Wikileaks CIA Methods dump of 7 March 2017

This is just a skelton posting to be filled out a bit more later. A place to hang comments and discussions about the event while I try to catch up.

A couple of starter reads:

The topic broke out on another thread here, with some comments to catch up:

Larry Ledwick says:
7 March 2017 at 5:22 pm (Edit)
This might need a new topic — Major Wikileaks release summary of the juicy bits.

A couple of headings from a quick search that looked interesting:

WikiLeaks has released a CIA data dump titled “Vault 7 Part 1 “Year Zero”: Inside the CIA’s global hacking force.”
WikiLeaks sent out multiple tweets today in relation to a new batch of information set to be published following a press conference at 8AM ET. The release was given the codename “Year Zero” and related to what WikiLeaks called a “CIA global hacking force.”

WikiLeaks’ CIA document dump shows agency can compromise Android and smart TVs
The website releases more than 8,700 documents it says are from a CIA cyber unit.

WikiLeaks has released more than 8,700 documents it says come from the CIA’s Center for Cyber Intelligence, with some of the leaks saying the agency had 24 “weaponized” and previously undisclosed exploits for the Android operating system as of 2016.

Some of the Android exploits were developed by the CIA, while others came from the U.S. National Security Agency, U.K. intelligence agency GCHQ, and cyber arms dealers, according to the trove of documents released Tuesday.

Some smartphone attacks developed by the CIA allow the agency to bypass the encryption in WhatsApp, Confide, and other apps by collecting audio and message traffic before encryption is applied, according to the WikiLeaks analysis.

All from the “I’m not paranoid, it IS as bad as I thought” or the “I’m not paranoid, I just know what can be done” departments…

Subscribe to feed

About E.M.Smith

A technical managerial sort interested in things from Stonehenge to computer science. My present "hot buttons' are the mythology of Climate Change and ancient metrology; but things change...
This entry was posted in News Related, Tech Bits and tagged , , , . Bookmark the permalink.

121 Responses to Wikileaks CIA Methods dump of 7 March 2017

  1. Larry Ledwick says:

    Well we can say we told you so to all the doubters, if it can be done someone will do it.

  2. Larry Ledwick says:

    From twitter :
    Stefan Molyneux Retweeted
    DEPLORABLE MEDIA‏ @correctthemedia 4 hours ago

    Amazon is owned by Jeff Bezos who owns the Washington Post and has a $600 million deal with the CIA.

    Still want an Amazon Echo?

  3. Stirner says:

    Wikileaks dropped their docs with a helpful overview.

  4. philjourdan says:

    The really sad part is – this can all be traced to Obama and his philosophy. This Snowden is one of his snowflakes. And while it is one thing to suspect it – telling your enemy of your capabilities is just plain stupid. But Obama’s culpability is that he used this on the us.

  5. philjourdan says:

    Still want an Amazon Echo?

    Don’t want a google spot either.

  6. LG says:

    Some notables:
    The following graphics on #Vault 7

    Also, as of 30 minutes ago, CNN was still silent on #Vault 7!

  7. LG says:

    From Wikileaks twitter feed:

  8. jim2 says:

    Only the paranoid are correct.

  9. Glenn999 says:

    i hate to say it

    popcorn futures

  10. omanuel says:

    Thank you for confirming the tragic betrayal of this once great nation by an unholy alliance of formerly independent national academies of sciences under the UN on 24 OCT 1945.

    Here is a list of the Nobel and Crafoord Prize winners who will use a tax-exempt charitable 501(c)3 organization to incite street marches next month in support of Al Gore’s, the UN’s IPCC’s & US NAS’s 97% consensus scientific evidence of AGW.

    Obama’s Nobel Prize-winning Secrerary of Energy, Dr. Steve Chu, is one of them.

  11. E.M.Smith says:

    Well, I finally got done with the days chores. Now I’m a bit too tired to try wading through 8k pages of tech talk on security… maybe tomorrow….

    FWIW, one of the “odd” things I do (that some of you may have noticed…) is a constant rotation and swapping of what OS, hardware, chip, device, etc. etc. I’m using at any given time. For one thing, that puts a kaleidoscope of OS signatures in the grill of anyone wanting to hack / bug me. A minor thing, but it makes it just a bit harder to decide what to do and how to approach the crack. Now it does mean I have the sum of all exposures to exploit, but each is isolated from the others… It also means that for any attack TIME, most of my systems are powered off and unplugged. So a persistent attacker can see the large set of potential exposures, but a point in time attack only sees one platform, that then is turned off for days… and at any given time you can’t know in advance what profile to attack (so must test each time… exposing your traffic again) .

    It also means if any one systems get compromised, only a small slice of my life is exposed. Break into the Video System, you can find out what music and Youtubes I watch, but not see any money information nor email. Manage to turn on the camera on the Mac, you will see my none-to-pretty mug glowing in screen-glow while I type things into one of 4 blogs I regularly read, and maybe some R&D for potential articles that will end up being public anyway. The background being one of three uninteresting walls and the audio pickup getting broadcast news. So things like talk shows and such. (Right now, a discussion on EWTN – Catholic TV News… so they can think me involved in a religious discussion until they sort it out ;-)

    Now I layer onto that a tendency to “wash” bits away from the platform. A new board gets a new OS install and a new browser and a new IP and… then I log into “whatever” with it. A month later Ill be on a different system when I next log into “whatever”, so if the first one was compromised, it is now “washed away”… PITA and excess work? Well, yeah, sort of… but I like playing with systems and OS config stuff.

    Between such “rotate the shields” and “flush the bits” it presents a complex target that’s hard to get a handle going. (It is NOT foolproof and is only one in a layered set of defenses). It does make it a confusing and misleading battle space with complexity to sort out, all while data loggers and IDS IPS systems are given more time to work.

    It does still leave exposure for things like email flows over the internet or clicking on ‘hack me’ popups on web sites, so useful but not complete.

    But it would be prudent to search that archive for, for example, any Debian exposures…

    One other minor thing: I like systems that have marginal performance. If it is just fast enough to be “OK” and someone loads on a bit of spyware, it tends to become “not fast enough” and “has issues” with speed and performance. Even if you don’t catch that the issues is a system crack, you are still motivated to “scrub and reinstall” … or reset to last good state backup. (There was one occasion when this saved a whole company, as some malware could not get off the honey-pot and into the main corporate network due to slowing down the honeypot enough to be noticed… and fixed… before it could make the next leap.)

    Again, not enough by itself, but layered in with a tendency to replace the OS at the drop of a hat, and rotate the image used daily; well, a systems cracker will be faced with a dozen cracks to make in as many days just to stay connected and with much work being flushed next time that system rotates back in. Frustration can cause errors or even just giving up on an ‘uninteresting’ target.

    Well, with that, I’m going to be AFK again for a while…

  12. R. de Haan says:

    This has nothing to do with spionage and security anymore. This is sabotage and destruction of the entire IT industry and treason of the the USA and it´s people.
    This nut house has to come down and the idiots behind this totally out of control scheme identified, trialed and jailed. Period.

    This club has become a threat to the West and the World.

    It’s like having the former KGB running America.

    Just stop it.

  13. LG says:


    Manage to turn on the camera on the Mac, you will see my none-to-pretty mug glowing in screen-glow while I type

    Wuttttt ????
    You mean you haven’t gotten around to stick that piece of electrical tape on that camera yet ?

  14. Jeff says:

    Protected Media Path in Windoze (in particular 1 0) is obviously more than just DRM and copy protection. Add to that negative ring levels, and probably a treasure trove of traps and exits just waiting to be hooked by gubmint spyware, etc., and it’s no wonder that M$ was so anxious to get that bloated, bilious, big-brother (bother) brew on everyone’s PCs.

    All the more reason I’m staying on 7, and locking things down even further. As far as having my appliances having daily (or nano-second-ly?) kaffee klatsches, no way. Here in Germany it seems that all the engineering has gone to making the washers, etc., more “green”, which pretty much describes the clothes when they come out – unclean and still green. Up to four hours for a load to wash, and still not clean. Grrrr.

    Now those of us in the tinfoil-hat brigade can have at least a few “I told you so” moments…..

  15. Gail Combs says:

    R. de Haan says “This has nothing to do with [e]spionage and security anymore…”


    Wwhat the CIA is saying is that it is MORE IMPORTANT to be able to spy on E.M. Smith and Gail Combs and R. de Haan than it is to prevent China from vacuuming up all the US technical and MILITARY advances and patenting them first.

    This is why the ‘Russians were the Hackers’ story is so idiotic BTW. The Seth Rich/CIA/NSA/China are the top four on the list not Russia…. UNLESS you assume Hillary is a Chinese Puppet just like her Husband.

    8/21/2015 Chinese Hackers Target U.S. University With Government Ties

    … in late July, about six weeks after the university discovered that its China experts were being targeted, the Defense Department issued a warning about hackers “affiliated with a known foreign intelligence agency” who were going after academic institutions as well as government contractors.

    “In the past three months, this APT actor has penetrated U.S. infrastructure, exfiltrated data, and compromised credentials,” according to the bulletin…

    Sep 24, 2015 It is growing far more difficult for China’s leaders to deny that a computer hacking campaign against U.S. business and interests has ties to China’s government.

    March 28, 2013 Chinese Hacking Is Made in the U.S.A.

    Ten years ago, while visiting International Business Machines Corp.’s software-research lab in Beijing, I observed dozens of Chinese employees moving about seemingly free of any security-related limitations. I asked the lab’s manager two questions:

    “Do you have any way of knowing whether any of your Chinese staff is also working for the Chinese government?

    “Do you have any way of knowing whether any of your Chinese staff is a spy?”

    The manager unhesitatingly answered “No” to both. He hastily added, “But you can be sure that we at IBM work very hard to protect our core intellectual property.”

