CIA's Dirty Cyber Tricks Exposed: "UMBRAGE" & Potential False Flag Attacks"

Tyler Durden's picture

Via Matthew Vadum of Canada Free Press,

Troubling questions about “Umbrage” and potential false-flag attacks.

The Central Intelligence Agency now can mimic foreign intelligence agencies’ hack attacks by leaving electronic “fingerprints” creating the false impression of a foreign intrusion into computer networks, according to claims accompanying a new WikiLeaks document dump.

In other words, there may not be hard evidence that CIA operatives, say, used cyberspace to create a modern-day Reichstag fire to undermine the Trump administration, but it may be the case that the CIA has the technological capabilities to do such a thing, if it were so inclined. This assertion that the CIA can hack computer networks and leave behind convincing evidence that somebody else did it, comes with the release by WikiLeaks of a huge collection of documents – 8,761 items in all – collectively dubbed the “Vault 7” leaks that purport to describe espionage techniques used by the CIA. The Vault 7 collection is said to have come from a former U.S. government hacker or contractor associated with “an isolated, high-security network” within the CIA’s Center for Cyber Intelligence in Langley, Va. The files made public don’t include the actual cyber weapons themselves which WikiLeaks says it will not release for the time being.

This documentary agglomeration covers “the entire hacking capacity of the CIA,” Julian Assange’s WikiLeaks claimed in a press release, and it is only the first in a series of what he calls the “Year Zero” leaks.

The Year Zero label has a decidedly sinister quality to it and may offer clues into what WikiLeaks hopes to accomplish with these new leaks, apparently the most significant and damaging to the U.S. intelligence community since former NSA contractor Edward Snowden handed over thousands of classified U.S. documents to journalists in 2013.

Year Zero was used by the bloodthirsty Khmer Rouge when it seized power in Cambodia in 1975. The term is analogous to Year One of the French Revolutionary calendar, which implied a violent break with the old system and the merciless leveling of existing institutions.

As one online resource states:

The idea behind Year Zero is that all culture and traditions within a society must be completely destroyed or discarded and a new revolutionary culture must replace it, starting from scratch. All history of a nation or people before Year Zero is deemed largely irrelevant, as it will ideally be purged and replaced from the ground up. In Cambodia, so-called New People—teachers, artists, and intellectuals—were especially singled out and executed during the purges accompanying Year Zero.

According to WikiLeaks, “[t]he CIA’s Remote Devices Branch’s UMBRAGE group collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.”

With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from. UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.

If this new information about “Umbrage” is accurate, this means that, as stated above, the CIA could hack people and institutions and then attribute the cyber-attacks to others in what amount to false-flag operations. For example, in order to create the impression that a foreign power favored one political candidate over another, the CIA or unseen rogue elements with access to “Umbrage,” could have hacked into Hillary Clinton’s campaign and the Democratic National Committee and made it appear that the intrusion was carried out by former KGB lieutenant colonel Vladimir Putin’s operatives.

That Russians hacked Clinton and the DNC and gave Trump an unfair advantage in the election is precisely what Democrats allege. Is such a scenario in which U.S. operatives hack one political party to help another at least a little far-fetched?

You bet it is. But given what we’ve learned about the CIA’s anti-Trump shenanigans in recent months, it seems unwise to reflexively rule out the possibility that that’s how things could have gone down. Espionage, after all, is all about deception and covering tracks. Things aren’t what they seem and the motives of those creating an illusion aren’t easily discerned.

On the positive side, “Umbrage,” if it is a real thing, is a powerful innovation in tradecraft and an indication that American cyberwarfare is soaring to dizzying new heights.

On the other hand, combine “Umbrage” with the seemingly invincible false narrative that President Donald Trump is a tool of Russian interests, and plenty of Americans would be willing to believe Trump really does have substantial ties to the Kremlin, something that has not been proven. Even now there is still no publicly available evidence the Trump campaign somehow colluded with the Russian government last year. Sources in newspaper articles are never identified. All that exists is the alleged say-so of faceless CIA spooks and people like former CIA employee and would-be presidential spoiler Evan McMullin whose motives are questionable.

It is hard to know what to believe.

And it opens the door to head-spinning possibilities and far-out theories.

As investigative journalist Jerome Corsi writes of Vault 7 and “Umbrage”:

This revelation yields a “through the looking glass” possibility that the Obama administration obtained [Foreign Intelligence Surveillance Act] permission to conduct electronic surveillance on Russians believed to be coordinating with the Trump campaign based on intelligence the CIA planted to deceive the NSA into thinking there was actual contact between Russian agents and the Trump campaign.

 

Possibly, what the CIA was monitoring was not actual contacts between Russian agents and the Trump campaign, but CIA-created counter-espionage designed to implicate Trump and provide the legal context for the [Department of Justice] to have enough “evidence” to obtain a FISA green-light.

This kind of double-level thinking is enough to give anyone a throbbing headache.

Vault 7 also includes eye-opening developments worthy of James Bond 007 and Q Branch.

