Mon, 20 Mar 2017 19:03 UTC
The Russians have now formally confirmed earlier media reports that following the Israeli air raid on Syria on Friday the Israeli ambassador in Moscow was called in to the Russian Foreign Ministry to be handed a stern lecture and a stiff protest.
Moscow's confirmation of the Russian protest to Israel, and the fact that the Israeli ambassador was summoned to the Russian Foreign Ministry within hours of the raid taking place, shows how seriously the Russians are treating this incident.
What is most interesting - and worrying - about this incident is not whether or not an Israeli aircraft was shot down. The Syrians regularly claim to have shot down Israel aircraft, and the Israelis equally regularly deny this was the case. The Syrians have provided no evidence of any Israeli aircraft being shot down, and it is unlikely one was.
Rather what is worrying about this incident is that the Syrians claim that the air raid targeted Syrian military facilities near Palmyra - deep inside Syria - and that the Syrians were sufficiently concerned about the air strike that they in turn attempted to shoot the Israeli aircraft down whilst they were flying over Israeli territory.
Comment: This is hardly the first Israeli raid on Syria, but hopefully the consequences of this latest incident will make it think long and hard about making any future attacks.
- Israeli warplanes strike Syrian military airport in Damascus
- Itching for a fight: Israeli war planes bomb Syria's army positions in Golan Heights
- Israeli warplanes strike targets in Syria
- Downed IDF aircraft? Syria's SAMs 'send a very special message' to the Israelis
Sun, 19 Mar 2017 13:24 UTC
The US is a rogue state from the point of view of millions of people around the world who suffer death and destruction in the guise of American 'freedom and democracy'. Behind the ruse is greed and a lust for power. Will the ordinary people of world finally see the simple truth behind the noble-sounding rhetoric?
Truth and Shadows
Mon, 13 Mar 2017 00:00 UTC
The questions he posed were well chosen: they could serve as a template for those confronting complex acts of political violence. Were there contradictions and absurdities in the story being promoted in the U.S. media? Who benefitted from the assassination? Were intelligence agencies claiming to know more than they could legitimately know? Was there evidence of foreknowledge of the murder? What was the main ideological clash in powerful U.S. circles and how did Kennedy fit in? Was there a faction that had the capacity and willingness to carry out such an act? And so on. But beneath the questions lay a central, unspoken fact: Castro was able to imagine—as a real possibility and not as mere fantasy—that the story being promoted by the U.S. government and media was radically false. He was able to conceive of the possibility that the killing had not been carried out by a lone gunman on the left sympathetic to Cuba and the Soviet Union, but by powerful, ultra-right forces, including forces internal to the state, in the United States. Because his conceptual framework did not exclude this hypothesis he was able to examine the evidence that favored it. He was able to recognize the links between those wishing to overthrow the Cuban government and take more aggressive action toward the Soviet Union and those wishing to get Kennedy out of the way.
In the immediate wake of the assassination, and after the Warren Commission's report appeared in 1964, few among the elite left leadership in the U.S. shared Castro's imagination. Vincent Salandria, one of key researchers and dissidents, said: "I have experienced from the beginning that the left was most unreceptive to my conception of the assassination."
Comment: Listen to the SOTT Radio Network interview with the author:
The Truth Perspective: Interview with Graeme MacQueen: The 2001 Anthrax Deception and the intimidation of legislatures
Thu, 16 Mar 2017 09:19 UTC
Testing the validity of this assertion requires examination of Western institutions from a holistic rather than fragmentary perspective. This is easier said than done.
There exists a massive amount of near real-time web based information available for us to process daily if we are attempting to keep abreast of world events. This often leaves us diligently evaluating recent events, while lacking the opportunity to step back and assemble these discrete events into a more comprehensible whole.
The assassinations of the entire elite level of progressive leadership in the United States during the 1960s (JFK, Malcolm X (image left), MLK & RFK within a 5 year period).In Europe this includes the later assassinations of Aldo Moro and Olaf Palme.
Following is but a partial list of the crimes of the U.S. empire (with the routine complicity of many Western European governments) over the decades since the end of WWII. It is important to briefly review them as the intersection of these orchestrated criminal actions casts light on the lack of legitimacy of Western governments and institutions:
Wed, 08 Mar 2017 19:56 UTC
A total of 8,761 documents have been published as part of 'Year Zero', the first in a series of leaks the whistleblower organization has dubbed 'Vault 7.' WikiLeaks said that 'Year Zero' revealed details of the CIA's "global covert hacking program," including "weaponized exploits" used against company products including "Apple's iPhone, Google's Android and Microsoft's Windows and even Samsung TVs, which are turned into covert microphones."