    China-Based Hacking of 760 Companies Shows Cyber Cold War now behind pay wall (wwwDOT)

    Hackers Linked to China’s Army Seen From EU to D.C. now behind pay wall

    China Spying – Technology Transfers History a round up at an Alex Jones (barf) blog. It has a lot of stories and links.

    Chinese hack U.S. weather systems, satellite network

    Oak Ridge Lab Hacked behind paywall

    China Oak Ridge National Laboratory top visitors “As I noted recently in my annual wrap-up of foreign national visits to Oak Ridge National Laboratory, China again headed the list. In fact, the 1,859 visits by citizens of China represented about a fourth of the total. That’s not unusual. China has topped the visitation list every year since 2007, when ORNL began keeping the statistics by nation.”

  16. Gail Combs says:

    The suggestion was made over at theConservativeTreeHouse that cars can be ‘hacked’ and that could have caused the death of Michael Hastings.

    …Former U.S. National Coordinator for Security, Infrastructure Protection, and Counter-terrorism Richard A. Clarke said that what is known about the crash is “consistent with a car cyber attack”. He was quoted as saying “There is reason to believe that intelligence agencies for major powers — including the United States — know how to remotely seize control of a car. So if there were a cyber attack on [Hastings’] car — and I’m not saying there was, I think whoever did it would probably get away with it.”[68] Earlier the previous day, Hastings indicated that he believed he was being investigated by the Federal Bureau of Investigation. In an email to colleagues, which was copied to and released by Hastings’ friend, Army Staff Sergeant Joe Biggs,[69] Hastings said that he was “onto a big story”, that he needed to “go off the radar” … USA Today reported that in the days before his death, Hastings believed his car was being “tampered with” and that he was scared and wanted to leave town.

    another commenter at ConservativeTreeHouse made the statement:
    “They need to ground Air Force One, Marine One and the VP’s plane immediately to tear out and re-do the electronic for the President’s and VP’s safety! ”

    Could these ‘Backdoors’ to computers allow crashing of cars and planes?

    I don’t have the knowledge to figure that out although I do know the computers WILL shut down your car.

  17. Gail Combs says:

    Here is an interesting thread to pull from the same ConservativeTreeHouse article (pg 2 comments)
    “Does anyone else remember how the original plan was that Trump wasn’t going to live in the White House for a year, due to “extensive remodeling”? And that changed right away, he was there the first week –
    I think the reason he stayed there – and the reason he kept so many of the unloyalists on board – was to flush them all out. It would be one thing to say something happened during a prior time, but this way everyone gets caught red-handed”
    ~ link

    I decided to see if this made sense:

    We know that Melania refuses to stay at the White House.

    We know that there are plenty of photos of Trump in the Oval Office… And CNN verifies meeting do take place there:

    Mar 6, 2017 ZEROHEDGE CNN Airs ‘Spy Cam’ Footage Of Trump Oval Office Meeting As If It’s Perfectly Acceptable

    NSA Admiral Mike Rogers was on the outs with the Obama Admin Deep State who wanted him fired. While Obama was out of the country he paid a visit to Trump Tower.
    Did NSA Admiral Mike Rogers Warn Trump On November 17th, 2016?…

    And here is the date where Karl Rove said the Oval Office needed major security renovations that could take up to a year.
    11/17/16 Donald Trump Won’t Work In The Oval Office? White House Renovations Could Take A Year, According To Karl Rove
    President-elect Donald Trump may not have the political background most United States presidents do before they’re elected, but when he does finally relocate from Trump Tower in New York City to 1600 Pennsylvania Avenue in Washington, D.C., he’ll be faced with a familiar task: renovating the Oval Office. And it could take a while.

    …Karl Rove, the deputy chief of staff for former President George W. Bush, said it may be a year before Trump can work from the Oval Office due to security renovations.

    Rove alleged current President Barack Obama was initially supposed to direct the upgrades on the room in which most presidents operate during their tenure. However, Obama refused and decided to pass the job to his successor.

    “President Obama could have told the Secret Service, ‘I know you want to modernize the Oval Office with security enhancements — literally strip it down to the bare walls and build it back up so we’ve got bulletproof glass and so forth and so on, security arrangements in it, in my last year in office,’ but instead he said, ‘Why don’t you do that [with] whoever comes next,’” Rove said in the clip surfaced by the New York Post.

    While the Oval Office is getting its makeover, Trump will likely work out of former President Richard Nixon’s old office in the Old Executive Office Building at 1650 Pennsylvania Avenue, Rove said.

    Makes one go HMMMMMmmmmm

  18. Ian W says:

    Remote control of cars is relatively simple even without direct access to them although the manufacturers have closed the overt glitches that allowed people in simply ‘state’ actors would have built in trap doors and skills to do more. See
    It is not only Michael Hastings, Andrew Breitbart after making similar comments to those by Michael Hastings, died in a crash that the Jeep video shows you would be simplicity itself to carry out.
    Trump may have pulled the teeth of many of the paranoid ramblings from the Democrats by this dump. All he needs to do now is use the next recess Mar 16/17 to make recess appointments of all the posts being slow-walked and replace the spoilers currently in the administration. If they cannot be sacked give them a sound and electronics proof office no phone, computer or non-work reading allowed, with a table and a hard chair in a basement as their office with a time clock on the door to ensure they do a full days ‘work’ transcribing economic figures by hand.

  19. Gail Combs says:


    Here is the same story without paywall:

    I think I will keep my 20+ year old vehicles thank you!

    BTW I thought Breitbart “collapsed suddenly while walking in Brentwood just hours before his planned release of footage of Barack Obama that he assured would heavily damage the sitting president’s chances of reelection.

    Breitbart’s coroner, Michael Cormier, passed away – also in a suspicious and sudden fashion.

    “The 61 year old Cormier was discovered dead on April 20th – the same day the city officials had released their preliminary autopsy report on the death of conservative media powerhouse Andrew Breitbart,”

    And then there is Scalia… NO AUTOPSY??? CREMATED????

  20. E.M.Smith says:

    Well… I knew there was a way, but seing the HowTo in print is creepy… at least now I know my UEFI concerns were valid and avoiding it was worth it:

    “Hooking” the last step of the bootloader so it runs any code you want prior to the OS:

    Doing the “driver” build for your UEFI hook code (that lets you do the system exploit):

    They also have a link to a ” persistent storage option” that I’ve not looked at yet that may be closer to the exploit I had immagined. This one would require getting infected “driver” code loaded, but an intercept of an (automatic?) update would do that (why I don’t do auto update…along with wanting known system state…).

    This was on my first ‘dip’ into it … so maybe I’ll search for “systemd” next :-)

  21. Gail Combs says:

    And then there was this:
    Vladimir Putin’s favorite driver killed in car crash

    Vladimir Putin’s favorite driver was killed while behind the wheel of an official state vehicle — a suspicious crash that has been called an “audacious threat” to the Russian president.Modal Trigger

    The driver had more than 40 years of experience.CEN

    Putin was not in the black BMW when it was struck head-on in Moscow by a car that swerved into its lane from the opposite direction, according to surveillance video of the incident.

    The unidentified chauffeur, who had more than 40 years of experience, died and the driver of the other car was in critical condition…

    Vladimir Putin’s favorite driver was killed while behind the wheel of an official state vehicle — a suspicious crash that has been called an “audacious threat” to the Russian president.Modal Trigger

    The driver had more than 40 years of experience.CEN

    Putin was not in the black BMW when it was struck head-on in Moscow by a car that swerved into its lane from the opposite direction, according to surveillance video of the incident.

    The unidentified chauffeur, who had more than 40 years of experience, died and the driver of the other car was in critical condition…

  22. E.M.Smith says:

    Oh Dear… the wikileaks search box returned 207 hits for systemd. 47 in this 7 vault dump, 158 in “Hacking Team”…

    Well, I think that confirms my “systemD” worries ;-)

    Someday I need to wade through that 207 looking for gems…

  23. Gail Combs says:

    AND more…BMW Hacked

    “This technology replaces the traditional mechanical control systems to manage steering, brakes, and accelerator. ”

    Flaws in BMW ConnectedDrive Infotainment System allow remote hack

    I think you will see an upsurge in the prices of older cars. No wonder Obama was paying ‘Cash for Clunkers’ to get the un-hackable cars off the road PERMANENTLY.

  24. E.M.Smith says:


    I don’t use electrical tape, the goo glue is bad for the lens. I use small “dot” bandaids. The gauze is lens friendly, they are an ideal size, stick on well, and remove cleanly.

    But no, I’ve not done that to the Mac yet. Just got it working recently and I want to try some video recording with it. At present it only is used for blog and article writing, so nothing of risk on it. Used mostly on the couch (so my face and 40 year old bad wall art) and my face has been on TV – I’m “outed”…) or when laying on the bed, so again my face, but a bookcase full of books as background. The reading list might be good for them to read anyway… and nothing in it a worry.

    There is value in salting the mine with innocence…

  25. E.M.Smith says:


    There is a reason I’ve said I want NO computers in my cars… and drive a 100% mechanical 35 year old Mercedes…. NO network connectivity in it. No electrical control of steering, brakes, or throttle. The Diesel even uses vacuum to shut off the engine, no wires! Has vacuum lines to the ignition switch… talk about EMP resistant :-)

    Heck, The Banana Boat doesn’t even have hydraulic assist on the steering…
    (keeps my arms buff :-)

    I think they will last untill my EOL, and almost certainly until my last days as driver.

    I’ve pondered what it would take to design a DIY “Kit Car” that would meet the requirements, but not seeing the need yet…

    My advice? Have at least one pre-computers “classic” you keep ruannable, even if not your Daily Driver. “For that day”.

