For a quite a while now, Western media sources have been engaged in a sort of a competition, striving to publish as many articles about so-called Russian hackers as they possibly could, while complaining about the alleged damage those unseen hackers inflicted upon the US-style democracy.
Just recently, The Washington Post would feature a propaganda article about Russia’s push towards the control of cyberspace. And what else could one expect from a media source that is being sponsored by the CIA, if various reports across the net are to be trusted. A casual reader would be bewildered by the sheer amount of article published by this media source that are aimed at triggering anti-Russian hysteria in the US. It’s curious that the above mentioned opinion peace mentions the CIA a total of 19 times, while forgetting to mention that the sole owner of the Washington Post received a total of 600 million dollars from the CIA. Under these circumstances, you won’t find a lot of facts on the pages of this propaganda mouthpiece, there’s speculations, quotes of unnamed “informed sources” and that’s pretty much it.
With the use of such pocket journals Washington has been trying to motivate Europe into starting a sort of a crusade against Russia, even though this crusade would directly contradict Brussels’ best interests. However, it’s pretty clear that the main purpose of this latest information war is an attempt to hide the extent of control that the CIA exercises over the web.
The CIA was founded some 70 years ago, and ever since 2001 it has been enjoying political and budgetary advantages over its competitor – the NSA, due to the fact that it hasn’t just created the notorious fleet of unmanned murderous vehicles, but has also assembled an impressive army of hackers.
Over the course of its history, the CIA has been engaged in political assassinations, coups d’etats, drug trafficking, arms smuggling, bribery and other criminal acts. If anyone still wonders is there any real conspiracies in this world, he should seek no further as all of the activities that the CIA has been engaged in are conspiracies against the people of the United States and the peoples of the whole world. That’s the position of Norwegian Steigan.no, that would describe the CIA as a criminal organization, since pretty much everything that this agency does is illegal. Therefore, the US government and pro-government media that are connected with this agency are complied to uphold utmost secrecy about its operations. While Western media sources would describe the US as a bastion of peace and democracy, the agency that is supposed to protect this bastion is running all sorts of criminal organizations around the globe. Those sources are pretty manipulative in their attempts to whitewash such “operations”, since they are being sponsored by the same people that pay the CIA.
That’s why the Americans will never see pictures of disfigured bodies of Iraqi, Afghan, Libyan and Syrian children who were murdered in broad daylight by American mercenaries or a wide variety of illegal munitions dropped from US military planes to advance CIA’s secret operations.
Similarly, American media sources keep squiet about the role that the CIA played in establishing total control over the cyberspace. Let’s recall a handful of CIA’s internal documents that were released due to the efforts of the WikiLeaks team. The so-called Vault 7 papers that were released last March contain a total of 8761 files about Langley’s Center for Cyber Intelligence that is engaged in hacking computers, cell phones and TV sets. These reports demonstrate the true scale and direction of the global hacker program of the CIA, and the arsenal of malicious programs and zero day exploits that have been weaponized against a wide range of American and European users, including those who happen to be Apple’s, Google’s, and Microsoft’s faithful customers.
It’s all started with the publication titled Dark Matter, describing CIA’s tactics of hacking and infecting Apple’s devices. Then WikiLeaks would publish additional 676 files stolen from the CIA, the so-called Marble dossier, revealing its extensive capabilities to remain anonymous, while designing its malicious programs in such a way for them to be trackable “back” to Russia or China.
This series of revelations was followed by a release of 27 documents on the CIA Grasshopper program, which is aimed at creating malicious spy-ware “updates” for the Windows operating system.
Finally, almost two months after initial reports, WikiLeaks would release classified documents about the so-called operation Athena, which aims at creating malware that would download itself on a system to copy all of its files remotely. The malware is capable of infecting various versions of Windows and was developed by the CIA in cooperation with Siege Technologies, which is registered in New Hampshire.
WikiLeaks has also published reports on CIA’s Dumbo project, which, through total control of cyberspace, can turn off cameras remotely and damage any records that could compromise infiltration activities of the Physical Access Group.
Dumbo can recognize, monitor and manage systems operated by Windows, while detecing cams and microphones connected by both wire, Bluetooth, or WiFi. A CIA operator can now stop a recording or delete records, leaving no trace that the CIA could be engaged in some sort of illegal activities.
In the WikiLeaks documents of the CIA, there is also a lot of documents about the ability of this intelligence agency to organize hacker attacks to impersonate other groups. In particular, as part of the Umbrage program, the CIA collects and maintains an extensive library of offensive technologies “stolen” from programs written in other countries, including the Russian Federation. With the help of this project, the CIA can not only diversify its attacks, but also attribute them to others, leaving the “fingerprints” of those groups from whom the CIA stole their offensive capabilities. It would also use foreign languages in the coding deliberately as it has been revelead by in the detailed analysis of one of such impersonation attacks that was exposed by the BAE Systems blog.
