Julie & The Boys: CDC, Merck, Vaccines

FakeNews
Source: NoMoreFakeNews.com | JonRappoport.wordpress.com
Jon Rappoport
April 24, 2017

I write this story now to remind people there are several titanic unresolved issues surrounding research fraud at the CDC, involving the MMR vaccine.

We all know about CDC whistleblower William Thompson, a long-time researcher at the CDC. Thompson still works there.

On August 27, 2014, he released a statement through his lawyer, Rick Morgan, in which he admitted research fraud.

Thompson confessed he and his CDC co-authors cooked the data in a key 2004 study, thereby exonerating the MMR vaccine from any blame in causing autism.

Thompson has never been subpoenaed by Congress to confess what he knows about this case.

But what about Stephen Kraling and Joan Wlochowski?

Who?

They’re two former Merck virologists who filed a qui tam suit against Merck, the manufacturer of the very same MMR vaccine.

The suit claims Merck defrauded the US government by selling the vaccine, under a federal contract, when Merck knew the mumps component of the vaccine was far less effective than advertised.

Of course, Merck disputed this claim, but on September 5th, 2014, Judge Jones, of the Federal District Court for the Eastern District of Pennsylvania, gave the green light for the suit to move forward.

Kraling and Wlochowski assert several levels of Merck fraud:

To achieve a slam-dunk success, Merck tested the effectiveness of the MMR vaccine against the version of the virus in the vaccine, rather than against the natural mumps virus a person would catch in the real world.

Merck irrelevantly and deceptively added animal antibodies to the test results, thus giving the false appearance of strong human immune response to the vaccine.

On top of that, Merck faked the quantitative results of the tests to which the animal antibodies had been added.

Here is where these two Merck whistle blowers and Thompson, the CDC whistle blower, intersect:

In 2004, according to a report I have seen, Thompson wrote a letter to CDC Director, Julie Gerberding, warning her that he was about to present troubling and sensitive data about the MMR vaccine at an upcoming conference on vaccines and autism.

Thompson’s meaning was clear. He had found a connection between the MMR vaccine and autism.

Gerberding never answered his letter, and Thompson’s presentation at that conference was canceled.

Gerberding left the CDC in 2009.

She moved on to become…

The president of Merck Vaccines, the manufacturer of the MMR vaccine.

Major media consider this a non-story, on the level of a can of overflowing garbage on a quiet street corner.

Well, they have to consider it a non-story. If they reported it and pressed it and dug deep into it, they could fracture the pillars of the entire vaccine establishment.

In order to get at the whole truth (or refute any of the charges raised in this article), Congress needs to hold hearings, and competent committee members need to question, at length, William Thompson, the two Merck whistle blowers, and Julie Gerberding.

I say the chance of that happening is close to zero. I’d love to be proven wrong, but I see no sign Congress is willing to step up to the plate.

Too many drug-company lobbyists, too much campaign money from the drug companies, too much fear of going up against entrenched “scientists” who keep claiming all vaccines are safe and effective.

We’ve heard, from sources other than President Trump, that he is going to order a task force to investigate vaccine safety. We’ll see if it happens.

Earlier this year, I wrote about a group of CDC employees who are anonymously chomping at the bit to expose criminal behavior at their agency.

They call themselves the Spider Group—Scientists Preserving Integrity, Diligence and Ethics in Research. They have penned a letter to the CDC’s chief of staff, Carmen S. Villar:

Here is the explosive accusation they make:

“We are a group of scientists at CDC that are very concerned about the current state of ethics at our agency. It appears that our mission is being influenced and shaped by outside parties and rogue interests. It seems that our mission and Congressional intent for our agency is being circumvented by some of our leaders. What concerns us most, is that it is becoming the norm and not the rare exception.”

“Some senior management officials at CDC are clearly aware and even condone these behaviors. Others see it and turn the other way. Some staff are intimidated and pressed to do things they know are not right.”

“We have representatives from across the agency that witness this unacceptable behavior. It occurs at all levels and in all of our respective units. These questionable and unethical practices threaten to undermine our credibility and reputation as a trusted leader in public health.”

Since this initial explosion, I have heard nothing from the Spider Group. Perhaps they are waiting for a signal from President Trump that it is safe to proceed.