    FWIW, the 70s early 80s Mercedes were built to take a massive crash and have you walk away without airbags so no worries about a remote airbag disable and accident… The Banana Boat put a Honda Van on a flat bed truck with the driver side wheel folded under it. I replaced the plastic and headlight on the impact corrner… Just a tank… anyone doing a headon into it will break my car, but I will walk away… I like driving my tanks ;-)

    BTW, took the Diesel over Christmas Tree Pass in Nevada… the dirt road with signs warning that jeeps ought to worry… That era Mercedes was originally designed as a Nazi Staff Car… it expected to play in the dirt… has the suspension and clearance for it. Low gear is a rock crawler in the manual transmission. Not fast, about 85 mph tops, for the one without a turbo, but is doesn’t stop much…

    In many ways, a luxury truck.

  26. Gail Combs says:

    Just think of all those Obummer phones in the inner city….

    Wolfmoon @ CTH went a bit tinfoil hat starting HERE about the Catholic Spring and . maybe a bit of blackmail to get Pope Francis in power… or maybe not so tin foil hat.

    Soros started ‘Catholics for Choice’.
    Podesta’s plan for a Catholic Spring

    e-mails on Catholics
    2012 need for a Catholic Spring:

    This is from a really weird guy Zero Point Energy and ETI (Extraterrestrial Intelligence)

  27. Gail Combs says:

    E.M. my Diesel Pk-up, Deerslayer, has taken out four deer and we never bothered to fix any of the (minor) dents. When I bought it I insisted on NO COMPUTER!

  28. E.M.Smith says:

    Gail, I want one… maker?

    The MeredesSCL took out a deer at 80 mph and got me from Indiana to Florida, but minus one headlight and fender…

  29. Jeff says:

    This AMT (and other ring <0 stuff)issue has been around a while, especially since M$ started wanting UEFI and secure boot locked in THEIR interests… Now I wonder who is/are THEY. A fellow from Red Hat sounded the alarm about the signing issue early on. HP's "TopTools" from a ways back used similar technology.

    Here’s a draft paper about UEFI from the Fedora project:

    Intel AMT:

    Here’s a slideshow about the “Intel Spook Booter” (which caused (es) Lenovo a good deal of heartburn with their bloatware on boot)

    And from El Reg:

    A couple of white papers:

    Click to access x86_harmful.pdf

    Click to access state_harmful.pdf

    And a link to Intel’s web page on AMT:

    I’m looking for the Lenovo issue, because they got “hooked” by the hooks
    (by hook or by crook? whale oil beef hooked? )

    And on a related theme, an El Reg sonnet to “Smart” meters

  30. Jeff says:

    A Googler’s defence of Android, etc., in light of the Vault7 release:

    An interesting comment was about (natch) arbitrary JavaScript (yep, Larry hadn’t gotten around to copyrighting it :) )

    For [2], a natural place to start looking for bugs would probably be HbbTv; most modern smart TVs accept an extra MPEG elementary stream with a URL that they go download and display as an overlay through some extra magic (so yes, anything you change channels, your TV tells the channel provider you just did that). This means you can run arbitrary JavaScript code in a probably-not-very-well-hardened browser directly on the TV.
    /* Steinar */

    Interesting: turn speakers into mics for fun and profit:

  31. Gail Combs says:

    Long read, but complete summary from Wikileaks

    Grab a cup of coffee….

  32. Larry Ledwick says:

    Comment on the CIA Vault7 release from Center for Security Policy.

    Obviously the intelligence community has some major issues including but not limited to its huge size, fractured structure under several agencies (so no one really has control/responsibility) and a serious issue with a very leaky system.

    When Top Secret documents show up on candidates systems hours after they are released and extremely dangerous cyber tools go on walk about it is time to get serious, and send a few people to jail for long sentences to get every-bodies attention.

    Perhaps this will provide the imputus to rise up and tell Linux to rip out system-d and go back to a BSD style security profile and for Microsoft to dump their UEFI and secure boot code and get serious about security.

    Maybe this release will lead to code development to slam some of these security back doors permanently now that the vulnerabilities are in the open and the exploit code is in the wild.

  33. R. de Haan says:

    @Gail Combs, How right you are.

    That is why I make use of a bunch of cheap chinese smartphones these days. They come with 2 Simm slots, a mini SD slot, an 8 Mp camera and 8 Gb Rom and a 1.3 Ghz Quad Core and a 5 inch display. I root them, run all the apps and system from an 32Gb SD card and put in anonymous pre-paid sim cards while keeping the numbers to myself. Another property of these dirt cheap phones is the fact that you can still remove te battery, a feature that is getting rare with most flag ship phones. All the numbers my friends and business contacts have are local virtual numbers that are all linked to one of the anonymus prepaid simms. Some of them who adapted to the same strategy as I did can contact me directly with apps like Whatsap or call and text me using the Signal app. Both apps can be activated without using your anonymous simm numbers but by using a virtual phone number instead. Check Google for the right procedures to make this happen. Make sure you always enter the web using and always use a VPN. Of course I use fantasy ID’s so I wish and their minions good luck with the data they have collected on ?.

    The side effect of me using a smartphone is that I hardly ever use my Desk Top and Lab top computers anymore. Checking the web, e-mail, watching the news, it´s all done with these little computers that operate without a hitch and don’t need any maintenance at all.

    So use these fake phones and fake identities every day. In a room I place them on top of the radio speaker. Switch phones, switch wifi´s, switch simms, make a total chaotic mess of everything.
    I’m very generous with good music for those who take the trouble digging through the data and imagine I have fun with it. Stickey tape on the front camera is a habit I adopted years ago, I think it was 2004 sitting behind an iMac when I got the notion, always taped up since.
    One thing I can promise you. I will never spend a single dime on prime US/EU hard-and software ever again and I will never close any fixed contracts for data and phone use either.

    Instead I will use every opportunity to mock and disrupt without letting it become an obsession.

    Think of Pokomon for adults where the phones have become the Pokomon.

    By the way @E.M., You`re fixed home connection, router, WIFI is corrupted by default, just like mine. Switching operating systems brings nothing as long as all the data goes through the same funnel.
    Besides that we now have mobile surveilance equipment on the road that simply clones the entire network in a region. This equipment, made in Israel, is incredibly powerfull. As soon as they have cloned a network they have full access to any phone conversation or any internet router. The company that markets this stuff is currently looking for sales partners in South America which means they already have sold their stuff in the West. I have all the specs of this equipment and if you make total junk like this that is used beyond any current regulation influence your daily life you’re eventually screwed.
    That`s why I took up the smartphone, regarded by many of you as the ultimate shackle of humanity and tried to figure out how to outsmart it and turn it into a mocking device instead. Just love to use Google apps and wipe them of any advertisement using as a search engine. Using a vpn that boots together with system. Tweaking the used apps so they no longer operate in the back ground, replace the android key board with one that doesn’t collect everything you type. Installing a fire wall that prevents any app to send out data and for what it is worth Nato Standard encryption from A to Z. Check the simm… dead end street. Check the social media apps… dead end street, check the phone IP Emei….dead end street, check the Google Account….dead end street. A smartphone configured like this is nothing less but an luxury burner phone. And if you travel abroad, just take a copy of the SD Card and your Sim cards, get a brand new 70 usd phone similar to the model at home and install the copied system from the one at home. Only takes minutes and you’re fine. When you finish your trip leave it with a friend and tell them how to operate it and why.
    Now we only have to find way´s to make payments. You can get debit cards in the UK that are not in your name and you can top them off using a cash machine where you insert the cash and it’s written on your card but only in the UK as far as I know.
    It´s important to take measures in this field as the ECB is walking on it’s last leggs and without any doubt could trigger a massive domino effect of failing banks. I can guarantee you that you’re not a happy bunny if you have any deposits with collapsing banks and you’re cenrtainly not a happy bunny if you have cash laying around that becomes worthless in a fortnight.

    I have heard news that March 15 a law will become effective that was initiated by Obama and Boehner that will cap US debt at the level of 20 trillion USD, a measure that will keep Trump from executing any of his plans. He will be like Podemos, the lefties running the City of Madrid. 1000 plans but no money to make any of them a reality making them absolutely irrelevent in the next elections.

    I know Debt Cap Law like this can be dissolved but it could take a lot of time and time is becoming a rare commodity these days.

  34. Larry Ledwick says:

    Apparently the CIA knew about this breach for about a year now. Hope they did something to cripple the effectiveness of their released malware – like inform the at risk users of possible exposures and patchs.

  35. Another Ian says:



    CIA has 5 test covert ‘listening post’ servers called ‘PocketPutin’
    4:07 PM – 8 Mar 2017

    5,349 5,349 Retweets

  36. Jon K says:

    Just bringing a little humor to the subject.

  37. llanfar says:

    According to Wikileaks Vault 7: This Is Just The Beginning… (at 3:12), less than 1% of the CIA dump has been released??

  38. Larry Ledwick says:

    Related to fixing the vulnerabilities:
    Wikileaks working with vendors to patch the vulnerabilities before the actual exploits are released?
    Apparently wikileaks has not actually released the exploit codes yet, and is considering how to mitigate risks to average users.

  39. M Simon says:

    E.M.Smith says:
    8 March 2017 at 7:29 am

    I would say that all your efforts (rotating servers etc.) are excellent. Except if I was in intel guy I’d be going

    “what is he trying to hide”.

  40. M Simon says:

    Jeff says:
    8 March 2017 at 7:28 pm

    Turning speakers into microphones is not a new idea. Any device that does that needs extra hardware built in. Makers of devices prefer no extra hardware. It costs money and lowers reliability.

    So some one ordered that.

  41. M Simon says:

    Gail Combs says:
    8 March 2017 at 6:13 pm

    Any member of any organized religion deserves it.