WikiLeaks tweeted the leak, which it claims came from a network inside the CIA's Center for Cyber Intelligence in Langley, Virginia.
Comment: More coverage on SOTT:
- 85% of smartphones in the world can be 'weaponized' by CIA
- Your whole life is hacked: Wikileaks reveal on CIA surveillance shows no area of your life is private anymore
- FBI prepares new hunt for WikiLeaks' source
- Tip of the iceberg: Wikileaks CIA data dump accounts for less than one percent of Vault 7documents received
- Twitter reacts to Vault 7 CIA docs - 'So Russian hackers were CIA all along'
- "Genuinely a big deal": Snowden tweets response to WikiLeaks Year Zero
The tech industry is responding.
"The technology built into today's iPhone represents the best data security available to consumers, and we're constantly working to keep it that way," it said.Samsung:
"Our products and software are designed to quickly get security updates into the hands of our customers, with nearly 80% of users running the latest version of our operating system.
"While our initial analysis indicates that many of the issues leaked today were already patched in the latest iOS, we will continue work to rapidly address any identified vulnerabilities.
"We always urge customers to download the latest iOS to make sure they have the most recent security update."
"Protecting consumers' privacy and the security of our devices is a top priority at Samsung," it said.Microsoft:
"We are aware of the report in question and are urgently looking into the matter."
"We are aware of the report and are looking into it," a spokesman from Microsoft said.Google declined to comment.
Peppered throughout the leaks are CIA hackers' disparaging comments about numerous anti-virus products, including Comodo, Kaspersky Lab, Avira, AVG, F-Secure, and Bitdefender - which confirm Snowden's tweet above, that the CIA seems to have identified security flaws and kept them to themselves.
Now tech firms are "scrambling for fixes" in light of the leaks. Router producer Cisco was one of the CIA's primary targets. Fox news seems to be one of the only mainstream news outlets covering the leaks semi-seriously, with Laura Ingraham calling the leaks "really damning if ... true."
After the news that the U.S. consulate in Frankfurt is used as a covert hacking base, Germany's prosecutor now says that if there is enough evidence in Vault 7, an investigation will be launched.
"We will initiate an investigation if we see evidence of concrete criminal acts or specific perpetrators. We're looking at it very carefully," a spokesman for the federal prosecutor's office said, Reuters reported Wednesday.Update: Anonymous "US intelligence and law enforcement officials" have allegedly told Reuters that the CIA was aware of the impending leak since the end of last year, and their investigation is focusing on contractors as the source of the leak:
A German Foreign Ministry spokesman told Reuters that the authenticity of the documents was still to be verified and that Berlin would be in touch with Washington.
The unnamed officials also confirmed that an internal investigation by the agency into the source of the leak is focused primarily on contractors, who the agency believe passed the documents to WikiLeaks.Update (March 9): More recent coverage:
They also stated their belief that the 8,761 documents contained within the current "Year Zero" leak, the first of the "Vault 7" series, appear to be authentic.
WikiLeaks says that the classified information contained in the leaked documents was "lost" by the CIA and subsequently "circulated among former US government hackers and contractors in an unauthorized manner."
One of those individuals is then said to have provided the whistleblowing website with the relevant content.
- CIA sources to Fox News on leaks - "There's heavy s*** coming down"
- Beijing calls on U.S. to stop hacking practices against other countries following Wikileaks Vault 7release
- 'We are looking at George Orwell's 1984' - CIA whistleblowers and former officers on Wikileaks revelations
U.S. cyber security expert Robert Graham said WikiLeaks provided enough detail to recognize some known vulnerabilities.Dennis Kucinich writes for Fox News that Vault 7 is proof that the U.S. is "sliding down the slippery slope toward totalitarianism". (Anti-Trumpers, please note that these leaks cover CIA activity during the Obama administration.)
"One anti-virus researcher has told me that a virus they once suspected came from the Russians or Chinese can now be attributed to the CIA, as it matches the description perfectly to something in the leak," Graham said in a blog post.
In his rescheduled press conference, Assange said that WikiLeaks will give tech companies exclusive access to the hacking tools in order to beef up security. Once the fixes are made, WL will publish more details. Assange revealed that the information came from an "isolated computer" that wasn't connected to Langley's network - an "historic act of devastating incompetence."