There is too much waiting. Whistle blower William Thompson is waiting for Congress to subpoena him. Congress is sitting on its hands, waiting. The two Merck whistle blowers are waiting for their law suit to move forward.

Children’s futures and lives are on the line.

Every day that passes brings new vaccine damage.

Read More At: JonRappoport.wordpress.com
_______________________________________________________________

Jon Rappoport

The author of three explosive collections, THE MATRIX REVEALED, EXIT FROM THE MATRIX, and POWER OUTSIDE THE MATRIX, Jon was a candidate for a US Congressional seat in the 29th District of California. He maintains a consulting practice for private clients, the purpose of which is the expansion of personal creative power. Nominated for a Pulitzer Prize, he has worked as an investigative reporter for 30 years, writing articles on politics, medicine, and health for CBS Healthwatch, LA Weekly, Spin Magazine, Stern, and other newspapers and magazines in the US and Europe. Jon has delivered lectures and seminars on global politics, health, logic, and creative power to audiences around the world. You can sign up for his free NoMoreFakeNews emails here or his free OutsideTheRealityMachine emails here.

WikiLeaks Vault 7 Reveals CIA Can Disguise Hacks, Malware As Russian Or Chinese


Source: ActivistPost.com
Matt Agorist
March 31, 2017

Moments ago, WikiLeaks released another set of data from the Vault 7 CIA documents which, believe it or not, paints an even more ominous picture of the world’s most unscrupulous spy agency. The latest leak consists of 676 source code files from the CIA’s anti-forensic “Marble” framework — which allows the CIA to covertly create malware, trojans, and hacking attacks — while attributing them to foreign entities.

With each release from these Vault 7 leaks, it becomes more apparent that everything we thought the CIA might get in this 1984-esque world — they already have.

According to WikiLeaks, Marble is able to hide or cloak their virus signature by “by hiding (“obfuscating”) text fragments used in CIA malware from visual inspection. This is the digital equivalent of a specialized CIA tool to place covers over the English language text on U.S. produced weapons systems before giving them to insurgents secretly backed by the CIA.”

Marble is “[D]esigned to allow for flexible and easy-to-use obfuscation” as “string obfuscation algorithms (especially those that are unique) are often used to link malware to a specific developer or development shop.”

Over the course of the last 4 months, the deep state has claimed — without evidence — that Russia has interfered in US elections. With this technology, the CIA could theoretically present the evidence it needs to “prove” Russian meddling.

According to WikiLeaks, this blame game is possible due to the fact that the source code shows that Marble has test examples not just in English but also in Chinese, Russian, Korean, Arabic and Farsi. This would permit a forensic attribution double game, for example by pretending that the spoken language of the malware creator was not American English, but Chinese, but then showing attempts to conceal the use of Chinese, drawing forensic investigators even more strongly to the wrong conclusion, — but there are other possibilities, such as hiding fake error messages.

According to Marble, the CIA could create a virus that would potentially devastate entire systems — and then blame it on anyone they want.

As Leak of Nations reports, in the second batch of ‘Vault 7’ documents, WikiLeaks released a user guide for Sonic Screwdriver – an implant on the Apple Thunderbolt-to-USB converter that allows code to be booted onto an attached device, even if the device is password-protected.

What this means is that the CIA can infect the firmware of Macs at the core of the system with a trojan horse. Having a proverbial ocean of computers to choose from, the CIA could then pick one of those infected computers, launch an attack, use Marble to cover it up and blame it on whomever they wish.

It is no wonder Ubuntu founder Mark Shuttleworth called this “a trojan horse of monumental proportions.”

For now, however, the only one to be caught hacking US elections is the Department of Homeland Security. As the Free Thought Project previously reported, the Department of Homeland Security, under the Obama administration, attempted to hack the Indiana State electoral system nearly 15,000 times.

Prior to the hacks in Indiana, it was the State of Georgia to expose DHS meddling in their elections.