    Once you have a power structure it will start using its power and be looking for more.

  42. Jeff says:

    @M Simon: Ever used a Philips EE-8 or EE-20? (or some of their other kits?) Their earphone was usable as a microphone, and I’ve seen the same principle used for speakers. I’ve also seen articles about using lasers (or radar, for that matter) bounced off of windows or other large surfaces to detect what is going on inside. This was in the early 1960s. I still have the kit.

    The gist of the various articles (and, granted, scare-mongering) is that the capability exists, whether or not implemented. Jack-switching is common on PC-audio, in particular when the
    board makers want to skimp on 7.1 configurations. Commandeering Laptop mics and cams
    is a known issue (some school district in Pennsylvania is still “smarting” over that).

    When a lot of the audio becomes a commoditised chip (sadly the case with some hearing aids anymore), it’s cheaper to build features in rather than segmenting the market and running multiple lines, PROVIDED that the cost differential is not too much. AMD does this with their CPUs, crippling one or two cores if needed (e.g. they don’t have enough of the two- or three-core variants on hand).

  43. Larry Ledwick says:

    The problem with IT folks and cyber security is that they all too often fail to really internalize the Jurassic Park Dilemma, and never ask the right questions. They fail to ask, Okay if we implement this what are the down sides for the user? They are in the roll of the trusted expert and do not understand that they have a moral obligation to protect their users from harm caused by the logical consequences of the choices they make.

    Just because you can, does not necessarily mean that you should!

  44. M Simon says:

    As long as we are doing suspicious deaths:

    “The Latin American drug cartels have stretched their tentacles much deeper into our lives than most people believe. It’s possible they are calling the shots at all levels of government.” – William Colby, former CIA Director, 1995

    Not too long after making that statement he died in a boating accident.

    There is an article on the ‘net by a reporter who looked into his death. The currents in that location make it unlikely his body arrived at its final destination naturally.

  45. E.M.Smith says:

    @R. de Haan:

    Interesting approach. I’d thought of doing something like that, but it’s a lot of work and, maybe more importantly, you don’t know what the firmware is doing.

    The Chinese have demonstrated a tendency to put malware into the boot rom firmware of various devices (some much less capable than a ‘smart phone’ – such as USB sticks and picture frames) so they are 100% untrustworthy.

    Instead I’ve gone the SBC (Single Board Computer) route with the Pis and Odroid. There’s a bunch of folks there who have firmware as their “bug up their butt” so dig into it. You can also write / load your own if you like (especially for the non-Raspberry models – for the Raspberry Pi you need a vendor binary blob for the Video Core, but a public re-write is in progress).

    Per my hardline network:

    Well, it isn’t my only internet connection… I have 2 mobile “hot spots” too, and a burner phone I think I can use as a hot spot tether (but have not tried yet).

    IF someone wants to inspect and save the 5.5 TB of saved NCDC / NOAA data I’ve downloaded in the last month, well, I think that would be a great use of their time. ;sarc/ 8-)

    IFF I were to do anything that really mattered, I have ways to not use my hardline. And do so for misc “doesn’t matter but don’t want it at home” things.
    for example… Though I used the tablet (but at Starbucks) to wander around the Wikileaks site. Just so anyone monitoring would find someone was visiting Wikileaks from a place I don’t live in a part of the valley that isn’t near me… The Tablet having an ID / profile that doesn’t match the rest of me, BTW…

    FWIW, the City of Santa Clara has free WiFi, so you can just park on a street (or sit in the lobby of just about any building) in Santa Clara and be on the internet. Now if you are using a “burner” WiFi Dongle on a Pi with a freshly flashed OS chip, just what will be known about “you”? Similarly, there’s the ubiquitous Starbucks, the majority of libraries now (you can go in and get a book or just park outside…) and many many more places to pick up a connection. Several local schools have “guest” networks that reach the parking lot too…

    Since nearly 100% of everything I do is “bland”, I only care on rare occasions.

    I briefly played with a ‘burner phone’ just to get good enough at it, but since 99.9% of all my calls are the spouse with a “Honey Do”, didn’t see the point in continuing it. My old dumb phone is likely not subject to hacking anyway. Most of my email is SPAM, and / or automated notices from WordPress, so “whatever” if someone wants to cope with it… I long long ago started training folks around me not to send me email on anything important. (Just service your email queue once a quarter for a year and folks eventually catch on ;-)

    In essence, my “things done at home on the hardline” are 100% “innocence” and good cover anyway. Anything I’d need to do outside that scope, I’d build a special purpose rig and use connectivity “elsewhere” and wireless. Season with encryption and VPNs as desired for your tastes and spice preferences…

    I suppose the short form is: I’m just too bland to be of interest… Oh Well. But it is fun to play with the tools and toys and imagine someday I might have something that would justify it. (Were I hired by a company to do I.T. infrastructure and / or security work again, for example.)

    Until then someone wants to know I read WUWT,, and, well, I say so here, regularly… and post links to them…

    BTW, for about 25? years several close friends worked on “nuclear and DOD secret stuff” and we knew they had to be security cleared and were monitored. You develop habits… (Started when I was dating the daughter of one of our major nuclear weapons labs while in college. We just knew “Clarence Clearance” was always around somewhere… mostly to make sure she did not get kidnapped by the other side for leverage… Several long stores there ;-) So much of my life has been spent being “modest” in my use of electronic coms subject to sigint exploits. Though calling up one friend at work and, in Russian, saying “Hello {his name}, how’s it going today?” on known monitored lines with Russian detection and / or personnel monitoring likely got us put in “A File Somewhere” ;-) I figure after the first few times they just had a yellow sticky on the phone board saying “And this &^&%$ will call up talking Russian, he’s just a pain and his accent is lousy, ignore him.” The joke was only used for a few months, but I’m sure it was long enough… Given the known “associates with clearance” I’d figure there are at least 3 agencies with a file on me, mostly 40 years old. DOD / DOE due to the labs, CIA / FBI due to friends and the Railroad Tracks Event. Likely NSA by now too due to my profile on signals security. Plus running a Supercomputer Center in the ’80s got you tagged for observation (to assure no ‘export of a munition’ on the encryption engine access) so who know who all tracked that.

    I guess what I’m saying is “I know they know me and I know they know I know, so what’s not to know?” ;-)

    Though given my “profile” on Global Warming, I AM much more comfortable now that Obama is out and Trump is in. I was being much more careful for a few years there… now not so much.

  46. M Simon says:

    Jeff says:
    8 March 2017 at 9:47 pm


    Jacks are expensive and take up a lot of space (how far we have come since I started playing with electronics in the mid 50s. I was 10). . So yes. The hardware is built in. All it takes is software.

  47. M Simon says:

    E. M.

    Climate change? Yes – probably makes you a person of interest.

    Now think about making Drug Prohibition your main topic of interest. Along with – formerly had a Secret security clearance. I assume I was noticeable enough to be a pain. Not quite important enough to be killed.

    What is interesting so far is that no one (of importance) has taken on the Drug War. Funny enough Alex Jones has come out against it. And he is up to hi ears in spooks.

  48. M Simon says:

    You will note in the Alex Jones piece no mention is made of the CIA. Curious.

    I cover that here:

  49. E.M.Smith says:

    Oh, and per March 15th debt “ceiling” (really mild reminder…) yeah, they run into the limit, decide they just must spend more, so after everyone gets their video on TV decrying the debt, have a voice vote to raise the limit. They’ve been doing this charade since the inception of the date limit… about Reagan era?…

    Everyone will fret about how important it is, until the vote to raise, then everyone will forget it for another couple of years…

  50. E.M.Smith says:


    You will appreciate this… some friends doing top secret electronics gear development realized they had clearance for the top secret equipment vault, but no police or security guards did… so they would go into the vault to smoke ;-)

    No idea how good the ventilation was or what the residual smell was… then again, who else would ever be in it to know?

    I imagine walking from vault to insecure areas would leave an aroma trail, but also doubt anyone cared… they created some way cool gear with significant advantages…

  51. M Simon says:

    E.M.Smith says:
    8 March 2017 at 10:44 pm

    My experience in the Defense industries was that about 1/2 the top performers were pot heads.

    Which probably means mild PTSD.

    I’m sure the government knows this. Which may be why they are letting pot legalization happen without too much push back. They also must understand that it probably means the end of all drug prohibition. Which says they have alternate means of funding or are developing it.

  52. Gail Combs says:

    Emily McMullin was the name of the person that set up Trump who I could not remember. Are there TWO Emily McMullin’s? or just one. Remember Trump was targeted in 2013 when he looked into Obummer’s birth certificate.

    These is a messy set of links. Sorry guys.

    BREAKING: McMullin name shows on DNS records for Trump/Russia server, used as evidence for Trump wiretaps

    The server that was used as probable cause in the FISA request that was supposedly communicating with a Russian bank was setup by McMullin.

    The domain was registered to the Trump OrgAINZation. Ex-CIA and Never Trumper Evan McMullin’s sister’s name is, Emily McMullin. The GoDaddy account was opened in 2009, but the domain was registered on 6/29/2016 – right around the time of the first FISA request.

    Guess who’s living in Trump tower? … Emily McMullin who works for a company called Cendyn

    …Cendyn, the leader in interactive marketing for the hospitality industry, has been selected as The Trump Organization’s exclusive interactive marketing agency. Implementation of Cendyn’s products and services will enhance The Trump Organization’s global online presence which includes the website (wwwDOT)…

    BREAKING: McMullin name shows on DNS records for Trump/Russia server, used as evidence for Trump wiretaps

    The server that was used as probable cause in the FISA request that was supposedly communicating with a Russian bank was setup by McMullin.

