That Wikileaks Thing…

conspiracy
Source: GizaDeathStar.com
Dr. Joseph P. Farrell Ph.D.
March 21, 2017

Most readers of this website know that I seldom rely on Wikileaks as a source nor comment on any of its major leaks. Indeed, the organization reached a new high – or, depending on one’s lights, low – during the last American presidential election cycle when leaks began to emerge during the last days of the campaign that were particularly damaging to Darth Hillary. Granted, she didn’t need much help, for the stink of corruption and “suspicious deaths” have followed the Clintons since the Arkancides of the 1970s and 80s’ up to and including the weird “suicide” of Clinton aide Vince Foster and the strange details around the bloody massacre of the Branch Davidians at Waco, the weirdness around the Oklahoma City bombing, the dubious financial activities in Haiti, and so on.  These matters have been covered by other researchers in depth, so there was no need here to comment on them.

But Wikileaks itself has not been much of a subject here, either, though most regular readers here probably suspect that to gain access to the information contained in its “leaks,” it had by the nature of the case to have “inside help,” as it were. This, at least, has been my own suspicion, which is why when I saw the following article shared by Mr. S.D., and read a certain passage within it, that I had to pass it along, together with my daily dose of high octane speculation. The article in question is by Professor Michel Chossudovsky and appears at the website Global Research; the article, you will note, was dated December 13, 2010:

Who is Behind Wikileaks?

The pattern of backers here is intriguing, for one has the usual suspects; Professor Chossudovsky writes:

Wikileaks had also entered into negotiations with several corporate foundations with a view to securing funding. (Wikileaks Leak email exchanges, January 2007):

The linchpin of WikiLeaks’s financial network is Germany’s Wau Holland Foundation. … “We’re registered as a library in Australia, we’re registered as a foundation in France, we’re registered as a newspaper in Sweden,” Mr. Assange said. WikiLeaks has two tax-exempt charitable organizations in the U.S., known as 501C3s, that “act as a front” for the website, he said. He declined to give their names, saying they could “lose some of their grant money because of political sensitivities.”

Mr. Assange said WikiLeaks gets about half its money from modest donations processed by its website, and the other half from “personal contacts,” including “people with some millions who approach us….” (WikiLeaks Keeps Funding Secret, WSJ.com, August 23, 2010)

Acquiring covert funding from intelligence agencies was, according to the email exchanges, also contemplated. (See Wikileaks Leak email exchanges, January 2007)

At the outset in early 2007, Wikileaks acknowledged that the project had been

founded by Chinese dissidents, mathematicians and startup company technologists, from the US, Taiwan, Europe, Australia and South Africa…. [Its advisory board]  includes representatives from expat Russian and Tibetan refugee communities, reporters, a former US intelligence analyst and cryptographers.” (Wikileaks Leak email exchanges, January 2007).  (Emphasis added)

Note that the backers, by Wikileaks’ own admission, includes:

1) Chinese dissidents, mathematicians, and start up company technologies;

2) from the USA, Taiwan, Europe, Australia and South Africa;

3) Expat Russian and Tibetan refugees;

4) Reporters;

5) A former US intelligence analyst;

6) Cryptographers; and

7) “people with some millions who approach us.”

Chossudovsky then notes:

From the outset, Wikileaks’ geopolitical focus on “oppressive regimes” in Eurasia and the Middle East was “appealing” to America’s elites, i.e. it seemingly matched stated US foreign policy objectives. Moreover, the composition of the Wikileaks team (which included Chinese dissidents), not to mention the methodology of “exposing secrets” of foreign governments, were in tune with the practices of US covert operations geared towards triggering “regime change” and fostering “color revolutions” in different parts of the World.

In addition, further on in the article, Chossudovsky notes the ties of Wikileaks to The Economist and to the Rothschild interests:

Wikileaks and The Economist have also entered into what seems to be a contradictory relationship. Wikileaks founder and editor Julian Assange was granted in 2008 The Economist’s New Media Award.

The Economist has a close relationship to Britain’s financial elites. It is an establishment news outlet, which has, on balance, supported Britain’s involvement in the Iraq war. The Economist’s Editor-in-Chief, John Micklethwait was a participant in the June 2010 Bilderberg conference.