While these…

Read More At: ActivistPost.com

WikiLeaks Reveals “Marble”: Proof CIA Disguises Their Hacks As Russian, Chinese, Arabic…

Source: ZeroHedge.com
March 31, 2017

WikiLeaks’ latest Vault 7 release contains a batch of documents, named ‘Marble’, which detail CIA hacking tactics and how they can misdirect forensic investigators from attributing viruses, trojans and hacking attacks to their agency by inserted code fragments in foreign languages.  The tool was in use as recently as 2016.  Per the WikiLeaks release:

“The source code shows that Marble has test examples not just in English but also in Chinese, Russian, Korean, Arabic and Farsi. This would permit a forensic attribution double game, for example by pretending that the spoken language of the malware creator was not American English, but Chinese, but then showing attempts to conceal the use of Chinese, drawing forensic investigators even more strongly to the wrong conclusion, — but there are other possibilities, such as hiding fake error messages.”

 

The latest release is said to potentially allow for ‘thousands‘ of cyber attacks to be attributed to the CIA which were originally blamed on foreign governments.

WikiLeaks said Marble hides fragments of texts that would allow for the author of the malware to be identified. WikiLeaks stated the technique is the digital equivalent of a specialized CIA tool which disguises English language text on US produced weapons systems before they are provided to insurgents.

 

It’s “designed to allow for flexible and easy-to-use obfuscation” as “string obfuscation algorithms” often link malware to a specific developer, according to the whistleblowing site.

 

The source code released reveals Marble contains test examples in Chinese, Russian, Korean, Arabic and Farsi.

 

“This would permit a forensic attribution double game, for example by pretending that the spoken language of the malware creator was not American English, but Chinese, but then showing attempts to conceal the use of Chinese, drawing forensic investigators even more strongly to the wrong conclusion,” WikiLeaks explains, “But there are other possibilities, such as hiding fake error messages.”

 

The code also contains a ‘deobfuscator’ which allows the CIA text obfuscation to be reversed. “Combined with the revealed obfuscation techniques, a pattern or signature emerges which can assist forensic investigators attribute previous hacking attacks and viruses to the CIA.”

 

Previous Vault7 releases have referred to the CIA’s ability to mask its hacking fingerprints.

 

WikiLeaks claims the latest release will allow for thousands of viruses and hacking attacks to be attributed to the CIA.

And the rabbit hole just got even deeper.

* * *

Full release from WikiLeaks:

Today, March 31st 2017, WikiLeaks releases Vault 7 “Marble” — 676 source code files for the CIA’s secret anti-forensic Marble Framework. Marble is used to hamper forensic investigators and anti-virus companies from attributing viruses, trojans and hacking attacks to the CIA.

Marble does this by hiding (“obfuscating”) text fragments used in CIA malware from visual inspection. This is the digital equivallent of a specalized CIA tool to place covers over the english language text on U.S. produced weapons systems before giving them to insurgents secretly backed by the CIA.

Marble forms part of the CIA’s anti-forensics approach and the CIA’s Core Library of malware code. It is “[D]esigned to allow for flexible and easy-to-use obfuscation” as “string obfuscation algorithms (especially those that are unique) are often used to link malware to a specific developer or development shop.

The Marble source code also includes a deobfuscator to reverse CIA text obfuscation. Combined with the revealed obfuscation techniques, a pattern or signature emerges which can assist forensic investigators attribute previous hacking attacks and viruses to the CIA. Marble was in use at the CIA during 2016. It reached 1.0 in 2015.

The source code shows that Marble has test examples not just in English but also in Chinese, Russian, Korean, Arabic and Farsi. This would permit a forensic attribution double game, for example by pretending that the spoken language of the malware creator was not American English, but Chinese, but then showing attempts to conceal the use of Chinese, drawing forensic investigators even more strongly to the wrong conclusion, — but there are other possibilities, such as hiding fake error messages.

The Marble Framework is used for obfuscation only and does not contain any vulnerabilties or exploits by itself.

Read More At: ZeroHedge..com

Charlotte Iserbyt – The Secret History of Western Education [Full Documentary]

TheBreakaway
Zy Marquiez
March 26, 2017

In the following video, Charlotte Iserbyt speaks at length about the real history of public education and its ties to systemic corruption within the public schooling system.  As a former Senior Policy Adviser for the Office Of Educational Research & Improvement during the Reagan Administration, she was in the heart of the beast, and as so, knew the system well.  Her words should be ruminated upon seriously.  For further research, Charlotte Iserbyt’s book, The Deliberate Dumbing Down Of America, gets at the heart of the matter.