CNN asked whether it was legal for the CIA to do this, per US law, provided the hacking techniques are used overseas. In response, Assange referenced the CIA's history of "behaving badly" inside the US as well.Assange also addressed the need for a "Digital Geneva Convention", hinting at WikiLeaks cooperation with the tech community toward that end. Some more highlights:
"It is an unusual time in the United States to see an intelligence agency so heavily involved in domestic politics," Assange said, when asked if the CIA was experiencing turmoil within its ranks.
When questioned about redactions, Assange said 78,000 pieces of information were withheld, consisting of IP addresses of both target and attack machines. The IPs will be investigated and identified before the redaction is removed.
Assange said further material to be released would be recent but would not identify a time from which it came. He said WikiLeaks have more material on the "throwing off" mechanism used by the hacks to cover their traces. Tuesday's leak revealed details of the CIA's ability to hide its own hacking fingerprint and attribute it to others.
Assange said 'Vault 7' contained too much work for WikiLeaks to do on its own. He said the latest leak has a number of exploits of code that it needs to disarm before it can be published, rendering it useless to "cyber mafia." He did not give details on when it would be published.
When asked by ABC if he had ever been paid by either the Russian government or RT he answered "No, but quite interesting to see ABC taking that line." Criticising mainstream media, Assange described it as a "pretty sad question" which tried to divert from the publication of the CIA's documents.
- 'CIA has a history of attacking, not only overseas targets...but a habit of behaving badly inside the United States.'
- Huge problem: CIA can gain access to journalists computers and smartphones to uncover sources.
- Is the CIA interested in you? The interest for the CIA to attack you may not be that high. You may know someone, who knows someone, who works in the French government.
- There cannot be meaningful oversight over US intelligence agencies.
- CIA hacking is done in secret and cannot be regulated. They are archaic and complex process. CIA cannot even control its cyber weapons arsenal. CIA cannot control how its cyber weapons arsenal is used.
- Can you trust that a Dell, Apple or Microsoft computer exported from US is safe from CIA attacks? Obama broke promises to protect tech industry from vulnerabilities.
- German CIA hacker base used to attack targets throughout Europe, Africa and Middle East. It is a massive complex.
- CIA created a number of viruses. HammerDrill sits on a computer and waits to attack via CD-ROM.
- Invite someone into your company to give presentation, CIA has virus to infect via presentation software.
- CIA has even created virus software which is the virus to infect system.
An excerpt from the interview:
Lt. Col. Tony Shaffer: "ATP2829, the so-called Russian tool that we used to hack the DNC. Sean, we did it. Not me, our guys. Former members of NSA, retired intelligence officers use these tools to break in there and get the information out. That's what the Democrats don't want to talk about, because it doesn't fit their narrative."Update (March 11): VP Pence says the administration will use "the full force of the law" to go after the Vault 7 leaker(s), calling the release a "very serious offense" that "comprises" the "security" of the American people. Which just goes to show he's a moron. Trump and his team have the moral high ground when they go after malicious leakers who are interfering in democracy, i.e., the ones who are leaking serious (but relatively mundane) information with the goal of destabilizing the administration. But leaks such as Vault 7 expose actual criminality. It's an act of whistle-blowing that exposes how the security of the American people is already compromised, by the CIA. The administration should be cutting the CIA down, not going after the leakers.
Sean Hannity: "You know that for a fact. You know the Democrats did it, or that former operatives did it using the malware techniques, they put the Russians' fingerprints and they can appear that the Russians...you're telling me...The whole Russian story that the media has been running with for month and months and months, that it was our people that did it, and they just put the fingerprints of the Russians."
Lt. Col. Tony Shaffer: "That's right. I don't have proof, but this is what I have heard."
"The evidence is not that the Russians did it, but that it was a Russian tool."
Ex-CIA officer John Kiriakou has the right idea:
John Kiriakou: I think they [the leaks] probably have come from the CIA contractor or former CIA contractor. And this contractor frankly believes he has evidence of waste, fraud, abuse or illegality - which is the definition of whistleblowing. And that is why he took this information to WikiLeaks.Anti-virus legend John McAfee has likened the CIA's inaction on security holes to not giving sick people antibiotics.
JK: I left the agency in 2004, and my resignation was official in 2005, and I will tell you the truth I don't even recognize the place anymore. When I was in the agency the mission was really quite simple - it was to recruit spies, to steal secrets and then to analyze those secrets and provide the analysis to the policymaker to make the best in foreign policy. Now the CIA is a paramilitary organization, it is a cyber-military organization.
RT: Is this what we have to do to keep the country safe from being hit again?