The Economist also bears the stamp of the Rothschild family. Sir Evelyn Robert Adrian de Rothschild was chairman of The Economist from 1972 to 1989. His wife Lynn Forester de Rothschild currently sits on The Economist’s board. The Rothschild family also has a sizeable shareholder interest in The Economist. Former Editor of The Economist (1974-86), Andrew Stephen Bower Knight is currently Chairman of the J. Rothschild Capital Management Fund. He is also reported to have been member of the Steering Group (1986) of the Bilderberg.

The broader question is why would Julian Assange receive the support from Britain’s foremost establishment news outfit which has consistently been involved in media disinformation?

Are we not dealing with a case of “manufactured dissent”, whereby the process of supporting and rewarding Wikileaks for its endeavors, becomes a means of controlling and manipulating the Wikileaks project, while at the same time embedding it into the mainstream media.

It is also worth mentioning another important link. Julian Assange’s lawyer Mark Stephens of Finers Stephens Innocent (FSI), a major London elite law firm, happens to be the legal adviser to the Rothschild Waddesdon Trust. While this in itself does prove anything, it should nonetheless be examined in the broader context of Wikileaks’ social and corporate entourage: the NYT, the CFR, The Economist, Time Magazine, Forbes, Finers Stephens Innocent (FSI), etc.

What caught my eye in all of this was the strangeness of these combinations of interests: Western financiers and members of the “oligrachy”, expatriates from Russia and Tibet, Chinese dissidents (including, presumably Taiwanese), South Africa, and so on. Additionally, it is to be noted that the inclusion of intelligence analysts, cryptographers, and mathematicians, would appear to give Wikileaks its own in-house encryption, decryption, and analysis capability, backed by unknown persons with “millions.” Clearly, at one level, one has all the presence of “Mr Globaloney” that could be interpreted to mean Wikileaks has an inside track to that group and, to that extent, represents their interests and agendas. The citations Professor Chossudovsky has provided in his article are alone a gold mine of information and he deserves credit for exposing it.

It’s that pattern of involvement with South Africa, Taiwan, and “Chinese dissidents”, however, that attracted my attention, for in it, one detects another pattern, one associated with the former World Anti-Communist League, which was, not surprisingly, based from much of the period of its operation in Taiwan. That organization has since changed its name, with the collapse of the Soviet Union, to the World League for Freedom and Democracy. Same organization, new name.  If one searches for the organization under its new name, one comes here:

World League for Freedom and Democracy

And scrolling down, one reads this:

In 1978, Roger Pearson became the World Chairman of the WACL. Pearson was described in a Washington Post article as having neo-Nazi associations[1][2][3][4][5][6] and sources report that as a result of an article in the Washington Post in 1978 critical of WACL and alleging extreme right wing politics of Pearson that either he was expelled from WACL or at least was pressured into resigning from his position as World Chairman.[7][8][9]

The U.S. chapter of WACL, the United States Council for World Freedom (USCWF) was founded in 1981 by Major General John K. Singlaub. Singlaub was the former US Chief of Staff of both United Nations and American forces in South Korea, but was relieved in 1977 by U.S. PresidentJimmy Carter after publicly criticizing Carter’s decision to reduce the number of troops on the peninsula. Singlaub became a member of the WACL in 1980, and founded and became president of its U.S. chapter, the United States Council for World Freedom. This branch generated controversy when it supported Nicaraguan guerrillas in the Iran–Contra affair[10] and, in 1981, the USCWF was placed under watch by the Anti-Defamation League, which said that the organization had increasingly become “a point of contact for extremists, racists, and anti-Semites”.[11][12] During the 1980s, the USCWF and WACL conducted a purge of these elements, and invited ADL observers to monitor its conferences;[13] by 1985, the Anti-Defamation League declared itself “satisfied that substantial progress has been made since 1981 in ridding the organization of racists and anti-Semites.”[14]