Charlotte Iserbyt also became a whistleblower about the  major technology initiative which would control curriculum in America’s classrooms.

While working there she discovered a long term strategic plan by the tax exempt foundations to transform America from a nation of rugged individualists and problem solvers to a country of servile, brainwashed minions who simply regurgitate whatever they’re told.

This is a must see for anyone who wants to truly know why the education system is deliberately crafted to produce human drones with no critical thinking whose only skills are to be subservient, trust authority and follow orders.

Government Whistleblower Charlotte Iserbyt Speaks At Length About Systemic Corruption Within Public Schooling

TheBreakaway
Zy Marquiez
March 26, 2017

In the video below, Charlotte Iserbyt  speaks at length about the systemic corruption within the public schooling system.  As a former Senior Policy Adviser for the Office Of Educational Research & Improvement during the Reagan Administration, she was in the heart of the beast, and as so, knew the system well.  Her words should be ruminated upon seriously.  For further research, Charlotte Iserbyt’s book, The Deliberate Dumbing Down Of America, gets tat the heart of the matter.

Charlotte Iserbyt also became a whistleblower about the  major technology initiative which would control curriculum in America’s classrooms.

That Wikileaks Thing…

conspiracy
Source: GizaDeathStar.com
Dr. Joseph P. Farrell Ph.D.
March 21, 2017

Most readers of this website know that I seldom rely on Wikileaks as a source nor comment on any of its major leaks. Indeed, the organization reached a new high – or, depending on one’s lights, low – during the last American presidential election cycle when leaks began to emerge during the last days of the campaign that were particularly damaging to Darth Hillary. Granted, she didn’t need much help, for the stink of corruption and “suspicious deaths” have followed the Clintons since the Arkancides of the 1970s and 80s’ up to and including the weird “suicide” of Clinton aide Vince Foster and the strange details around the bloody massacre of the Branch Davidians at Waco, the weirdness around the Oklahoma City bombing, the dubious financial activities in Haiti, and so on.  These matters have been covered by other researchers in depth, so there was no need here to comment on them.

But Wikileaks itself has not been much of a subject here, either, though most regular readers here probably suspect that to gain access to the information contained in its “leaks,” it had by the nature of the case to have “inside help,” as it were. This, at least, has been my own suspicion, which is why when I saw the following article shared by Mr. S.D., and read a certain passage within it, that I had to pass it along, together with my daily dose of high octane speculation. The article in question is by Professor Michel Chossudovsky and appears at the website Global Research; the article, you will note, was dated December 13, 2010:

Who is Behind Wikileaks?

The pattern of backers here is intriguing, for one has the usual suspects; Professor Chossudovsky writes:

Wikileaks had also entered into negotiations with several corporate foundations with a view to securing funding. (Wikileaks Leak email exchanges, January 2007):

The linchpin of WikiLeaks’s financial network is Germany’s Wau Holland Foundation. … “We’re registered as a library in Australia, we’re registered as a foundation in France, we’re registered as a newspaper in Sweden,” Mr. Assange said. WikiLeaks has two tax-exempt charitable organizations in the U.S., known as 501C3s, that “act as a front” for the website, he said. He declined to give their names, saying they could “lose some of their grant money because of political sensitivities.”

Mr. Assange said WikiLeaks gets about half its money from modest donations processed by its website, and the other half from “personal contacts,” including “people with some millions who approach us….” (WikiLeaks Keeps Funding Secret, WSJ.com, August 23, 2010)

Acquiring covert funding from intelligence agencies was, according to the email exchanges, also contemplated. (See Wikileaks Leak email exchanges, January 2007)

At the outset in early 2007, Wikileaks acknowledged that the project had been

founded by Chinese dissidents, mathematicians and startup company technologists, from the US, Taiwan, Europe, Australia and South Africa…. [Its advisory board]  includes representatives from expat Russian and Tibetan refugee communities, reporters, a former US intelligence analyst and cryptographers.” (Wikileaks Leak email exchanges, January 2007).  (Emphasis added)

Note that the backers, by Wikileaks’ own admission, includes:

1) Chinese dissidents, mathematicians, and start up company technologies;

2) from the USA, Taiwan, Europe, Australia and South Africa;

3) Expat Russian and Tibetan refugees;

4) Reporters;

5) A former US intelligence analyst;

6) Cryptographers; and

7) “people with some millions who approach us.”