    The domain was registered to the Trump OrgAINZation. Ex-CIA and Never Trumper Evan McMullin’s sister’s name is, Emily McMullin. The GoDaddy account was opened in 2009, but the domain was registered on 6/29/2016 – right around the time of the first FISA request.

    Why would Evan McMullin make this website? Simple. He needed to plant evidence that the Trump Organization was colluding with Russia to win the election in order to have a FISA wiretapping warrant be approved. The website was “updated” June 29th, three days after the first FISA wiretapping warrant Obama/CIA requested was denied. There wasn’t enough evidence to warrant a wiretapping investigation, but with the newly planted evidence from Evan McMullin through a FISA warrant to wiretap Donald Trump could be obtained. If this domain ( was the catalyst to having the second FISA warrant request approved could be all the evidence Trump needs to indict Obama for illegally wiretapping his campaign and (now) presidency. It is important because the evidence used from would still be in effect today through the FISA warrant obtained in 2016 if it was sole evidence used to obtain the wiretapping warrant which is currently still in effect (latest White House leaks).

    He was in a computer training class at Langley headquarters when the 9/11 attacks occurred. After that, McMullin’s 18-month training to be an undercover operative was sped up, and he soon found himself in a southwest Asian country where the U.S. military was deeply engaged in the new war on terror. The specific country remains classified to protect his contacts there.

    What emerged was a picture of a young case officer who volunteered for duty in the world’s most dangerous places and had a unique talent for recruiting members of extremist organizations as assets.

    McMullin joined the CIA as a student trainee while an undergraduate at Brigham Young University. He would alternate semesters between the university and training at CIA headquarters in Langley, Va.

    McMullin ran third party against Trump in Utah to draw votes away from him and help Hillary.

    Louise Mensch, a former British MP, got caught in the Wikileaks shilling for Hillary. She was a big Evan McMullin supporter and was the one who broke the Trump/Server/Russian bank story.
    Trump’s wire-tapping claims might have started with former MP Louise Mensch
    An article written by the former MP has been cited as a starting point for Trump’s latest allegations.

    The story:

    By Louise Mensch | 10:18 pm, November 7, 2016
    Two separate sources with links to the counter-intelligence community have confirmed to Heat Street that the FBI sought, and was granted, a FISA court warrant in October, giving counter-intelligence permission to examine the activities of ‘U.S. persons’ in Donald Trump’s campaign with ties to Russia.

    Contrary to earlier reporting in the New York Times, which cited FBI sources as saying that the agency did not believe that the private server in Donald Trump’s Trump Tower which was connected to a Russian bank had any nefarious purpose, the FBI’s counter-intelligence arm, sources say, re-drew an earlier FISA court request around possible financial and banking offenses related to the server. The first request, which, sources say, named Trump, was denied back in June, but the second was drawn more narrowly and was granted in October after evidence was presented of a server, possibly related to the Trump campaign, and its alleged links to two banks; SVB Bank and Russia’s Alfa Bank….

  53. Larry Ledwick says:

    A chuckle from twitter:
    Mike Cernovich
    🇺🇸 Retweeted
    Ron Futrell‏Verified account @RonFutrell 1 day ago

    My wife asked why I carried a gun around the house. I told her:fear of CIA. She Laughed, I laughed, the Amazon Echo Laughed. I shot the Echo

  54. R. de Haan says:

    @ E.M.Smith,
    Love the Gestapo Cruisers, especially the S-Class with the V8 engines. I regulary drive a 1987 380 SEL that still runs and looks like new. The daily drivers however a V-70 and an SLK-230, both cars build at the end of the past century take the mother load of annual milage and have been completely amortisized now. Won’t buy any new cars though but looking for a used AMG Shooting Star if the price is right to replace the V-70.

    As for car computers, it has been a big trend to install the Nexus 7 that you buy second hand at ebay for some pocket change into cars as a low cost music center, a navigator, a back up camera monitor etc. See youtube for hundreds of video’s about the subject.

    As for chinese phones I’m not worried at all about spyware. In fact I anticipate that it is soaked in spyware. They don’t know me and they never will and if they read out my phones for half a year they don’t want to know me as they burst into tears. I really think there is no difference between having a chinese phone than it is to have an iPhone, Japanese/Korean product like the spy camera speech recording software they put in the Samsung flat screen televisions or a nice new server from Dell packed with NSA spyware. I found out the ZTE conglamorate, Yes, the same company that was fined 1.5 billion last week because they breached the Trade Embargo with Iran, has put a special EU Firmware on my phones. I know I buy these products from total crooks and I am sure the EU too has negotiated a back door to the system. However, I think that after I have rooted the device and download all the fresh installed Apps and a new operating system operated from the SD card there isn’t much risk left.
    What play in the back ground is the Chinese phonemaker (Huaway) that was accused of selling phones in the US with spyware in 2007 and retreated from the market to keep relations stable but they had to deal with considerable costs. while denying any of the acquisations.

    Anyhow these freaking phones do make life easy and save me a lot of time, effort and costs.
    I wouldn’t like to live without those suckers.

  55. hunter says:

    You do realize that a significant amount of the tools used to protect us and gather Intel on enemies has been lost now. What else has the leaky irresponsible Obama legacy left us exposed to?

  56. jim2 says:

    hunter – if those tools were used only against enemies of the US i might be more upset. But since there are no protections for US citizens, I’m kind of OK with it.

  57. E.M.Smith says:


    That’s just creepy…


    Protect us, or enslave us? That is the question… I prefer not to lose my privacy due to a desire for lazy security. Let Americans concealed carry as the constitution says we all can, and I’d be much less worried about any and all risks. Some nutcase pulls out something and starts shouting jihadi stuff in a bar in Orlando, he gets 50 guns pointed back at him ‘right quick’ and about 50 fewer people dead…

    So yeah, we can all be issued transparent clothing and have all our financial and personal mail and email published daily and be much “safer”…

    @R. de Hann:

    I’m likely going to build a phone (mostly for the fun of it) out of an SBC. A tiny bit more secure than your approach (not enough to matter most likely) and you use a GSM sim card from your burner phone to activate it… There’s one made from a Raspberry Pi, but I’ll likely use a smaller board like the dinky Orange Pi One…

    @M. Simon:

    Sounds about right…


    I’m still having trouble not laughing as I type… the spouse liked it too ;-)

  58. R. de Haan says:

    Can’t listen to those guys for 3 minutes tops…
    Therefore it is difficult for me to grasp that this outlet has evolved into the “New News” now, as Jones has acquired a Whithe House Press Card/License.
    Something tells me we’re in “Those Times” again, times when screaming piggs like Hitler and Mussolini, despite their horrible sounding speeches, managed to capture the fascination of millions.

    Churchill’s speaches I can listen to because they were well written and to the point just as I dig the many books he wrote.

    Still wonder what would have happened if Churchill would have stood in the shoes of Hitler, visa versa.

    The 2e World War probably wouldn’t have taken place, just like the Cold War

    Anyhow, I simply can’t stand the sound of screaming pigs.

  59. LG says:

    Might as well post these updates to the FISA-TRUMP-TOWER story here :

    Sara Carter, the author, on fox last night:

  60. Gail Combs says:

    R. de Haan,
    Remember most can not stand listening to Jones because he is so hyper and talks over his guests, however his reporters esp Paul Joseph Watson are popular. Watson is very popular with the under thirty crowd.

    Jones draw is that he was the ONLY non-progressive controlled news for years. Like any news source you have to have your brain engaged while listening.

    Stefan Molyneux, Mike Cernovich, Lionel Nation, David Seaman (ex-Huffington Post) George Webb and others I can not remember the names of are popular too. There is one guy who uses a classic Greek? name and a Greek? statue that is worth listening to. I think he is English.

    AHHHhhh found him. He is Sargon of Akkad he has a vid up on the last Wiki Leak (I can see it until after Hubby gets off his computer):

    (The Akkadian Empire was the first ancient Semitic-speaking empire of Mesopotamia so I was off by several centuries….)

  61. Zeke says:

    Link from wikileaks:

    “As part of the release, the organization posted to Twitter a password for “Vault 7” that read as follows: “SplinterItIntoAThousandPiecesAndScatterItIntoTheWinds.”

    That password was a subset of words spoken by President John F. Kennedy 54 years ago, only a month before he was assassinated:

    “I will splinter the CIA into a thousand pieces and scatter it into the wind,” were his exact words, according to a Kennedy administration official who spoke with The New York Times for a report published three years after JFK’s death.

    Speaking in a History Channel program several years ago, Samuel Halpern, author of “The Assassination of JFK,” claimed that the threat stemmed from Kennedy’s frustration with the CIA, which he believed was becoming a “state within a state.”

  62. llanfar says:

    @Gail thanks for the heads-up on Lionel Nation and Sargon of Akkad (already subscribe to the others) – I’ll give them a spin…

  63. philjourdan says:

    @LG – thanks for reminding me of something I wanted to post (with your Sara Carter clip). The Wikileaks dump has many apparently asking if the CIA was behind the DNC hacking, and they are the ones that just left the stale Russian programs behind to point a finger! I heard it first this morning with the morning drive talker. And then saw the clip by LG where Hannity basically poses the same question.

    The swamp is getting very interesting!

  64. E.M.Smith says:


    Interesting connection. I didn’t know that. Even more poignant given that it is likely the CIA arranged for Kennedy to be assassinated (in cahoots with the Mafia who provided the actual shooter). The CIA was working closely with the Mafia and had been since W.W.II when “Lucky” assured the ports were orderly and that the Sicilians provided full maps, troop locations, and guides on Allied landing day… in exchange for an exit from prison and return to Sicily. Also overlapped in the “drug war”.