It is alleged that in the mid-1980s WACL had become a supplier of arms to anti-communist rebel movements in southern Africa, Central America, Afghanistan and the Far East.[15] During the 1980s, the WACL was particularly active in Latin America, notably by aiding the Contra forces in Nicaragua.[16] During this period, WACL was criticized for the presence in the organization of neo-Nazis, war criminals, and people linked to death squads and assassinations.[11] Other allegations have included reports claim that the World League for Freedom and Democracy is responsible for producing what its opponents call “troops of killers”, while ostensibly organizing to provide support for Corazon Aquino from the right-wing in the Philippines[17] and for supporting the Mozambican National Resistance (RENAMO) movement in Mozambique.[18]

The World Anti-Communist League held annual conferences at various locations throughout the world. Numerous groups participated, including the Unification Church of the Rev. Sun Myung Moon. WACL also enjoyed support from many U.S. Congressmen, most notably 2008 presidential nominee Senator John McCain (RAZ),[10][19] who sat on the United States Council for World Freedom (USCWF) Board of Directors in the early 1980s.[20][21] McCain has said previously he resigned from the council in 1984 and asked in 1986 to have his name removed from the group’s letterhead.[22]

In other words, the organization is not only well-connected to the upper echelons of the American political and intelligence establishment, but also connected to the post-war network of Neo-Nazis and their influence over Latin American death squads.

Why should the Taiwanese and therefore, the possible World Anti-Communist League/World League for Freedom and Democracy connection concern us? In his crucial study The Beast Reawakens: Fascism’s Resurgance from Hitler’s Spymasters to Today’s Neo-Nazi Groups and Right-Wing Extremists (Routledge, 2000), Martin A. Lee notes, in an extended footnote on pp. 226-227 the following disturbing series of connections:

On rare occasions, the (Institute for Holocaust Revision) managed to entice mainstream historians, such as Pulitzer Price-winner John Toland, to present papers at its conferences. Ex-CIA agent Victor Marchetti also lecture at an IHR gathering…. Another favorite IHR speaker and collaborator was Issah Nakleh of the World Muslim Congress(WMC). Basied in Pakistan, the WMC was initially headed by the Grand Mufti of Jerusalem, who, like his friend H. Keith Thompson, stood by the Third Reich until his death in 1974. A few years later, the WMC, then headed by Pakistani Dr. Inamullah Kahn, mailed Holocaust-denial literature to every member of the U.S. Congress and the British Parliament…. Dr. Kahn also served as an advisor to the Saudi Arabian royal family, which lavished funds on the WMC. In addition, the Saudi Arabian government retained the services of American neo-Nazi William Grimstead as a Washington lobbyist. Like many European neofascist groups, the WMC adopted a third-position stance toward the superpowers, as demonstrated by this headline from Muslim World: U.S. AND USSR – BOTH SERVE ZIONIST INTERESTS. But Khan tempered his anti-American tirades when the Soviet Union invaded Afghanistan in 1979. Soon the World Muslim Congress began working closely with U.S. intelligence and Pakistani military officials, who were covertly supporting the Afghan mujahideen in their fight against the Soviet-installed regime in Kabul. This effort was strongly endorsed by Dr. Khan, who served for many years as the Pakistani representative of the Nazi-infested World Anti-Communist League, which played an important role in the Reagan administrations “secret war” in the Golden Crescent.(Emphasis added0

Global Crescents and secret wars and Afghanistan imply a covert war for control of drug money coming from that region.

In other words, one is looking at a mouthpiece not just for globalism, but one which could conceivable have deep connections to other global networks: radical Islam and its dubious connection to the Saudis (and again, note that Saudi-Nazi connection), global terrorist networks, and, of course, global fascist networks.

And that should give everyone pause.

See you on the flip side…

Read More At: GizaDeathStar.com
________________________________________________

About Joseph P. Farrell

Joseph P. Farrell has a doctorate in patristics from the University of Oxford, and pursues research in physics, alternative history and science, and “strange stuff”. His book The Giza DeathStar, for which the Giza Community is named, was published in the spring of 2002, and was his first venture into “alternative history and science”.

CIA planned on hacking cars to murder people with “undetectable assassinations”

CIA Spying
Source: NaturalNews.com
Jayson Veley
March 10, 2017

The measure of any successful society is the level of trust that is maintained between those in positions of power and the people. When the government and its various agencies are disciplined and transparent, then the country thrives. On the contrary, when that power is abused and the laws are ignored, the people’s trust, and the country as a whole, collapses.