Chossudovsky then notes:

From the outset, Wikileaks’ geopolitical focus on “oppressive regimes” in Eurasia and the Middle East was “appealing” to America’s elites, i.e. it seemingly matched stated US foreign policy objectives. Moreover, the composition of the Wikileaks team (which included Chinese dissidents), not to mention the methodology of “exposing secrets” of foreign governments, were in tune with the practices of US covert operations geared towards triggering “regime change” and fostering “color revolutions” in different parts of the World.

In addition, further on in the article, Chossudovsky notes the ties of Wikileaks to The Economist and to the Rothschild interests:

Wikileaks and The Economist have also entered into what seems to be a contradictory relationship. Wikileaks founder and editor Julian Assange was granted in 2008 The Economist’s New Media Award.

The Economist has a close relationship to Britain’s financial elites. It is an establishment news outlet, which has, on balance, supported Britain’s involvement in the Iraq war. The Economist’s Editor-in-Chief, John Micklethwait was a participant in the June 2010 Bilderberg conference.

The Economist also bears the stamp of the Rothschild family. Sir Evelyn Robert Adrian de Rothschild was chairman of The Economist from 1972 to 1989. His wife Lynn Forester de Rothschild currently sits on The Economist’s board. The Rothschild family also has a sizeable shareholder interest in The Economist. Former Editor of The Economist (1974-86), Andrew Stephen Bower Knight is currently Chairman of the J. Rothschild Capital Management Fund. He is also reported to have been member of the Steering Group (1986) of the Bilderberg.

The broader question is why would Julian Assange receive the support from Britain’s foremost establishment news outfit which has consistently been involved in media disinformation?

Are we not dealing with a case of “manufactured dissent”, whereby the process of supporting and rewarding Wikileaks for its endeavors, becomes a means of controlling and manipulating the Wikileaks project, while at the same time embedding it into the mainstream media.

It is also worth mentioning another important link. Julian Assange’s lawyer Mark Stephens of Finers Stephens Innocent (FSI), a major London elite law firm, happens to be the legal adviser to the Rothschild Waddesdon Trust. While this in itself does prove anything, it should nonetheless be examined in the broader context of Wikileaks’ social and corporate entourage: the NYT, the CFR, The Economist, Time Magazine, Forbes, Finers Stephens Innocent (FSI), etc.

What caught my eye in all of this was the strangeness of these combinations of interests: Western financiers and members of the “oligrachy”, expatriates from Russia and Tibet, Chinese dissidents (including, presumably Taiwanese), South Africa, and so on. Additionally, it is to be noted that the inclusion of intelligence analysts, cryptographers, and mathematicians, would appear to give Wikileaks its own in-house encryption, decryption, and analysis capability, backed by unknown persons with “millions.” Clearly, at one level, one has all the presence of “Mr Globaloney” that could be interpreted to mean Wikileaks has an inside track to that group and, to that extent, represents their interests and agendas. The citations Professor Chossudovsky has provided in his article are alone a gold mine of information and he deserves credit for exposing it.

It’s that pattern of involvement with South Africa, Taiwan, and “Chinese dissidents”, however, that attracted my attention, for in it, one detects another pattern, one associated with the former World Anti-Communist League, which was, not surprisingly, based from much of the period of its operation in Taiwan. That organization has since changed its name, with the collapse of the Soviet Union, to the World League for Freedom and Democracy. Same organization, new name.  If one searches for the organization under its new name, one comes here:

World League for Freedom and Democracy

And scrolling down, one reads this:

In 1978, Roger Pearson became the World Chairman of the WACL. Pearson was described in a Washington Post article as having neo-Nazi associations[1][2][3][4][5][6] and sources report that as a result of an article in the Washington Post in 1978 critical of WACL and alleging extreme right wing politics of Pearson that either he was expelled from WACL or at least was pressured into resigning from his position as World Chairman.[7][8][9]