    Little appreciated is that the Valentines Day Massacre was Irish Mafia (like Old Man Kennedy the Rum Runner…) being shot by Italian Mafia for double crossing them, rather like JF Kennedy did to the Italian Mafia in the Bay Of Pigs deal. So these folks “had history”. Then the Cuban Missile Crisis got the CIA thinking this guy was going to start W.W.II and now the “Splinter” quote showing JFK was essentially declaring war on the CIA…

    FWIW, there’ s a guy in (or was in?) a European prison who claims to have been the shooter from the grassy knoll. The one seen by a deaf guy, but who had his testimony discounted since one can’t see well if your ears don’t work?… /sarc;… The guy in prison tells a story that matches the deaf eye witness account of what happened.

    So that quote is an interesting sidebar on the whole thing. I’d not realized it was a war on between JFK and the CIA…

  65. Larry Ledwick says:

    The association between the mob and CIA is also backed by the book “Double Cross” written by Sam Giancana Jr. about his father. It is the only story line that makes sense of all the little odd bits like Oswald’s defection to Russia than coming back etc. etc.

  66. E.M.Smith says:

    Finally got the time to watch the Sara Carter interview. That’s pretty important stuff… and an interesting twist.

    IF the CIA did the DNC hack, and pointed the muddy footprints at Russia, is that to bolster the Hillary Narrative that The Russians Are Working With Trump? But the leaked info sinks her and her party, so were the CIA really bolstering Trump? Seems too strained…

    My sense of it is that many folks know to leave other players “fingerprints” behind… So “who gains”? The NSA would gain by making the CIA look like they fumbled a hack, and likely would enjoy peeing in CIA soup of Hillary / Obama support. Russia would gain by actually having done it (but would not be using old tools nor leaving “fingerprints” behind, IMHO). Israel would gain by getting Trump in and keeping Hillary out, and no love lost with Russia. An “overly moral” agent in either the NSA or CIA would benefit via revenge on the folks pushing them to break the law and corrupt the Agencies (and would want to deflect blame away from them to avoid discovery).

    With any luck, we’ll find out what really happened in a decade or so…

  67. LG says:

    I find Joseph P. Farrell’s treatment most compelling on the JFK assassination.

    Author Joseph P. Farrell takes on the Kennedy assassination and the involvement of Lyndon Baines Johnson and the Texas “machine” that he controlled. Farrell says that a coalescence of interests in the military industrial complex, the CIA, and Lyndon Baines Johnson’s powerful and corrupt political machine in Texas led to the event culminating in the assassination. Without the help of the Dallas police chief and others of the Texas underworld, including Jack Ruby, the Kennedy assassination could not have taken place. Farrell analyzes the data as only he can, and comes to some astonishing conclusions. Topics include: Oswald, the FBI, and the CIA: Hoover’s Concern of a Second Oswald; Oswald and the Anti-Castro Cubans; The Mafia; Hoover, Johnson, and the Mob; The FBI, the Secret Service, Hoover, and Johnson; The CIA and “Murder Incorporated”; Ruby’s Bizarre Behavior; The French Connection and Permindex; Big Oil; The Military; Disturbing Datasets, Doppelgängers, Duplicates and Discrepancies; Two Caskets, Two (or was that Three?) Ambulances, One Body: The Case of David S. Lifton; Two (or is that Three?) Faces of Oswald; Too Many (or Was That Too Few?) Bullets; Too Many Films, with Too Many, or Too Few, Frames; The Dead Witnesses: Jack Zangretti, Maurice Brooks Gatlin, John Garret “Gary” Underhill, Guy F. Bannister, Jr., Mary Pinchot Meyer, Rose Cheramie, Dorothy Mae Killgallen, Congressman Hale Boggs; The Alchemy of the Assassination: Ritual Magic and Murder, Masonic Symbolism, and the Darkest Players in the Death of JFK; LBJ and the Planning of the Texas Trip; LBJ: A Study in Character, Connections, and Cabals; LBJ and the Aftermath: Accessory After the Fact; The Requirements of Coups D’État; more.

  68. Tom Harley says:

    @Gail Combs, speaking of birth certificates, Obama posts the real one on Twitter?

    Trump, right again?

  69. E.M.Smith says:

    Yeah, Johnson was in on it too, IMHO… I’ve heard a lot of the idea of it… and it fits.

  70. Eric Barnes says:

    Looks interesting LG. I favor Richard Sprague’s The Taking of America . Kennedy was more than a bit arrogant and it didn’t help having Joseph fade from the scene.

  71. Zeke says:

    E< says, "the drug war"

    Yes the drug war. I want you to know that I am winning it too. On my knees, I am committed to daily praying for our area, and for God to raise up every one He can use to bust the rings, the dealers, the gangs and the cartels. See Texas Breitbart, warning: graphic.

    I have experienced a minor setback in my war. My house and both cars were broken into, but the criminal got away. It was done at 4AM long after the bars were closed with a nonregistered vehicle. We are now paying for deductibles, because in fact one car was totalled by the event and the other damaged, and the house was badly damaged. You see, we have a meth house in our neighborhood now, along with two others not too far away.

    In the summer, trashy foot traffic comes into our very nice neighborhood. I am often afraid to let my youngsters even take a walk. It is near a body of water and was beautiful and upscale when we moved here; we thought taking walks here would always be safe. I got my fruit trees and big fenced back yard and put in the green house and gazebo. I don't want to leave this place. I hate to have my young ones and dog under house arrest, but I do not know if they are safe. It is sad to worry about letting young people go outside in these days of digital devices, because they do spend there time on computers.

    From one window I sometimes see the young people with backpacks go to these houses. One young man in particular I pray for when he goes by. But over two years he deteriorated drastically, and now he mostly talks to himself and waves his arms as he walks. The person of interest in our break in is actually a transient, who also walks around and talks to himself: his parents are visitors to the meth house, so he is a young second generation casualty.

    As soon as five distant counties legalized pot for our entire state, there were headshops at all major intersections. One in particular is right next to a high school, a church, and play ground, and a malt shop. It used to be that dealers would get a harsher sentence for being close to these places; now it is the first place they go. They were selling K2, chemically similar to pot. There were a bunch of horrible deaths from this drug and they took the advertisements down after that. They had a clown holding a sign for advertising. Also, immediately, there were sports drinks and candy with drugs in them which other states have also reported as being a problem

    So it may seem that I am loosing the drug war and may have to leave this beautiful place. Our house has been hit, so what shall we do? Surrender another middle class neighborhood to criminals? Certainly summers are getting worse and worse. Drug dealers and users fill up the woods with needles and mattresses and the community is expected to clean it up. But maybe I am winning the drug war, because we now have a president who sees the problem, that drug dealers are "poisoning the blood of our youth." And he will build a wall to stop it, and stop the guns flowing from here down there.

    Speaking of poisoning the blood of our youth, there is an epidemic of narcotics use and the city governnents are starting to pass around the hat for more millions more dollars for safe drug houses. Instead of enforcing law and stopping the flow of heroin, they are coming to the homeowners to pay for a place to do the drugs.

    I see the fact that 1 in 8 people in the US use food stamps and assistance as an explosive mix with all of the drugs. I think a little salt water in your meat is a relatively mild problem compared to the tripled rate of drug overdoses in this country. One is an inconvenience, one means death to another youth.

    I believe the manufacturing rate in Mexico was increased dramatically, and that the cartels and dealers were planning on just giving it away this year. For the purpose of getting new customers. They are going to blanket the small towns as well. I have seen needles in places that seemed like farming towns.

    We can bring back jobs to this country, but drug users are not good employees. All the people who have taken up time and training and then failed to do the job and show up at our company were drug users. It certainly cannot be tolerated with heavy machinery and expensive capital. I do not think any one wants semi-trucks with drug users driving them. But perhaps that is why drug interests are promoting self-driving vehicles. Is that because of the drug use? After these leaks from WL, I think people will change their minds about self-driving cars and remote controlled appliances, and Smart meters. It is all vulnerable.

    So on the whole, after thousands of dollars of repairs and prayer, I hope that I can report better success in my drug war. I would like to tell you that they have left our neighborhood and our town, not us — or any one in our neighborhood. I hope to let you know that kids are not in danger of stepping on a needle in our parks. And that they stop poisoning of the blood our youth. So I pray that Pres. Trump will bust those cartels and gangs and rings and dealers, along with any good person God can use to accomplish this.

    Nevertheless, I have not touched on the psychotropics which are being given to children in schools to control their behavior. I am now expected to pay for this other–prescription–drug epidemic with my insurance. I canceled my insurance but my mate just this year put me back on a plan. It is so expensive. I tried not to get mad at the mate for signing me back up. I do not want a plan that covers psych meds or population control drugs or methods. Or any other procedures I do not think are right. Especially psych meds and day after pills for kids. You know, prostitution and crime attend drug use like two other furies. But I think every one knows that. Every one here is well aware of that fact. So I pray for good things and that He will return soon. The Bible says that even after many catastrophes, there are so many people on earth who will "not repent of their thefts, murders, fornication, and drugs." I hope there is enough information here for people to understand that it is time to repent from poisoning the blood of our youth. I explained because I care about you all.

  72. kneel63 says:

    “I’m likely going to build a phone…”


    You realise, of course, that the 3g/LTE module you will need to do so has a CPU and firmware in it… most now also include a JRE so OEMs can build cheap connected devices. No escaping it, ’cause there’s no way you could spend the required resources to roll your own, and guess where most (all?) such modules are made?

    Just sayin’…

  73. David A says:

    Zeke, thanks for the post and making some of the case against legalizing marijuana.

    While my mind is not made up, the fact is that just legalizing it makes most think ‘ well there is nothing really wrong with it”. Unfortunately there is much harm, both physically and pscycologically, for most pot destroys drive and will, and legal or not, is a gateway to other drugs.

