the holes open. Reckless beyond words."
"If you're writing about the CIA/@Wikileaks story, here's the big deal: first public evidence USG (US Gov) secretly paying to keep US software unsafe."
"Evidence mounts showing CIA & FBI knew about catastrophic weaknesses in the most-used smartphones in America, but kept them open -- to spy."
"Why is this dangerous? Because until closed, any hacker can use the security hole the CIA left open to break into any iPhone in the world."
Christ...
-
Screwing with the CIA...Assange is not long for this world.
-
:o
WikiLeaks has released less than 1% of its #Vault7 series in its part one publication yesterday 'Year Zero'.
https://twitter.com/wikileaks/status/839475557721116672 (https://twitter.com/wikileaks/status/839475557721116672)
-
Germany's chief federal prosecutor has announced examination of U.S. hacking activities at the Frankfurt 'Consulate' and may prosecute.
https://mobile.twitter.com/wikileaks/status/839486272523669504?p=v (https://mobile.twitter.com/wikileaks/status/839486272523669504?p=v)
-
Wikileaks' sources are anonymous though... nobody knows who gave Assange the DNC emails.
I am failing to follow your logic.
EDIT: also, the emails themselves (regardless of whoever the sources are) are legitimate. You won't find anyone arguing that they are false. I've posted that most of the DNC emails are DKIM certified. Look into that.
I trust the major media news sources, you don't.
You think Wiki-leaks and Briet-bart are credible sources and I don't.
Not much else to debate when you arrive at that point.
-
I trust the major media news sources, you don't.
You think Wiki-leaks and Briet-bart are credible sources and I don't.
Not much else to debate when you arrive at that point.
Wiki-Leaks and Brietbart aren't even on the same level.
-
Screwing with the CIA...Assange is not long for this world.
Nonsense. He'd be dead by now but he has a doozy of a deadman's switch in place.
He'll outlive Kamali.
-
Yamcha, I hadn't yet seen this thread when you posted that gif in the other. You're right, it doesn't look good for America right now.
-
Screwing with the CIA...Assange is not long for this world.
If he's not dodging death, though, then it must mean he's either working for them or otherwise serving their purpose.
The media placement for Wikileaks makes me a bit suspicious. But it could all be as it seems, too, I'll admit. Maybe Assange does manage to protect himself that well.
-
If he's not dodging death, though, then it must mean he's either working for them or otherwise serving their purpose.
The media placement for Wikileaks makes me a bit suspicious. But it could all be as it seems, too, I'll admit. Maybe Assange does manage to protect himself that well.
Right?! These aren't little tidbits of info he's dropping...
which leads me to wander:
What information does Assange have to keep himself alive?
-
Right?! These aren't little tidbits of info he's dropping...
which leads me to wander:
What information does Assange have to keep himself alive?
I know, man. This is one thing that you just KNOW there's so much more to it.
-
Federal criminal probe being opened into WikiLeaks' publication of CIA documents
http://archive.is/G76dF#selection-191.0-191.80 (http://archive.is/G76dF#selection-191.0-191.80)
(CNN) — A federal criminal investigation is being opened into WikiLeaks' publication of documents detailing alleged CIA hacking operations, several US officials told CNN Wednesday.
The officials said the FBI and CIA are coordinating reviews of the matter.
The investigation is looking into how the documents came into WikiLeaks' possession and whether they might have been leaked by an employee or contractor. The CIA is also trying to determine if there are other unpublished documents WikiLeaks may have.
The documents published so far are largely genuine, officials said, though they are not yet certain if all of them are and whether some of the documents may have been altered.
One of the biggest concerns for the federal government is if WikiLeaks publishes critical computer code on how operations are conducted, other hackers could take that code and cause havoc overseas.
The officials emphasized any intelligence collection using the types of operations described in the documents is legal intelligence collection against overseas targets. The officials also cautioned some of the material describes programs still under development by the intelligence community.