In America, the people are justifiably growing more and more weary of the government. Secret meetings and backroom deals have practically become commonplace, and corruption has reached unprecedented levels. Take the IRS scandal for example, where the Internal Revenue Service was caught explicitly targeting conservative organizations and denying them tax-exempt status. This was not only a blatant example of corruption and federal overreach, but also a devastating blow to the trust level between the people and the government.

Similarly, in 2013, Edward Snowden famously revealed the unconstitutional spying and surveillance that was taking place within the National Security Agency. At first, the NSA attempted to cover their tracks by telling the public that the data collection only involved phone numbers and email addresses, not the actual content of those emails or phone conversations. It was soon revealed, however, that this was not true.

And so it goes.

In their latest information dump, WikiLeaks has revealed that the CIA was allegedly planning to carry out assassinations by hacking into cars and trucks. (RELATED: Read what a CIA whistleblower said about climate engineering and vaccine damage). The hacking is made possible by utilizing the phone’s geolocation software to gain control over the vehicle’s control system. WikiLeaks claims that the Central Intelligence Agency has been participating in a global hacking initiative involving the United States and European nations.

WikiLeaks alleges that the CIA was “looking at infecting the vehicle control systems used by modern cars and trucks” so that they could carry out secretive and “nearly undetectable assassinations.” They claim that “infected phones can be instructed to send the CIA the user’s geolocation, audio and text communications as well as covertly activate the phone’s camera and microphone.” These phones include both iPhones and Android devices.

After the CIA obtains this information, Wikileaks claims, it could then “bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the ‘smart’ phones that they run on and collecting audio and message traffic before encryption is applied.”

In addition to the hacking of vehicles, WikiLeaks also claims that the Central Intelligence Agency is capable of gaining control over Microsoft Windows users and Smart TVs.

WikiLeaks has dubbed the information stolen from the CIA as “Vault 7,” the contents of which will gradually be revealed to the public over the next few weeks. As you may recall, a similar method was used when WikiLeaks released the information regarding the DNC and John Podesta, Hillary Clinton’s campaign manager. Shockingly, the thousands of pages of information that have already been released account for only 1 percent of the total information inside Vault 7.

In response to all of the information that has already been released and will continue to be released over the coming weeks, the CIA has reportedly stated that it has “no comment” on the matter. Further, the spy agency explained, “The CIA’s mission is to aggressively collect foreign intelligence overseas to protect America from terrorists, hostile nation states and other adversaries. It is CIA’s job to be innovative, cutting-edge, and the first line of defense in protecting this country from enemies abroad. America deserves nothing less.”

There is no telling what will further be revealed about the CIA, but based on what we have already learned from the hacking organization WikiLeaks, much of it will most certainly be damning.

Read More At: NatuarlNews.com

Sources

Mirror.co.uk

Breitbart.com

DailyCaller.com

Spies Tell Lies, Spying Is Lying

Privacy

Source: NoMoreFakeNews.com | JonRappoport.wordpress.com
Jon Rappoport
March 9, 2017

In recent articles, I’ve highlighted items from the latest WikiLeaks data-dump of CIA files. For example:

The CIA’s use of other nations’ hacking tools, in order to give the impression that, when the CIA hacks into secret areas, it looks like other nations did the hacking.

All this is SOP for the CIA and intelligence agencies around the world.

Spies tell lies. A day without lying is a day without joy.

Spies play chess. “Well, when we leak THIS information to the press, they’ll emphasize the source of the leak (of course we know it’s a fake source we’ve chosen). But when we leak THAT information, the press will emphasize the content of the leak—which is what we want them to do in that case.”

Naïve people are shocked that the CIA could have fabricated the whole “Russia hacked the US election” story. But this is what the CIA does. This is another day at the office.

On the other hand, Russian intelligence could have hacked (influenced) the US election. And to put a further twist on it, Russia could have made that move, anticipating that US intelligence would discover it and go public with it. And then Russia would covertly launch a planned campaign to ridicule the CIA for claiming such an “absurdity.”

During the Cold War, several important KGB spies defected to the US. The CIA then proceeded to vet them, to find out whether they were genuine, or were sent here to seed the CIA with disinformation. As you can imagine, the whole business developed severe problems.