There’s more that enough documents on the web now to state that the CIA is trying to abuse the cyberspace in every way possible. So maybe it’s time to paraphrase the article mentioned at the very beginning of this piece: “It’s not Russia, but the CIA is gaining control over cyberspace. We should all be worried!”
Valeriy Kulikov, expert politologist, exclusively for the online magazine “New Eastern Outlook.”
Welcome to the Era of Artificial Intelligence and Technological Deceit
Pretty soon, computer wizardry and artificial intelligence will allow video footage to be created that is practically indiscernible from the real deal. Add holographic technology, and soon a person apparently be speaking live on screen and you’d never know it was fake. The ethical ramifications of AI and technology are simply mind-boggling.
WikiLeaks have today released documents from the Vault 7 cache, a group of leaked information which contains details on the CIA Angelfire spyware tool which was developed to facilitate loading and execution of implants targeting computers using Microsoft Windows operating systems.
Electrosensitivity – the Wi – Fi disease.
So you thought people who wear tinfoil hats are crazy conspiracy theorists? Not so fast there, some of them might actually be onto something.While these people are not tinfoil hat wearers either literally or in a metaphorical sense, the measures they take to avoid exposure to electromagnetic radiation (radio – activity) can seem rather paranoid until you know more about them.
Zuckerberg’s zombie corporation just eats anything that gets in its way Facebook founder Mark Zuckerberg believes WhatsApp is worth much more than the $19bn he paid for it last week Mark Zuckerberg has claimed that WhatsApp, the free text messaging app he bought in February 2014, is worth significantly more than the $19bn he paid … Continue reading
Google: Benefactor Of Mankind Or Evil Empire (or buch of idiotic nerds who got lucky?)
They way Google has come to dominate the internet just as the internet has come to dominate our lives can’t all be down to good luck and careful planning can it? As this page develops you will see how sinister forces guided Google to their current position.
Internet Privacy: could Your Online Porn Viewing Details Go Viral
Even if you are using privacy tools is your internet browsing safe. How secret are your financial transactions, are the off colour jokes you share with friends really private, and what about the kind of sites you would never tell your mother you visit? While you are watching porn, who is watching you? Image source: … Continue reading
Shock, Horror! Millennials Safe Space Violated As Facebook Algo Accident Exposes Them To Diverse Ideas
Late last month (August 2016,) the Zuckerbugger’s zoons put an algorithm in charge of the Facebook “trending” feature, to select the most popular topics, articles and keywords on the web in a narrow timeframe and with due respect for the ‘safe space’ of millenials who can be traumatised if they encounter microaggrrrrressions in the form of controversial ideas or unorthodox opinions …
Government Paid Trolls Are Using ‘Psychology-Based Influence Techniques’ in Social Media
Have you ever come across someone on the Internet that you suspected was a paid government troll? Well, there is a very good chance that you were not imagining things. Thanks to Edward Snowden, we now have solid proof that paid government trolls are using “psychology-based influence techniques” on social media websites such as YouTube, Facebook and Twitter.
Zuckerberg reveals Facebook Working On Apps ‘Smarter Than Humans’
In an online Question and Answer session this week Facebook supremo and founding megalomaniacal sociopath Mark Zuckerberg announced that his company is engaged in building AI systems “that are better than humans at our primary senses.”
War On Cash – A Country By Country Guide
More on the global war on cash being waged by ruling elites in parallel with their war on privacy as they try to exert total control over everything.
Obama Crowns Himself Emperor Of The Internet
Barack Obama’s seizing control of the internet by executive fiat is a serious breach of The US Consitution but for the rest of the world is perhaps the clearest idication yet of what the man is all about. Comparisons with Hitler can no longer be dismissed as a conspiracy theory.
Online shills paid to control your perception by spreading propaganda using up to 10 online personas
Libertarian and freethinking bloggers and new media writers are having a great time. For years our efforts to warn people about the opush towards global fascism earned us hate attacks and accusations that we were conspiracy theorists. And now, alomst daily, another of those conspiracy theories is being proved true
War On Cash Begins, It Is Not About Keeping You Or Your Money Safe From Muggers
Government and big busin.ess has been nudging us towards abandoning cash for electronic money for a long time. Now the Frech government has become the first to move towards making cash illegal (because government can’t keep tabs on what you do with your money when cash passes from hand to hand …
Being Evil? Just Another Day At The Office For Google Boss.
Google boss Eric Schmidt has defended Google’s barely legal tax avoidance practices saying Googl;e’s contribution to UK national life is more important than the money they owe us. boycott Google, Big is a good serach engine.
Neuromancers and other neuroscience fiction
n recent years the scientific community have been clamouring to tell us thy are close to mapping the workings of the human brain and understanding the workings of the human mind. now I recall while recovering from a brain haemorrhage fifteen years ago being told by a very good doctor that medical science was only just starting to understand that the brain (a physical organ) and the mind (a mystery) were very different things. And I have neither read nor heard anything since to make me think he was wrong.
Science has for two hundred years dealt with the mystery of human consciousness by conflating the mind with the brain. In spite of a growing hill of evidence that the two are very different things and…