-
(https://i.reddituploads.com/646914fbe664465cb3b56ee85fa19a29?fit=max&h=1536&w=1536&s=9aeaaf71b60abb8a51a498b253588873)
-
Federal criminal probe being opened into WikiLeaks' publication of CIA documents
http://archive.is/G76dF#selection-191.0-191.80 (http://archive.is/G76dF#selection-191.0-191.80)
(CNN) — A federal criminal investigation is being opened into WikiLeaks' publication of documents detailing alleged CIA hacking operations, several US officials told CNN Wednesday.
The officials said the FBI and CIA are coordinating reviews of the matter.
The investigation is looking into how the documents came into WikiLeaks' possession and whether they might have been leaked by an employee or contractor. The CIA is also trying to determine if there are other unpublished documents WikiLeaks may have.
The documents published so far are largely genuine, officials said, though they are not yet certain if all of them are and whether some of the documents may have been altered.
One of the biggest concerns for the federal government is if WikiLeaks publishes critical computer code on how operations are conducted, other hackers could take that code and cause havoc overseas.
The officials emphasized any intelligence collection using the types of operations described in the documents is legal intelligence collection against overseas targets. The officials also cautioned some of the material describes programs still under development by the intelligence community.
Assuming all's as represented, for the moment at least, then I'd say there's very little chance anything is altered or fake in any way. Because even a little bit of falseness would be enough to allow many to say "see it's ALL fake!!"
-
Right?! These aren't little tidbits of info he's dropping...
which leads me to wander:
What information does Assange have to keep himself alive?
This is a good question.
It could just be that the embassy being his hold up is just well protected. That said, if he ended up dead of something that looked in the least bit "suspicious", it would be a global firestorm.
-
Pretty dumb of Howard (on another thread) to say he felt the email was fake. Not sure he said exactly that, but it was similarly silly.
-
This is a good question.
It could just be that the embassy being his hold up is just well protected. That said, if he ended up dead of something that looked in the least bit "suspicious", it would be a global firestorm.
Yes, and his death could see the release of a high card, too. That might be what's happening. Good point.
-
Assuming all's as represented, for the moment at least, then I'd say there's very little chance anything is altered or fake in any way. Because even a little bit of falseness would be enough to allow many to say "see it's ALL fake!!"
Delicate situation really. No one can prove it's unaltered, but no one can prove it is not.
Basically, it's about what you choose to believe.
-
Delicate situation really. No one can prove it's unaltered, but no one can prove it is not.
Basically, it's about what you choose to believe.
True. But if they're (wiki) doing what they claim to be doing and for the reasons claimed, then it would be monumentally stupid to allow anything false to be released.
-
True. But if they're (wiki) doing what they claim to be doing and for the reasons claimed, then it would be monumentally stupid to allow anything false to be released.
No argument there... If by chance they were found to have lied about even the TINIEST thing, they would be done. No one would ever pay them any attention ever again.
-
No argument there... If by chance they were found to have lied about even the TINIEST thing, they would be done. No one would ever pay them any attention ever again.
Exactly, man. Exactly. But of course it seems that would set them up to be purposely duped with false info, which causes me to wonder how THEY can possibly verify what they have.
-
Exactly, man. Exactly. But of course it seems that would set them up to be purposely duped with false info, which causes me to wonder how THEY can possibly verify what they have.
Also a good question. They really can't I guess.
They are given information, they post information. Whether or not they are given accurate information is impossible to determine. If they get some document, they surely can't go up to people and ask if it's real information.
I would say they just have to take it with faith. That's any spread of information really if you think about it.
-
Let's look back in history knowing know what Vault 7 exposed:
http://archive.is/if7FT (http://archive.is/if7FT)
2014: Russian hackers use ‘zero-day’ to hack NATO, Ukraine in cyber-spy campaign
By Ellen Nakashima October 13, 2014
A Russian hacking group probably working for the government has been exploiting a previously unknown flaw in Microsoft’s Windows operating system to spy on NATO, the Ukrainian government, a U.S. university researcher and other national security targets, according to a new report.
The group has been active since at least 2009, according to research by iSight Partners, a cybersecurity firm. Its targets in the recent campaign also included a Polish energy firm, a Western European government agency and a French telecommunications firm.
“This is consistent with espionage activity,” said iSight Senior Director Stephen Ward. “All indicators from a targeting and lures perspective would indicate espionage with Russian national interests.”