The U.S. chapter of WACL, the United States Council for World Freedom (USCWF) was founded in 1981 by Major General John K. Singlaub. Singlaub was the former US Chief of Staff of both United Nations and American forces in South Korea, but was relieved in 1977 by U.S. PresidentJimmy Carter after publicly criticizing Carter’s decision to reduce the number of troops on the peninsula. Singlaub became a member of the WACL in 1980, and founded and became president of its U.S. chapter, the United States Council for World Freedom. This branch generated controversy when it supported Nicaraguan guerrillas in the Iran–Contra affair[10] and, in 1981, the USCWF was placed under watch by the Anti-Defamation League, which said that the organization had increasingly become “a point of contact for extremists, racists, and anti-Semites”.[11][12] During the 1980s, the USCWF and WACL conducted a purge of these elements, and invited ADL observers to monitor its conferences;[13] by 1985, the Anti-Defamation League declared itself “satisfied that substantial progress has been made since 1981 in ridding the organization of racists and anti-Semites.”[14]

It is alleged that in the mid-1980s WACL had become a supplier of arms to anti-communist rebel movements in southern Africa, Central America, Afghanistan and the Far East.[15] During the 1980s, the WACL was particularly active in Latin America, notably by aiding the Contra forces in Nicaragua.[16] During this period, WACL was criticized for the presence in the organization of neo-Nazis, war criminals, and people linked to death squads and assassinations.[11] Other allegations have included reports claim that the World League for Freedom and Democracy is responsible for producing what its opponents call “troops of killers”, while ostensibly organizing to provide support for Corazon Aquino from the right-wing in the Philippines[17] and for supporting the Mozambican National Resistance (RENAMO) movement in Mozambique.[18]

The World Anti-Communist League held annual conferences at various locations throughout the world. Numerous groups participated, including the Unification Church of the Rev. Sun Myung Moon. WACL also enjoyed support from many U.S. Congressmen, most notably 2008 presidential nominee Senator John McCain (RAZ),[10][19] who sat on the United States Council for World Freedom (USCWF) Board of Directors in the early 1980s.[20][21] McCain has said previously he resigned from the council in 1984 and asked in 1986 to have his name removed from the group’s letterhead.[22]

In other words, the organization is not only well-connected to the upper echelons of the American political and intelligence establishment, but also connected to the post-war network of Neo-Nazis and their influence over Latin American death squads.

Why should the Taiwanese and therefore, the possible World Anti-Communist League/World League for Freedom and Democracy connection concern us? In his crucial study The Beast Reawakens: Fascism’s Resurgance from Hitler’s Spymasters to Today’s Neo-Nazi Groups and Right-Wing Extremists (Routledge, 2000), Martin A. Lee notes, in an extended footnote on pp. 226-227 the following disturbing series of connections:

On rare occasions, the (Institute for Holocaust Revision) managed to entice mainstream historians, such as Pulitzer Price-winner John Toland, to present papers at its conferences. Ex-CIA agent Victor Marchetti also lecture at an IHR gathering…. Another favorite IHR speaker and collaborator was Issah Nakleh of the World Muslim Congress(WMC). Basied in Pakistan, the WMC was initially headed by the Grand Mufti of Jerusalem, who, like his friend H. Keith Thompson, stood by the Third Reich until his death in 1974. A few years later, the WMC, then headed by Pakistani Dr. Inamullah Kahn, mailed Holocaust-denial literature to every member of the U.S. Congress and the British Parliament…. Dr. Kahn also served as an advisor to the Saudi Arabian royal family, which lavished funds on the WMC. In addition, the Saudi Arabian government retained the services of American neo-Nazi William Grimstead as a Washington lobbyist. Like many European neofascist groups, the WMC adopted a third-position stance toward the superpowers, as demonstrated by this headline from Muslim World: U.S. AND USSR – BOTH SERVE ZIONIST INTERESTS. But Khan tempered his anti-American tirades when the Soviet Union invaded Afghanistan in 1979. Soon the World Muslim Congress began working closely with U.S. intelligence and Pakistani military officials, who were covertly supporting the Afghan mujahideen in their fight against the Soviet-installed regime in Kabul. This effort was strongly endorsed by Dr. Khan, who served for many years as the Pakistani representative of the Nazi-infested World Anti-Communist League, which played an important role in the Reagan administrations “secret war” in the Golden Crescent.(Emphasis added0

Global Crescents and secret wars and Afghanistan imply a covert war for control of drug money coming from that region.