For example: “All right, yes, the KGB sent me to America to confuse you. But now I’m telling you the truth. I’m giving you actual secrets. And I want to stay here. I don’t want to go home. If I go home, the KGB will vet me to see whether I actually gave you real secrets…”

CIA: “Maybe we can triple this Russian. He’s now on our side, we think. So we send him back, claiming we couldn’t get anything useful out of him. But now he’s ours. So we give him a bunch of lies to tell his bosses about us, the CIA…”

In the end, nobody on either side knows what’s going on. But they play the game anyway.

The CIA is a reality-creator and a reality-destroyer. They pick and choose what to do in each situation. But it would be folly to imagine Agency people always do brilliant work. They mis-estimate blowback. They fail to handle blowback. They try to pick an outside scapegoat on whom to blame the blowback. They try to limit the blowback by defaming, discrediting, blackmailing, or killing people.

They rewrite history. They change sequences of events. They invent events that never happened. They blame people who don’t even exist. They present themselves as bumblers, to hide their more intelligent operations. They hold forums designed to show their work as superficial information-gathering, as if they were little more than a think-tank. They pretend to cooperate with Congress, while they spy on Congress.

Meanwhile, the press pretends to hold an innocent and respectful view of the CIA, dutifully reporting every piece of information that comes their way from the Agency. “Today, the CIA disclosed…” Disclosed? Or fabricated?

The CIA is perhaps the biggest fake news operation in the world. It exhales fake news as matter of course.

So naturally, it attracts men and women who have a bias in favor of fabricating. “Do…

Read More At: JonRappoport.wordpress.com
_______________________________________________________________

Jon Rappoport

The author of three explosive collections, THE MATRIX REVEALED, EXIT FROM THE MATRIX, and POWER OUTSIDE THE MATRIX, Jon was a candidate for a US Congressional seat in the 29th District of California. He maintains a consulting practice for private clients, the purpose of which is the expansion of personal creative power. Nominated for a Pulitzer Prize, he has worked as an investigative reporter for 30 years, writing articles on politics, medicine, and health for CBS Healthwatch, LA Weekly, Spin Magazine, Stern, and other newspapers and magazines in the US and Europe. Jon has delivered lectures and seminars on global politics, health, logic, and creative power to audiences around the world. You can sign up for his free NoMoreFakeNews emails here or his free OutsideTheRealityMachine emails here.

CIA can steal hacking fingerprints to frame others

Source: RTAmerica
March 7, 2017

WikiLeaks has published what it claims is the largest ever batch of confidential documents on the CIA, revealing the breadth of the agency’s ability to hack smartphones and popular social media messaging apps such as WhatsApp. The agency can hide the fingerprints from its hacking exploits and attribute blame to others, such as Russia and China. Former Pentagon official Michael Maloof joins RT America’s Alex Mihailovich to discuss.

CIA’s Hacking Capabilities Revealed

Source: RTAmerica
March 7, 2017

The CIA has the capacity to hack “smart” devices by turning on microphones, bypass encryption apps like Signal and WhatsApp, and remotely control smart cars, a practice that is reportedly useful for assassinations. WikiLeaks released the information as part of a project called “vault 7.” RT America’s Anya Parampil reports.

WikiLeaks Exposes Purported CIA Cyberhacking Tools

Records show agency able to spy on smartphones, internet TVs

WikiLeaks released thousands of documents and files Tuesday that it said exposed hacking tools the Central Intelligence Agency uses.
Source:WSJ.com
Shane Harris & Paul Sonne
March 7, 2017

WASHINGTON—WikiLeaks released thousands of documents and files Tuesday that it said exposed tools the Central Intelligence Agency uses to hack smartphones, computer operating systems, messenger applications and internet-connected televisions.

The unauthorized disclosure—the first part of which WikiLeaks said consisted of 8,761 documents and files from the CIA’s Center for Cyber Intelligence—confronts President Donald Trump with a threat from the very organization that leaked documents on his opponent, Democrat Hillary Clinton, during the 2016 presidential campaign.