There is no indication that the group was behind a recent spate of intrusions into U.S. banks, including JPMorgan Chase, Ward said.
Current and former U.S. intelligence officials say the capabilities of Russian hackers are on par with those of the United States and Israel.
“It’s possible they’ve become more active in response to the Ukrainian situation,” said a former intelligence official. “And when you become more active, you increase your likelihood of getting caught.”
-
Exactly, man. Exactly. But of course it seems that would set them up to be purposely duped with false info, which causes me to wonder how THEY can possibly verify what they have.
A good, short read of someone who submitted data to Wikileaks, and it was never published due to verification issues.
https://www.craigmurray.org.uk/archives/2017/01/wikileaks-keeps-100-accuracy-record/ (https://www.craigmurray.org.uk/archives/2017/01/wikileaks-keeps-100-accuracy-record/)
-
Lmao, wouldn't you hate to be associated with this guy? Talk about NO rest and NO peacefulness of mind. You'd want bulletproof everything, too. And forget having kids or a family of any sort.
-
A good, short read of someone who submitted data to Wikileaks, and it was never published due to verification issues.
https://www.craigmurray.org.uk/archives/2017/01/wikileaks-keeps-100-accuracy-record/ (https://www.craigmurray.org.uk/archives/2017/01/wikileaks-keeps-100-accuracy-record/)
Interesting information, but his examples are kind of generalized.
I would love to see how they verify things they got from Snowden or whomever else. Surely they aren't passing the information around the government channels to verify it?
Are they?
-
Interesting information, but his examples are kind of generalized.
I would love to see how they verify things they got from Snowden or whomever else. Surely they aren't passing the information around the government channels to verify it?
Are they?
^ Yeah, the comments are good on it, too. Looks like a bunch of regulars on this guy's blog, fighting like getbiggers.
-
^ Yeah, the comments are good on it, too. Looks like a bunch of regulars on this guy's blog, fighting like getbiggers.
I dont fight w GB'rs - i just mock Andreisawelfarequeen and Strawfag
-
Only way I can figure this guy is communicating, is by paper. How else could it be done? And it's also possible that he's nothing but a face and name attached to it, since it seems impossible to believe that so much work is being done by a guy hiding in his room. How is the communication happening.
-
I dont fight w GB'rs - i just mock Andreisawelfarequeen and Strawfag
Andre's asking for it. Worst troublemaker I've seen, anywhere.
;D ;D
-
Just one percent of the files released so far according to wikileaks!!
WikiLeaks says just 1% of #Vault7 covert documents released so far
https://www.rt.com/news/379856-wikileaks--cia-hacking-vault7/
Desperate media operation already launched trying to make media buzz about something else ;D
US general says Russia has deployed banned missile
http://abcnews.go.com/Politics/wireStory/us-general-russia-deployed-banned-missile-45992484
-
Assange needs to have that shit in Sweden (or wherever) cleared up, so he won't be bogged down with relatively minor stuff like that.
-
Only way I can figure this guy is communicating, is by paper. How else could it be done? And it's also possible that he's nothing but a face and name attached to it, since it seems impossible to believe that so much work is being done by a guy hiding in his room. How is the communication happening.
This is beyond my pay grade! Lol.
He has associates all over the globe; I would assume he uses encryption of some sort, or like mentioned above: Assange has so much dirt on the Powers That Be that they are afraid to disrupt him, intimidate him, or attempt to assassinate him.
Really neat (and scary) stuff!
-
^^
He's residing in foreign embassy. It's foreign territory.
It would be diplomatic disaster if Americans killed him there even if they could somehow get in.
Their only way is to blackmail/bribe the Ecuadorian president to kick Assange out. He will be arrested the moment he steps outside the embassy.
Immunity of diplomatic missions are respected for a reason.
By breaking it even with quite minor player like Ecuador who probably could not retaliate, Americans would start the erosion of the system. You have embassies and staff abroad too. And they are untouched even in hostile countries. Because this system has been managed to be kept intact for centuries.
-
(https://i.reddituploads.com/ba0c8b50c53f40ebb66d4fdb40f43790?fit=max&h=1536&w=1536&s=58450e6d30ca7552c5050f39d9447a9e)
-
This is beyond my pay grade! Lol.