  74. E.M.Smith says:


    There are a variety of software defined radios out there. I’ve not investigated all of them but hope there is a secure one. Then again, even a simple SD card has a tiny CPU in it running a minimal Linux (yes, folks have run the OS in a more accessible manner just to show they could…) so yes, it is very hard to avoid all possible “hook points”. Still, the trying is the fun of it …

    I have built radios from piece parts, but it’s been a long time. No idea if it is still reasonable to do it for cell protocols, yet someone did the first one… I also have a nice box of old phones (from before the era of smart phones and phone hacking, when cell phones were modestly new) from which I could harvest a US (or Swedish) made radio module.

    It’s all just a “someday” thing anyway.


    I had a “drug house” about 4 houses down from me for a year or two. Cars would show up at lots of late hours, someone would go in, then not too much later come out. Some would park on the street for a few hours. Often directly across the street from my house (long section with no front doors).

    One night I was getting tired of it and about 10 PM there was a vaguely “muscle car” parked across the street with one guy just sitting in it. I got my Maglight and ‘strolled around the block’ and approached from the passenger rear. Put my light on the guy and asked “What ‘re you doing?”. Well, long story short, he looked a bit pained and fidgeted and I realized he had that “professional in control” general demeanor… and the inside of the car was neat… and he was a bit buff, despite the costume of “jeans and leather jacket”… I’d stepped on an undercover op. LIGHT OUT, I said “You are working, aren’t you?” (Look of semi-relief that he didn’t have to explain along with worry that I’d “made him” so quickly) “Sorry to have bothered you. If you need anything I live in that house (point). Have a nice evening.”

    About 2 months later they had a raid and since then the mystery traffic has been gone and the neighborhood is back to improving.

    The point? Drop a dime on them to your local PD and wait a while… It can work.

    BTW, I think it is important to divide the drugs by class. Meth is just a destroyer. Heroin and related are almost as bad for many folks. (Some folks, like me, don’t seem to find them addictive. I’ve been given opiates post surgery and just stop taking them when the pain is gone, no problem.) Cocaine, in my experience, was essentially the same as a double expresso with a whisky shot. Pleasant and stimulating, but I could get the same as a $100 coke hit from $10 of Irish coffee… but maybe I’m odd metabolically (and no, it wasn’t ‘cheap coke’… other ‘regular users’ were pleased with it…). Then there is MJ. For me, it dulls my memory and motivation long term, and the immediate effect of smoking it is an hour munchy binge followed by falling asleep. Yet I’ve known several other very successful professionals who had no memory or motivation loss and do not “nod-off” after an hour. For some folks, I’ve seen their performance improve as other issues were removed.

    So IMHO one of the best things you could do is to legalize MJ and get those folks out of the same drug house as the pushers for Meth, Opiates, and such.

  75. Larry Ledwick says:

    A short video from “blackpidgeonspeaks” on the wikileaks vault7 dump.
    what is the real story in this release

  76. Jeff says:

    @E.M., Where there’s a parts bin, there’s a way. Brings back memories of Heathkits and Philips (Norelco) EE-8…..

    Here’s a fellow building a processor from off-the-shelf parts:


    And a later article; now it’s headed to the Centre for Computing History

  77. Zeke says:

    @David A and EM Cheif

    You guys made me smile. Thanks for listening and your honest replies.

    Our neighbors have been very kind. One repaired our back fence between a bunch of storms. Our chickens kept coming over so they just fixed it for us. And the other gave us a card and some coffee. They had a brick thrown through the window of their coffee shop and were very sympathetic. So don’t underestimate the power of a good neighbor to keep things working in this old fallen planet. (:

  78. Larry Ledwick says:

    On the cyber security front (which just got much bigger due to the Vault7 release) this item on the state of cyber vulnerability and opposition capabilities in the near future.

  79. Zeke says:

    The way I see it, the C1A Frankf’rt Complex is a base from which the Germans can spy on Americans for the C1A, and the C1A then returns the favor by spying on Europeans.

    Here’s why:
    1. C Intel Ag. cannot legally spy on Americans:
    ” The agency was popularly thought of as the U.S. counterpart of the Soviet KGB (which was dissolved in 1991), though, unlike the KGB, the CIA was forbidden by law (the National Security Act) from conducting intelligence and counterintelligence operations on domestic soil. In contrast, the majority of the KGB’s operations took place within the Soviet Union and against Soviet citizens.”

    2. B N D, Germany’s Intel Ag., is spying on Americans and giving the information to NSA.
    “Today, 1 December 2016, WikiLeaks releases 90 gigabytes of information relating to the German parliamentary inquiry into the surveillance activities of Germany’s foreign intelligence agency Bundesnachrichtendienst (BND) and its cooperation with the United States’ National Security Agency (NSA).”

    I have been further down the road of discovery but maybe another time. And the German Government itself has been inquiring into the activities of the B N D and getting the run around. So naturally some in the elected German Gov’t, and the people — like Americans — are ignorant of the activities of these “state within a state” intel agencies.

  80. E.M.Smith says:


    It’s a very open secret that the British agencies swap favors with the US agencies (exactly which ones seems to be “all of the above”… IMHO) and it seems to me that the rest of the Former British Empire has similar deals, though less obvious.

    The only real question IMHO is “For whom do they work?”. Their own nations? A Supranational Cabal? A Gaggle-Of-Agencies-State-Inside-States? Each for their own agency? etc. etc.


    Just to date myself…

    When in college I had a 64k Memory … of physical cores. About the size of a toaster oven… A guy down the hall bought it from me. He was building his own CPU… out of relays…

    Why? Because he could… I think he was an M.E. and wanted to make a point ;-)

  81. Larry Ledwick says:

    The primary players in that game would be the so called “5 eyes” intelligence agencies.
    Australia, Canada, New Zealand, the United Kingdom and the United States.

    Although some other friendly nations participate in part when it suites their interests, (Germany, France, and Israel) for example.

  82. M Simon says:

    Jeff says:
    10 March 2017 at 4:34 pm

    I was helping build that sort of thing (from parts – TTL) for the FAA back in ’67. I was a tech at the time and didn’t understand computers. I rectified that around ’75 by reading the Intel 8080 manual.

  83. philjourdan says:

    @Larry –

    Although some other friendly nations participate in part when it suites their interests, (Germany, France, and Israel) for example.

    France is truly xenophobic, so I doubt that would work. Germany is so compromised, I would not recommend it. And Israel is going to do it regardless of agreement.

  84. Pingback: Wikileaks CIA Methods dump of 7 March 2017 | The WEDA Coalition

  85. G. Combs says:

    Some interesting videos:
    #1: Styxhexenhammer666 on vault 7

    #2: The Left is No Longer Liberal by Dave Rubin:

    #3: Dave Rubin up on Alex Jones:

    I think some of the libertarian leaning sort of ‘left’ people in the younger generation are getting a clue. Styxhexenhammer and Rubin have swallowed some of the ‘Trump’ is a ‘H!tler’ B.S. where Trump is actually for Rule of Law. A major difference unless of course you are a violent La Raza, Jihadist, Black Bloc or BLM thug enabler.

    Nice to see people with their brains engaged. I find it a tad bit amusing that Rubin seems surprised that those on the ‘Right’ are quite willing to embrace gays and muslims and others who have gone ‘renegade’ where as the ‘Left’ has ZERO tolerance for anyone who actually thinks and therefore are not 100% in lock step with the wisdom handed down from on high.

  86. G. Combs says:

    Sargon of Akkad has the best round-up for the non-techie I have found so far:

  87. Gail Combs says:

    This is hysterical.
    Shia Lebouf is an actor, famous among the younger set for his Disney role. WIKI He was going to fly a HWNDU flag for the entire Trump Admin.

    The 4-chan guys located it and then grabbed it within 36 hours.

    Looks like that site may have some other interesting stories.

  88. Gail Combs says:

    Two more interesting Goldwater articles:
    Twitter censorship:

    About article connecting “the fact that the FISA request to bug Donald Trump occurred after the meeting with Bill Clinton and Attorney General Lynch on the tarmac.” Lynch sign off on the FISA requests…

    The timing has to be verified.

  89. Alexander K says:

    EM, I really appreciate your website. the calibre of the comentary and your excellent moderation.
    Down here in NZ we are starved of intelligent news and comment as our MSM was captured by the timid, the Leftards and the politically-correct years ago.

  90. E.M.Smith says:

    @Alexander K::


    BTW, all I do is require that folks be polite. Basic manners Mum taught me in the 50s. Folks who can’t stand that don’t stay. The insult and firebomb crowd self selects out. That makes my moderation work nearly zero. Other than obvious SPAM, I think I’ve deleted something like one comment a year as an estimate.

    Since instituting the Carping Comments analysis postings, even the one a year has gone to zero.

    IMHO, then quality folks self select to be here as it is polite. Then you have a virtuous feedback loop. Folks can express their opinions, even strongly, as long as issue focussed and not personal attacks to others (“Public Persons” like politicians can be insulted per US law, go figure…)

    All because I don’t care about things like comment numbers or page rank on hits. I’m not about volume. This is where I spend my time, and I just want it to be comfortable. Simple as that.

  91. Power Grab says:

    @ Zeke: Interesting. Just today, our pastor reported that the cops he has been riding with gave him their top 2 prayer requests: (1) Stop the drugs coming to town, and (2) Stop the self-abuse.

  92. Power Grab says:

    @ EM: So what can you tell me about new digital land line devices from Cisco?

    Should I assume that a device with speaker phone capabilities can be remotely turned activated?

  93. E.M.Smith says:

    @Power Grab:

    Inside any IP telephone (one that plugs into a router or connects to the internet, basically anything other than a traditional stupid landline) has inside of it a small computer. Substantially the same as the Raspberry Pi or Orange Pi ( in fact many of those small SBCs are marketed specifically for such uses and only get secondary use by “hobbyists” ). These almost exclusively run some variation of Linux.