JK: I don't think so. I think the CIA really should go back to its foundations and do what it does best, and that is to recruit the spies, as I mentioned. There is probably a place for cyber-security or cyber-hacking or whatever it is, but that place is in the NSA, in the Defense Department. This is not something the CIA should be doing. One of the things that trouble me the most is that we have absolutely no assurances whatsoever that the CIA is not using this technology to target American citizens. They say that they are not, but they say a lot of things that have turned out not to be true.
"The CIA has confirmed that they knew of 'zero day' exploits years in advance of the manufacturers of the software finding out," he said. "Basically, by not fixing those faults it puts customers of Google, Apple, Microsoft and many other American manufacturers at risk, it puts their reputation at risks, and it costs us all billions of dollars."The Russian Foreign Ministry has urged the CIA to provide a detailed, transparent response:
"Seriously, aren't we doing the same thing as having a bunch of ill people in our population, and the CIA has a boatload of penicillin, which could cure us, but they are not going to give it to us, because the enemy may get access to it. Do you see the horror of this?" he said.
McAfee believes that with practices like this, the CIA has failed its mandate to protect the American people.
"If John O. Brennan and Michael Hayden, the past CIA directors under Obama, were here, I would like to say: Shame! Shame on you!" he said.
The developer says the world needs a new paradigm on how to deal with cyberweapons, because they are potentially "many times more devastating" than nuclear weapons, but are by nature capable of being used stealthily or fall into the hands of non-government entities.
"We'd really like the security services in Washington to respond fully and openly to the released documents with specific facts, and if this information is confirmed then it poses a great threat to the world and international security," Zakharova said at a briefing in the Russian capital.McAfee's Intel Security tech firm has now released toolkits to detect rogue software:
Moscow "occasionally" receives information about the activities of the American special services, she pointed out. Previously, such reports "were always confirmed, but also there always attempts to retouch this information and remove it from the front pages," Zakharova said. "In any case, almost every time this information was confirmed," the ministry's spokeswoman said.
The [CIA] malware, or 'rootkit', is designed to allow access to parts of a computer where it typically wouldn't be allowed and can hide the existence of other activities.Assange had offered to work with tech firms on these issues. Many Silicon Valley firms apparently prefer the CIA over cooperating with WikiLeaks, however.
According to the leaked data, the CIA created Extensible Firmware Interface (EFI) rootkits to hack into Apple Macbooks. The malicious software can allegedly embed itself in a computer's low-level firmware and runs as the system is booting up. It is also coded to survive system updates, reinstallations, and can restore malware that gets removed.
In response to the WikiLeaks release, Intel Security's Advanced Threat Research team has created a new module for its existing CHIPSEC open-source framework that can detect the rogue EFI. The module can run on Windows, Linux, and macOS.
The Financial Times is reporting that many Silicon Valley firms will not be working with Wikileaks to cover up the CIA's access to their big data.Update: This is rich:
Several tech companies questioned by FT expressed a desire to not cooperate with the whistleblower on the ground of moral or legal barriers of dealing with classified information.
Silicon Valley insiders assume that Assange tried to improve his own reputation through cooperation with tech giants.
FT is reporting that their are several companies that might change their stance and start cooperation with WikiLeaks if more information would be revealed.
In other words, when making a hack look like it was done by a third party: 1) DO leave dates/timestamps that correlate to general foreign (e.g. Russian) core working hours. 2) DO leave data in a binary file that demonstrates foreign (e.g. FSB/GRU) involvement in the creation of use of the binary/tool. 3) DO have data that contains foreign (e.g., Russian) cover terms, compartments, operation code names, and other foreign specific terminology in the binary.
Gee, sounds just like those Russian hacks!
Update: Former CIA deputy director Mike Morell says the Vault 7 leaks are an inside job:
"This data is not shared outside CIA. It's only inside CIA. It's on CIA's top secret network, which is not connected to any other network. So, this has to be an inside job," he said.
Thu, 09 Mar 2017 20:03 UTC
"The pair said that if they did not get it immediately, the U.S. financial system would implode within 72 hours; the world's financial system, within three weeks; and that social unrest and political chaos could ensue within the month." (In the end, Bannon notes, it was more like $5 trillion that was required, though no one really knows how much, as there has been no accounting for all these trillions).
"We (the U.S.) have", he continues, "in the wake of the bailouts that ensued, liabilities of $200 trillions, but net assets - including everything - of some $50-60 trillion." (Recall that Bannon is himself a former Goldman Sachs banker).
"We are upside down; the industrial democracies today have a problem we have never had before; we are over-leveraged (we have to go through a massive de-leveraging); and we have built a welfare state which is completely and totally unsupportable.