He has associates all over the globe; I would assume he uses encryption of some sort, or like mentioned above: Assange has so much dirt on the Powers That Be that they are afraid to disrupt him, intimidate him, or attempt to assassinate him.
Really neat (and scary) stuff!
Yes, that's the thing. If he's holding the winning hand, and it serves to protect him from death, then it says at least one other person may have the answer. But that means anyone known to be associated with him could be a suspect, which would then make his objectives all the more difficult to achieve.
That alone would make me inclined to believe the whole thing is con.
-
Pretty dumb of Howard (on another thread) to say he felt the email was fake. Not sure he said exactly that, but it was similarly silly.
I likely did say that.
On a serious note, in my career field of physics, we depend on strictly verified information.
In scientific journals are "refereed " . In simple terms they check each and every figure and detail.
I also realize that the world of political news is a mixed bag in terms of credible sources.
BUT, I do the best I can to filter the crap from the credible.
In the end we all make our own conclusions and make our best personal judgments.
-
^^
He's residing in foreign embassy. It's foreign territory.
It would be diplomatic disaster if Americans killed him there even if they could somehow get in.
Their only way is to blackmail/bribe the Ecuadorian president to kick Assange out. He will be arrested the moment he steps outside the embassy.
Immunity of diplomatic missions are respected for a reason.
By breaking it even with quite minor player like Ecuador who probably could not retaliate, Americans would start the erosion of the system. You have embassies and staff abroad too. And they are untouched even in hostile countries. Because this system has been managed to be kept intact for centuries.
He made bad choice with Ecuador though.
Everyone knows there is only one place where you are safe if Americans are after you. Snowden is there.
Americans dare not step there without permission and wield zero power over the decision making there.
Very good points.
I'd only point out that he does require food, and he is without a doubt a hard drinker (can see it in his face) so these things punch holes into his safety.
-
^ He also smokes TMK, so once again he has many chinks in the armour that can be exploited from the outside.
-
I likely did say that.
On a serious note, in my career field of physics, we depend on strictly verified information.
In scientific journals are "refereed " . In simple terms they check each and every figure and detail.
I also realize that the world of political news is a mixed bag in terms of credible sources.
BUT, I do the best I can to filter the crap from the credible.
In the end we all make our own conclusions and make our best personal judgments.
Then you should be the first to say the emails are real, Howard. You should be satisfied they are, since you know better than to say otherwise.
But no. Instead, you run around the site angering other GBers. Pissing them the fuck OFF.
So you're all good by me.
-
Interesting information, but his examples are kind of generalized.
I would love to see how they verify things they got from Snowden or whomever else. Surely they aren't passing the information around the government channels to verify it?
Are they?
They don't really have to verify the facts on the emails, they only have to verify that the source is authentic.
-
Has Wikileaks published anything that is detrimental to Russia or Putin
Haven't read this thread but just wondering
Certainly seems like a target rich environment considering the Russian government is basically a crime organization
-
Has Wikileaks published anything that is detrimental to Russia or Putin
Haven't read this thread but just wondering
Certainly seems like a target rich environment considering the Russian government is basically a crime organization
I've read that Russia (and the surrounding region) have more hackers than anywhere else.
...because the Russian gov't is already thought of as corrupt, there's probably a smaller market for their leaks.
-
Putin is known to be a "paper and courier" type gentleman, like Trump.
-
I watched Hillary blithering and blathering about the Women Day stuff, and man I'm so glad she lost. Just the stupidest, most meaningless SHIT these people try to use against society.
-
Has Wikileaks published anything that is detrimental to Russia or Putin
Haven't read this thread but just wondering
Certainly seems like a target rich environment considering the Russian government is basically a crime organization
Haha, CNN has been "reporting" that for whole their existence. No one watches their Russian-language service ;D
Bro, look at the mess your government and the affiliated agencies are. There's basically no way someone could be worse. Russia doesn't even have resources to be mess that huge. It only has 3 corrupt intelligence agencies, whereas you have 16!
(https://s1.postimg.org/dskwfcutb/aa_301.png)
And China is just becoming active!