In other words, one is looking at a mouthpiece not just for globalism, but one which could conceivable have deep connections to other global networks: radical Islam and its dubious connection to the Saudis (and again, note that Saudi-Nazi connection), global terrorist networks, and, of course, global fascist networks.

And that should give everyone pause.

See you on the flip side…

Read More At: GizaDeathStar.com
________________________________________________

About Joseph P. Farrell

Joseph P. Farrell has a doctorate in patristics from the University of Oxford, and pursues research in physics, alternative history and science, and “strange stuff”. His book The Giza DeathStar, for which the Giza Community is named, was published in the spring of 2002, and was his first venture into “alternative history and science”.

CIA planned on hacking cars to murder people with “undetectable assassinations”

CIA Spying
Source: NaturalNews.com
Jayson Veley
March 10, 2017

The measure of any successful society is the level of trust that is maintained between those in positions of power and the people. When the government and its various agencies are disciplined and transparent, then the country thrives. On the contrary, when that power is abused and the laws are ignored, the people’s trust, and the country as a whole, collapses.

In America, the people are justifiably growing more and more weary of the government. Secret meetings and backroom deals have practically become commonplace, and corruption has reached unprecedented levels. Take the IRS scandal for example, where the Internal Revenue Service was caught explicitly targeting conservative organizations and denying them tax-exempt status. This was not only a blatant example of corruption and federal overreach, but also a devastating blow to the trust level between the people and the government.

Similarly, in 2013, Edward Snowden famously revealed the unconstitutional spying and surveillance that was taking place within the National Security Agency. At first, the NSA attempted to cover their tracks by telling the public that the data collection only involved phone numbers and email addresses, not the actual content of those emails or phone conversations. It was soon revealed, however, that this was not true.

And so it goes.

In their latest information dump, WikiLeaks has revealed that the CIA was allegedly planning to carry out assassinations by hacking into cars and trucks. (RELATED: Read what a CIA whistleblower said about climate engineering and vaccine damage). The hacking is made possible by utilizing the phone’s geolocation software to gain control over the vehicle’s control system. WikiLeaks claims that the Central Intelligence Agency has been participating in a global hacking initiative involving the United States and European nations.

WikiLeaks alleges that the CIA was “looking at infecting the vehicle control systems used by modern cars and trucks” so that they could carry out secretive and “nearly undetectable assassinations.” They claim that “infected phones can be instructed to send the CIA the user’s geolocation, audio and text communications as well as covertly activate the phone’s camera and microphone.” These phones include both iPhones and Android devices.

After the CIA obtains this information, Wikileaks claims, it could then “bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the ‘smart’ phones that they run on and collecting audio and message traffic before encryption is applied.”

In addition to the hacking of vehicles, WikiLeaks also claims that the Central Intelligence Agency is capable of gaining control over Microsoft Windows users and Smart TVs.

WikiLeaks has dubbed the information stolen from the CIA as “Vault 7,” the contents of which will gradually be revealed to the public over the next few weeks. As you may recall, a similar method was used when WikiLeaks released the information regarding the DNC and John Podesta, Hillary Clinton’s campaign manager. Shockingly, the thousands of pages of information that have already been released account for only 1 percent of the total information inside Vault 7.

In response to all of the information that has already been released and will continue to be released over the coming weeks, the CIA has reportedly stated that it has “no comment” on the matter. Further, the spy agency explained, “The CIA’s mission is to aggressively collect foreign intelligence overseas to protect America from terrorists, hostile nation states and other adversaries. It is CIA’s job to be innovative, cutting-edge, and the first line of defense in protecting this country from enemies abroad. America deserves nothing less.”

There is no telling what will further be revealed about the CIA, but based on what we have already learned from the hacking organization WikiLeaks, much of it will most certainly be damning.

Read More At: NatuarlNews.com

Sources

Mirror.co.uk

Breitbart.com

DailyCaller.com