"And why this is a crisis ... the problem ... is that the numbers have become so esoteric that even the guys on Wall Street, at Goldman Sachs, the guys I work with, and the Treasury guys ... It's so tough to get this together ... Trillion dollar deficits ... etcetera."
Comment: For more on Steve Bannon and the Fourth Turning see:
- The Fourth Turning and Steve Bannon Pt. 1: Why He's Wrong, Even Though He's Right
- The Fourth Turning and Steve Bannon Pt. 2: Happiness, Hedonism, Horror - Repeat
- The Fourth Turning and Steve Bannon Pt. 3: Implications for Hysterica-America
Ex-Kissinger State Dept official Steve Pieczenik: You are witnessing a counter-coup assisted by Julian Assange
Tue, 01 Nov 2016 22:04 UTC
Comment: Though the following was published last November, it serves as a useful indication of the caliber of government insiders who support Trump and would like to see the Clinton/Obama cabal served with justice.
Dr. Steve Pieczenik, MD, PhD, Deputy Assistant Secretary of State under Henry Kissinger and so much more, is a VERY legit sounding individual who claims to be deeply and actively tied to the intelligence community.
Pieczenik was Deputy Assistant Secretary of State under Henry Kissinger, Cyrus Vance and James Baker. His expertise includes foreign policy, international crisis management and psychological warfare. He served the presidential administrations of Gerald Ford, Jimmy Carter, Ronald Reagan and George H.W. Bush in the capacity of deputy assistant secretary.Pieczenik has a message for all of us. For the purposes of painting the most accurate picture, he also believes 9/11 was an inside job, and that the killing of Bin Laden was a hoax. Anyone who shared these opinions has been ridiculed ad nauseam, however recent revelations have blurred the lines between conspiracy theory and reality. Most of us have been performing dizzying mental gymnastics through the the shock and awe of bombshells that have blown the lid off what we thought we knew about government, so perhaps revisiting old "conspiracy theories" is worth consideration.
These videos are the first two in a series from Pieczenik today detailing exactly what in the hell is going on with the Clintons, the FBI, and Julian Assange.
Sat, 04 Mar 2017 00:00 UTC
At no time in our prior history has anything so openly subversive and treacherously treasonous ever been perpetrated on the United States of America before... the closest being the covert conspiracy singlehandedly thwarted by America's military hero General Smedley Butler in 1934, when a band of elitist bankster traitors attempted a coup d'état against the FDR administration. The all-too-familiar divide and conquer strategy is once again the globalist go-to Modus Operandi, being implemented through multi-prong assaults waging an open insurrection war against the Trump administration in order to successfully execute a coup committed by traitors out to take down America as their latest banana republic.
Aluminum adjuvant, cytokines, brain inflammation, autism: Did China discover the missing piece of the autism puzzle?
Healthcare in America
Wed, 22 Feb 2017 17:57 UTC
When Caltech scientist Dr. Paul Patterson passed away in 2014, I had little appreciation that he had triggered a chain of events over the course of his career that may now provide a clear and unambiguous explanation of how and why my son developed autism back in 2004. Knowing exactly how my son's autism was caused is incredibly important to my wife and I, because the more information we have about causation, the more chance we have to do something about it, and perhaps recover my son from an affliction now impacting 1 in 48 American kids.
What you're about to read is the product of more than two dozen very recent peer-reviewed published scientific studies, with really no original thought by me. I'm a businessman and a father, but what follows is a "grand theory of autism" so complete and well-supported that I think it deserves the attention of every member of the autism community. When the totality of this explanation became clear to me, not only did my jaw hit the floor, but I was immediately consumed with thoughts about how this clear explanation might impact the way we treat our son's autism, and I hope it does the same for you and perhaps your doctor as well. What I'm certain of is that this "grand theory" needs to be heavily debated, and I hope by putting it in the public realm I help move it along that path. (I'm indebted to an anonymous scientist who runs a website called Vaccine Papers, where many of these insights came from. I will quote VP throughout this piece, referring to VP as "VP." I highly recommend you read the totality of his website, where the explanations are far more scientific than what you will read here.)
21st Century Wire
Fri, 24 Feb 2017 21:01 UTC
"A Syrian cinematographer up for an Academy Award Sunday night has been reportedly barred from entering the U.S. over the finding of "derogatory information" - a vague term that can mean anything from a simple passport irregularity to terror connections.
Khaled Khateeb, 21, who worked on the Netflix documentary "White Helmets," was scheduled to arrive in California on Saturday.
He was issued a visa to attend the awards show, however the Associated Press' internal U.S. government correspondence reported that Turkish authorities detained him this week."