-
PS. While Washington elite has been pumping their fists in the air and brutally calling Putin names, "corrupt Putin" has been at work again!
Securing top level jobs for tens of thousands of Russians and EU-Hungarian brothers. Deal worth of billions. HUGE!
US lackeys in EU slipping from line?
Hungary wins final EU approval for Russian-built nuclear plant
https://www.euractiv.com/section/energy/news/hungary-wins-final-eu-approval-for-russian-built-nuclear-plant/
PPS. Great Rosatom building in Finland too - NICE! Putin bringing jobs to thousands with his corruption!
I often see American brothers quoting stock market indices as showing their economic growth. It has been huge increase now under Trump.
Russia has tiny and immature market compared to US markets but Putin haven't been doing too bad on that regard either. Considering he's so corrupt, all the money is stolen from Russia, sanctions etc. Imagine if he was not corrupt and didn't steal all the money!
Does CNN ever report that Russian stock market is now at all time highs ???
(https://s8.postimg.org/7snmgyadh/aa_321.png)
-
I dont fight w GB'rs - i just mock Andreisawelfarequeen and Strawfag
Closeted Homo Stalker much?
-
They don't really have to verify the facts on the emails, they only have to verify that the source is authentic.
But leaving it to those who would love to shoot the whole works down by pointing to anything false, which no one did tmk... but not through lack of effort, no doubt.
So, we're left with the content of those emails, as well as the fact they were taken in the first place from someone who didn't respect the information yet fully owed us its proper care.
All in all, not good.
SO, exactly who the fuck is the "bad guy" here, again?
And BTW, if in fact it is true that email is the cause of Hillary's loss, as twisted as it is to try to believe it, then isn't Hillary and ONLY Hillary to blame when it came to answering the question about whether she's the choice for the job?
Problems, problems, for the lady with her twelfth drink in hand.
(https://s9.postimg.org/gs6t6qovj/s_CLINTON_SHOT_large.jpg)
(https://s10.postimg.org/6yudttieh/Female_Whiskey_Drinkers_2.jpg)
(https://s10.postimg.org/nqf8t6ma1/clinton_drinking1.jpg)
(https://s9.postimg.org/jj2fdq41b/1491486523020454577_740x416.jpg)
(http://theolivebranchreport.com/wp-content/uploads/2016/09/Hillary-angry.jpg)
"Yeah? Well, FUCK-YOU-STRAIGHT-TO-HELL!!"
(https://s10.postimg.org/457ym0omh/Hillary_drinking_agin.jpg)
No, I do believe she's a good woman at heart, but please don't tell me she should bring her delusional ass to the WH... because I'm sure you voted for her. (Didn't you?)
-
But leaving it to those who would love to shoot the whole works down by pointing to anything false, which no one did tmk... but not through lack of effort, no doubt.
So, we're left with the content of those emails, as well as the fact they were taken in the first place from someone who didn't respect the information yet fully owed us its proper care.
All in all, not good.
SO, exactly who the fuck is the "bad guy" here, again?
Even if there is false information on a few emails, it doesn't invalidate them. If I send you an email
2+2=5 the information is wrong but it's still my email.
The only ones who would want to discredit them would be the US Government I'd imagine.
The only thing I know about hacking is what I see in the movies and I hear they're unrealistic.
As for Clinton...I tried like hell to come up with a better solution but I couldn't. I really disliked both candidates.
-
Don't worry: Bush's CIA & NSA chief Michael Hayden tells CNN there's no such thing as a Deep State in the US - just a "permanent government"
(https://pbs.twimg.com/media/C6V2vxLXQAARGc9.jpg:large)
"That isn't a murderous lion -- that's just a big pussycat!"
-
Even if there is false information on a few emails, it doesn't invalidate them. If I send you an email
2+2=5 the information is wrong but it's still my email.
Info saying the person isn't good at math or may have a reason to lie about it, would be true.
The only ones who would want to discredit them would be the US Government I'd imagine.
Anyone who'd have wished to see the whole damn thing go-away and leave Hillary alone, would have interest in diminishing it to the greatest degree possible.
Yet not even the tiniest dot was able to be diminished.