WikiLeaks named the series of files “Vault 7” and called the unauthorized disclosure the “largest ever publication of confidential documents on the agency,” saying it exposed the malware and exploits the agency amassed to hack smartphones and turn some televisions into covert microphones.

A CIA spokesman declined to comment “on the authenticity or content of purported intelligence documents.”

An intelligence source said some of the information does pertain to tools that the CIA uses to hack computers and other devices. This person said disclosing the information would jeopardize ongoing intelligence-gathering operations and the revelations were far more significant than the leaks of Edward Snowden, a former contractor for the National Security Agency who exposed active surveillance programs in 2013.

Mr. Snowden’s leaks revealed names of programs, companies that assist the NSA in surveillance and in some cases the targets of American spying. But the recent leak purports to contain highly technical details about how surveillance is carried out. That would make them far more revealing and useful to an adversary, this person said.

In one sense, Mr. Snowden provided a briefing book on U.S. surveillance, but the CIA leaks could provide the blueprints.

WikiLeaks said in its statement that it was not publishing such information as computer source code that could be used to replicate the tools it claims to have exposed. But the group left open the possibility of publishing those crucial details if “a consensus emerges on the technical and political nature of the CIA’s program and how such ‘weapons’ should [sic] analyzed, disarmed and published.”

Mr. Snowden said in a tweet Tuesday, “Still working through the publication, but what @Wikileaks has here is genuinely a big deal. Looks authentic.”

WikiLeaks said the CIA recently “lost control” of the majority of its hacking arsenal. “This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA,” the site said in a statement. “The archive appears to have been circulating among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.”

The website put out what it called the first installment in a series of planned leaks on Tuesday, calling it “Year Zero.” It said the first installment “introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of ‘zero day’ weaponized exploits against a wide range of U.S. and European company products.”

WikiLeaks said the information on CIA hacking came from an unidentified source who believes the spy agency’s hacking authorities “urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency.”

Much of what WikiLeaks posted Tuesday appeared to be a kind of internal Wikipedia for U.S. cyber-warfare developers to collaborate, post and access information about available hacking tools. In many instances, WikiLeaks has redacted entries that appear to link to specific executable files. The documents show, for example, what capabilities exist to bypass antivirus software, with a different entry for each antivirus company.

The revelations are sure to fuel an ongoing debate over whether intelligence agencies that discover security flaws in popular technology should disclose them, so that the users can defend themselves from hackers, or keep that information secret for use in intelligence operations.

One document claims that the CIA has discovered numerous ways to hack into versions of Apple’s iOS, the mobile operating system used on iPhones. In general, hacking tools for the iPhone are considered especially valuable because the technology is so widely used, experts said. One particular hacking tool appears to remain on an iPhone even after it has been rebooted, which would make it particularly valuable to an intruder.

“These documents, which appear to be authentic, show that the intelligence community has deliberately maintained vulnerabilities in the most common devices used by hundreds of millions of people,” Ben Wizner, the director of the Speech, Privacy, and Technology Project at the American Civil Liberties Union, said in a statement.

“Those vulnerabilities will be exploited not just by our security agencies, but by hackers and governments around the world. The government has the capacity and obligation to help technology companies fix vulnerabilities as soon as they are discovered,” Mr. Wizner said.

This is the latest high-profile leak of information by WikiLeaks, which last fall published emails stolen from Mrs. Clinton’s campaign chairman, John Podesta. U.S. intelligence agencies concluded that Russian government hackers stole those emails and provided them to WikiLeaks.

WikiLeaks said the documents show the CIA’s ability to bypass the encryption of popular messenger applications, including WhatsApp, Signal, Telegram and Confide by hacking the smartphones they run on and collecting audio and message traffic before the applications encrypt the user’s texts.

The site said the documents also show how the CIA developed other mobile hacking technologies, including the ability to activate the camera and microphone of a target’s smartphone covertly and surreptitiously retrieve a target’s geolocation, audio and text communications.

WikiLeaks said one of the documents also shows how the CIA developed a program to hack internet-connected televisions in conjunction with British intelligence. The attacks can place Samsung smart TVs in a fake off mode, so the owner believes the television is switched off, while in reality it is functioning as a bug and recording conversations in the room, WikiLeaks said.

Read More At: WSJ.com