Wednesday, March 8, 2017

SHOCKING: Deep State Coup Exposed: Wikileaks Shows How CIA Can Stage Russian Hacking

(Claire BernishWikileaks’ Vault 7 publication of a massive cache of CIA documents now reveals one of the most crucial bits of information yet — the government cannot possibly prove its crackpot Russian hackers theory about the U.S. election, because the CIA has all the tools to make it appear as if The Russians Did It, whether or not they did.

Related BREAKING: WikiLeaks’ Vault 7 Shows How CIA Spies on Your TV, Phone, PC, Mac, and More

Source - The Free Thought Project

by Claire Bernish, March 7th, 2017

Further, the CIA, itself — not The Russians, as officials have alleged — might be responsible for putative electronic ‘fingerprints’ left upon purported hacks into various official U.S. systems, since the agency keeps a voluminous ‘library’ of malware deployed by foreign nations.

Wikileaks reports:

“The CIA’s Remote Devices Branch’s UMBRAGE group collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.”

This means the CIA in essence maintains a veritable wardrobe from which it can choose to don the cloak of another country whenever a mission would deem that necessary — even if the target of the deception were other agencies within the United States government.

Wikileaks continues:

“The CIA’s hand crafted hacking techniques pose a problem for the agency. Each technique it has created forms a ‘fingerprint’ that can be used by forensic investigators to attribute multiple different attacks to the same entity.

“This is analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible. As soon one murder in the set is solved then the other murders also find likely attribution.”

Of course, this would be a false attribution planted by the agency to throw off anyone hunting evidence hackers have compromised a system. Meaning, in short, officials with the NSA and other Intelligence agencies likely did detect the electronic markings of the Russian government — but they could easily have been instead left by the CIA.

Indeed, as Jerome Corsi writes, this presents the “possibility that the Obama administration obtained FISA permission to conduct electronic surveillance on Russians believed to be coordinating with the Trump campaign based on intelligence the CIA planted to deceive the NSA into thinking there was actual contact between Russian agents and the Trump campaign.”

And if any doubt exists the CIA would be that duplicitous in its methods, another revelation from Vault 7, in a document Codex, is how to thwart any investigative efforts.

“With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the ‘fingerprints’ of the groups that the attack techniques were stolen from,” Wikileaks continues.

“UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.”

Incidentally, the Merriam-Webster Unabridged Dictionary lists as the first definition for the word, umbrage, “an area of comparative darkness,”or “an overshadowing influence or power.”

Wikileaks’ tweeted with a link to the Codex document, “CIA classifies hacking document to avoid ‘law enforcement’ attributing CIA attacks to the CIA” — and included an excerpt stating,

“This specification is classified SECRET//ORCON/NOFORN to avoid hostile Foreign Intelligence Operations, Law Enforcement, Incident Response, Reverse Engineering, or any other investigation of captured tools or techniques resulting in attribution to the United States Government or the Central Intelligence Agency. …”
Further still, the Democratic National Committee and former presidential candidate and secretary of state, Hillary Clinton, sought to smear Republican politicians by inflating purported pro-Russia sentiment to tarnish candidate Donald Trump.

In a communique dated April 27, 2016, two DNC insiders discuss Rand Paul’s former foreign policy adviser, Dmitri Simes, and alleged recently-discovered ties to the Russian government, stating, in part,

“We don’t have a ton on Simes, but the pro-Russia stuff ties in pretty well to idea that Trump is too friendly with Putin/weak on Russia.”

READ MORE: Proving She Can Do Anything She Wants, Clinton Hires Disgraced DNC Chair for Own Campaign

Click to enlarge image

While these documents don’t provide unassailable evidence the CIA actually planted Russian Federation electronic fingerprints in government systems, they do prove the agency not only has the capability, but the foresight to insert an impenetrable shield against probing investigative agents.

A last point to consider in the Russian Hackers conspiracy so beloved by politicians and mainstream presstitutes, alike — months have passed without proof any agent or associate of the Russian Federation penetrated any U.S. computer system in a manner departing typical State hacks.

Indeed, the only significant evidence provided by officials clamoring loudest about Russian hacking has been the exact fingerprints Vault 7 proves the CIA can surreptitiously insert.

It now seems apparent that if we’ve been duped, as a nation, the actor has been under our noses — not thousands of miles away — all along.
Stillness in the Storm Editor's note: Did you find a spelling error or grammar mistake? Do you think this article needs a correction or update? Or do you just have some feedback? Send us an email at with the error, headline and urlThank you for reading.

Question -- What is the goal of this website? Why do we share different sources of information that sometimes conflicts or might even be considered disinformation? 
Answer -- The primary goal of Stillness in the Storm is to help all people become better truth-seekers in a real-time boots-on-the-ground fashion. This is for the purpose of learning to think critically, discovering the truth from within—not just believing things blindly because it came from an "authority" or credible source. Instead of telling you what the truth is, we share information from many sources so that you can discern it for yourself. We focus on teaching you the tools to become your own authority on the truth, gaining self-mastery, sovereignty, and freedom in the process. We want each of you to become your own leaders and masters of personal discernment, and as such, all information should be vetted, analyzed and discerned at a personal level. We also encourage you to discuss your thoughts in the comments section of this site to engage in a group discernment process. 

"It is the mark of an educated mind to be able to entertain a thought without accepting it." – Aristotle

The opinions expressed in this article do not necessarily reflect the views of Stillness in the Storm, the authors who contribute to it, or those who follow it. 

View and Share our Images
Curious about Stillness in the Storm? 
See our About this blog - Contact Us page.

If it was not for the gallant support of readers, we could not devote so much energy into continuing this blog. We greatly appreciate any support you provide!

We hope you benefit from this not-for-profit site 

It takes hours of work every day to maintain, write, edit, research, illustrate and publish this blog. We have been greatly empowered by our search for the truth, and the work of other researchers. We hope our efforts 
to give back, with this website, helps others in gaining 
knowledge, liberation and empowerment.

"There are only two mistakes one can make along the road to truth; 
not going all the way, and not starting." — Buddha

If you find our work of value, consider making a Contribution.
This website is supported by readers like you. 

[Click on Image below to Contribute]

Support Stillness in the Storm