The only thing I know about hacking is what I see in the movies and I hear they're unrealistic.
And FWIW, Hollywood and CNN are all but one-and-the-same.
As for Clinton...I tried like hell to come up with a better solution but I couldn't. I really disliked both candidates.
No, it's understandable. I'm not as rough on Hillary supporters as before, but she's only herself to blame for failing. And that Bozo husband of hers didn't help.
-
Anyone who'd have wished to see the whole damn thing go-away and leave Hillary alone, would have interest in diminishing it to the greatest degree possible.
Yet not even the tiniest dot was able to be diminished.
I don't think we're talking about the same thing here. No one is (or should be) discrediting the leaks on Clinton, from all reports they're accurate.
My response about the US gov't had only to do with the CIA leaks.
-
I don't think we're talking about the same thing here. No one is (or should be) discrediting the leaks on Clinton, from all reports they're accurate.
My response about the US gov't had only to do with the CIA leaks.
It's all become the same, IMO, since Hillary's crowd has interest in discrediting Wiki. I'd imagine their asses still hurt from that little election we just had.
Sorry to say, too, many of them are just so completely deranged that they'd actually minimize CIA problems if it could make Hillary look just a "little" better within their warped vision.
-
BUT some annoying speeches won't destroy the country.
What does this even mean?
-
Trust me, that "hear woman roar", rambling makes me cringe too.
BUT some annoying speeches won't destroy the country.
IMHO, it is a matter of trying to get everyone to exhaust their energies on things which will not be resolved in such a way. Sounds like a destructive practice to me, so not sure I agree with your last statement.
Funny how when we most need working solutions from our politicians, we see tail-chasing instead.
-
NSA staff used spy tools on spouses, ex-lovers. Think it takes a warrant? Nope, just somebody willing to do it.
https://twitter.com/wikileaks/status/839910922193932289 (https://twitter.com/wikileaks/status/839910922193932289)
http://www.reuters.com/article/us-usa-surveillance-watchdog-idUSBRE98Q14G20130927 (http://www.reuters.com/article/us-usa-surveillance-watchdog-idUSBRE98Q14G20130927)
-
NSA staff used spy tools on spouses, ex-lovers. Think it takes a warrant? Nope, just somebody willing to do it.
Hardly news. Of course they have the capability. It's like saying NSA doesn't need orders to have someone assassinated, just somebody willing to do it.
-
I'll admit you know more then me about this wiki-leaks issue.
All I know is some of the contents are legit, mixed in with some propaganda (Russia? )
Where are you coming up with "some" and Russian propoganda?
-
Where are you coming up with "some" and Russian propoganda?
Seriously, don't even entertain him with answers anymore
-
Where are you coming up with "some" and Russian propoganda?
Howard there is no evidence that the email from Wikileaks is anything but authentic.
-
In regards to the DNC e-mails and wikileaks, the widely cited Russian fingerprints on the “hacking” attacks – such as malware associated with the suspected Russian cyber-attackers APT 28 (also known as “Fancy Bear”); some Cyrillic letters: and the phrase “Felix Edmundovich,” a reference to Dzerzhinsky, the founder of a Bolsheviks’ secret police – look less like proof of Russian guilt than they did earlier.
Or put differently — based on the newly available CIA material — the possibility that these telltale signs were planted to incriminate Moscow doesn’t sound as farfetched as it might have earlier.
A former U.S. intelligence officer, cited by The Wall Street Journal on Wednesday, acknowledged that the CIA’s “Umbrage” library of foreign hacking tools could “be used to mask a U.S. operation and make it appear that it was carried out by another country…. That could be accomplished by inserting malware components from, say, a known Chinese, Russian or Iranian hacking operation into a U.S. one.”
While that possibility in no way clears Moscow in the case of the Democratic “hack,” it does inject new uncertainty into the “high confidence” that President Obama’s intelligence community expressed in its assessment of Russian culpability. If the CIA had this capability to plant false leads in the data, so too would other actors, both government and private, to cover their own tracks.
https://consortiumnews.com/2017/03/08/fresh-doubts-about-russian-hacking/ (https://consortiumnews.com/2017/03/08/fresh-doubts-about-russian-hacking/)