    Now Cisco in particular likes to make their own operating systems, however, the first Cisco IOS was indistinguishable from Unix in many ways. After AT&T started suing folks, they made gratuitous changes to the commands to show it “wasn’t Unix”… So Cisco MIGHT have a different operating system base than others. I don’t know as I’ve not used one in many years.

    In either case, Agencies will have cracking tools to take over such a system. Once they have control of it, turning on the microphone is nearly trivial.

    Now, we know CISCO was a participant in the PRISM program (and early, they did NOT resist like Apple). So the odds are extremely high that they have a built in backdoor for Agency use. This has also been in existence long enough it will have been discovered by others around the world.

    So, in my opinion as a tech guy who does computer security:

    For 99.9% of folks using an IP phone can use it and never be monitored or have any issues with Agencies. This will be entirely due to lack of interest in them by the Agencies. The Agencies can almost certainly get into and turn on pretty much all IP based phones due to their close work with the telco equipment providers and telco companies.

    One complication: At companies of, oh, 200 or more folks, the IP phones will plug into a “phone switch”. This is itself a larger Unix / Linux machine with special I/O modules that talk to the phones and leased lines from the Telco. A good IT Telephone guy will have that locked down pretty tight and for calls from extension to extension you are likely clean. This also adds a second hurdle between Agencies and using your desktop phone as a monitor (and means you ought to be nice to the Telephone Guy in the I.T. department ;-) Since phone switches are under constant attack, they have a pretty clean and locked down OS on them and most Telephone Guys are semi-paranoid about assuring they don’t get hacked. In those cases you are depending on the race between your Telephone Guy and the Agency Telephone Guy to keep them out. Some I.T. departments just plug it in and turn it on… and some contract that out to a Telco Provider; in which case Agencies can certainly get in (but with some significant effort). Phone switches from PRISM participants (such as AT&T, CISCO, and likely Lucent) will have a convenient “Easy Access” built in for NSA and Friends…

    If you want real privacy, cut power and unplug the RJ-45 jack from the wall. Anything else is just “security by obscurity” and hope that they don’t care about you or your guests. (Early phones had a separate power brick plugged into the wall. Newer phones have POE Power Over Ethernet so it comes from that same RJ-45 as the phone signal.)

    A reasonable rule of thumb is to assume if a device has a speaker or microphone and connects to a network or telco system, it’s hackable and a monitoring device. This is why I now “roll my own” computers and will likely build my own next telephone. So I can put a physical switch in the loop to the microphone and speaker, plus assure power cut.

  94. llanfar says:

    @Power Grab … Facebook – just say no.

  95. Power Grab says:

    @ EM: Thanks for the explanation! I appreciate your thoroughness. :-)

  96. Power Grab says:

    Oh, here’s something that puzzles me: FB created an account using my full name and hometown, but there’s nothing in it. The account I created doesn’t have my middle name or hometown (or birthday, even though they occasionally nag me for more personal details).

    I’d like to know what entity triggered the creation of the other account, but I’m afraid to contact them and bring it up.

  97. Larry Ledwick says:

    Report it as a fake account, happens all the time. Some person, mines your account to get a few details then creates a duplicate account that looks like you then goes around friending others. It is a way to gather personal information that folks post on their face book accounts so they can be tied to other information to do identity theft.

    I have had several friends on my face book account have that happen to them you suddenly get a friend request from someone you are always friends with.

  98. E.M.Smith says:

    There is a reason I do ZERO “social media” (Facebook, Linkedin, etc)… and you’all are discussing it ;-) Risks are very high, you KNOW it is being mined by Agencies and Bad Actors around the globe, the returns are low, you can NOT do the things needed to protect yourself as others are in charge. Just walk away…

  99. LG says:

    “Alexa, Are you connected to the CIA”

    A compilation.

  100. philjourdan says:

    I do Linked-in only – and then only for professional contacts (if I do not know you, I will not accept your link request). Other than work history, there is no personal information there.

    I do not do any of the other stuff for the same reason EM stated.

  101. philjourdan says:

    @LG – ok, forget Skynet. Think back almost 50 years ago. What was HAL told to do?

  102. Larry Ledwick says:

    From a data security point of view I would love to get off Facebook as I recognize the exposure but unfortunately it is the only way to keep in touch with a few people that it is very important that I maintain contact. I do lock it down so that only my friends list can see my posts.

    It also serves another purpose, it also keeps me up to date with some of the lunatic left memes running around. Without facebook I literally would have no clue how crazy a few people I know are. They in a very real sense live in a totally different world than I do – in that respect it has been a huge wake up call that the full spectrum of world views is far far wider than I ever imagined before.

  103. Power Grab says:

    @ Larry Ledwick says:
    13 March 2017 at 3:18 pm

    I don’t know where they got my middle name, though. Or my hometown. I have never used either one on FB. And my name is very vanilla. There are many of me in the world. There are usually 3 or 4 of my name in my hometown, in fact, let alone the world.

  104. jim2 says:

    @R. de Haan says:
    9 March 2017 at 12:26 am

    I noted your comment about rooting your phone. I ASSUME that if you root it, you have complete control and when you install an OS, it’s clean. Is that right?

    Is that correct? I’ve been leary of using the rooting tools found on the internet because I don’t know for sure the answer to that question.

  105. jim2 says:

    A TV show that just ended shows how much social media is a weapon against you if you ever have to bug out. It was fun to watch. If you can, watch it. Very illuminating!

  106. Larry Ledwick says:

    @Power Grab, with our normal internet activity most of us leave a very broad trail even when we think we are being careful. Add in public records searches and for most people it is trivial to get those bits of information for someone skilled in public searching.

    Even just some simple google type searches on your name will often pull up multiple hits which with a little detective work can be narrowed down to give all sorts of info like old addresses, your name with middle initial, and such combined with other meta data like a zip code can effectively nail you down to a specific town.

    For someone into identity theft they for a small fee can run more intrusive searches from one of the background check vendors armed with some bits and pieces from public domain searches and thanks to things like voter registrations, credit reports etc. eventually piece by piece put together full name address, etc.

    I have used this method to chase down relatives for genealogical research and over time was able to get a list of former addresses, schools they went to, sports that they participated in (runners are often listed in results by name age and town), throw in some random participant list from some professional organization or seminar or mention in a news paper article in a home town news paper and you can fit together a lot of info.

  107. Another Ian says:


    “Terrified talk in US national security circles that WikiLeaks is going to publish many CIA or NSA intercepts of Merkel tonight or tomorrow.”

  108. Larry Ledwick says:

    More on facebook and privacy — The Facezam app coming out that allows general public to take a picture of anyone and match them to their facebook profile with about 70% accuracy for unobstructed pictures. It is under review by Facebook to see if it passes their terms of service restrictions.

  109. Zeke says:

    Your pastor sounds like a real keeper (:
    Hope you are doing alright. Last I heard you were going in for a test. Cheers.

  110. LG says:

    VAULT 7, Part Deux.

    And here is the full press release from WikiLeaks:

    Today, March 23rd 2017, WikiLeaks releases Vault 7 “Dark Matter”, which contains documentation for several CIA projects that infect Apple Mac Computer firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA’s Embedded Development Branch (EDB). These documents explain the techniques used by CIA to gain ‘persistence’ on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware.

    Among others, these documents reveal the “Sonic Screwdriver” project which, as explained by the CIA, is a “mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting” allowing an attacker to boot its attack software for example from a USB stick “even when a firmware password is enabled”. The CIA’s “Sonic Screwdriver” infector is stored on the modified firmware of an Apple Thunderbolt-to-Ethernet adapter.

    “DarkSeaSkies” is “an implant that persists in the EFI firmware of an Apple MacBook Air computer” and consists of “DarkMatter”, “SeaPea” and “NightSkies”, respectively EFI, kernel-space and user-space implants.

    Documents on the “Triton” MacOSX malware, its infector “Dark Mallet” and its EFI-persistent version “DerStake” are also included in this release. While the DerStake1.4 manual released today dates to 2013, other Vault 7 documents show that as of 2016 the CIA continues to rely on and update these systems and is working on the production of DerStarke2.0.

    Also included in this release is the manual for the CIA’s “NightSkies 1.2” a “beacon/loader/implant tool” for the Apple iPhone. Noteworthy is that NightSkies had reached 1.2 by 2008, and is expressly designed to be physically installed onto factory fresh iPhones. i.e the CIA has been infecting the iPhone supply chain of its targets since at least 2008.

    While CIA assets are sometimes used to physically infect systems in the custody of a target it is likely that many CIA physical access attacks have infected the targeted organization’s supply chain including by interdicting mail orders and other shipments (opening, infecting, and resending) leaving the United States or otherwise.

  111. E.M.Smith says:


    And people wonder, snicker, and point when I say I think I’ll be building my next phone from scratch…

    The only really surprising thing, to me, out of all of this is that I wasn’t “paranoid” enough…

    I’d projected most of it as possible, and some of it as likely; but the depth and breadth of what is actually in the wild (anyone who thinks this was ONLY known the the CIA needs a bit of clue stick) is breathtaking.

  112. Larry Ledwick says:

    This article likely outs a method used by NSA etc. to expose dark net users.

    In the manner of the old axiom the chain is only as strong as its weakest link, web anonymization is only as anonymous as its most careless user.

    It also is a cautionary tale to anyone using secure browser methods not to use links to the unsecured world wide web resources (or at least use links which are broken so that they must be accessed outside the secure session).

  113. Larry Ledwick says:

    Related to surveillance methods China is well on its way to being 1984 incarnate.

Comments are closed.