According to WikiLeaks, the CIA recently “lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized ‘zero day’ exploits, malware remote control systems and associated documentation.” These cyber weapons can be used “against a wide range of U.S. and European company products, [including] Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.”

Something called “Weeping Angel” was created by the CIA’s Embedded Devices Branch to infest smart televisions.

“After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.”

Another technique allows the CIA “to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the ‘smart’ phones that they run on and collecting audio and message traffic before encryption is applied.”

“As of October 2014,” WikiLeaks claims, “the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.”

Despite all this intrigue, it needs to be said that the CIA does some valuable work to advance U.S. interests in the world. It’s a shame that it has come to be dominated by left-wingers over the years.

There is, though, a certain logic to the agency’s slide to port. Not all self-styled do-gooders, after all, land jobs in the nonprofit sector. A leftist member of the intelligence community is fundamentally the same as a community organizer who is convinced he knows what is best for his fellow man.

And left-wingers in all occupations are willing to do whatever it takes to accomplish their objectives.

In the summer 2001 issue of Social Policy magazine, Association of Community Organizations for Reform Now (ACORN) founder Wade Rathke urged his comrades to get in on the ground floor of the cyber-warfare revolution:

Crazy, computer viruses are started by young kids around the world or hackers bored out of their skulls that live right down the street. As union organizers we are still doing 8 point difficulty dumpster dives for alpha lists of employees, when theoretically some good geeks could tap in, load up, and download the whole thing and throw it over our transom window. What a waste of talent when such a huge contribution could be made to the labor movement.

Maybe Rathke missed his calling.

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.
samjam7's picture

The Sheep loves to be led...they won't ask for change, even after this leak! So sad.

Looney's picture

 

Trump to CIA: The beatings will continue, even after morale improves.  ;-)

Looney

Paper Boy's picture
Paper Boy (not verified) Looney Mar 8, 2017 2:09 PM

#Metadata lives matter!

https://localbitcoins.com

freewolf7's picture

How do you arrest the police?

BaBaBouy's picture

YOU CAN Bet The PC MSM, NNBC CBES Not gonna report this ???

manofthenorth's picture

"The very word secrecy is repugnant in a free and open society..."

https://www.youtube.com/watch?v=y8HTr-F-FVM

RIP JFK

froze25's picture

CIA went outside their mandate and their incompetence has made all of us in the US less secure. They have operated domestically and need to be dealt with (dissolved).

Joe Davola's picture

Not sure if it is the PRISM program, but the NSA either has or is trying to develop the means to track all internet traffic.  Without that capability, you'd have to rely on fingerprints and log files to figure out who broke in.  Now it's clear there is the means to plant fingerprints, and I recall a recent article about some spy agency developing the means to edit/remove entries in server log files and not mess up the hashes.  Which renders all "evidence" as a snapshot taken from the entryway of a hall of mirrors.

@froze - if we assume they didn't want this leaked.

Creative_Destruct's picture

Agree with the possibility you raise Joe "...if we assume they didn't want this leaked."

To paraphrase and quote Winston C. : it all has has now become:

"....a riddle, wrapped in a mystery, inside an enigma"

While Churchill originally said this about the Soviet Union, our own government has now been clearly exposed as a maze of deception and riddles .


HowdyDoody's picture

"UMBRAGE if it is a real thing"

Yeah, I know how you feel. I too find it difficult to believe that such a noble enterprise as the CIA would resort to framing others.

Joe Davola's picture

Trump earned the right to be called a great president when he brought Churchill's bust back.  How many frickin' world wars do you have to win to be considered the greatest leader of the 20th century.

froze25's picture

Dissolve them, put their responsibilities under the military.

Dabooda's picture

Just dissolve them.  Fuck all the spies -- the military can't be trusted not to lie is into wars any more than the CIA can.

Government has long been at war with liberty, claiming that we need to give up liberty to be secure.  Now we learn that they have been deliberately sabotaging our security, in order to augment their own power.  Time to shut down the CIA and all the other spy agencies completely.  They're not keeping us free OR secure, and they're doing it deliberately.  Their main function nowadays seems to be lying us into wars against countries that never attacked us, and had no plans to do so.
Chupacabra-322's picture

@ Dabooda,

Took some of yours & adding some of mine.

The National Security Elimination Act of 2017.

The Deep State comprises of the following Criminal Entites as per Kevin Shipp Former CIA Officer Anti-Terrorism Specialist.

CIA
NSA
DOJ
FBI
DHS
DOD
DOS
IRS
EPA
NOAA
NWS

Effective immediately defund, Eliminate & Supeona it's Agents, Officials & Dept. Heads in regard to the Mass Surveillance Global Espionage Spying network & monitoring of a President Elect by aforementioned Agencies & former President Obama, AG Lynch & James Clapper.

The CIA can not only hack into anything -- they can download any "evidence" they want onto your phone or computer.  Child pornography, national secrets, you name it.  Then they can blackmail you, threatening prosecution for whatever crap they have planted, then "found" on your computer.    They can also "spoof" the source of such downloads -- for instance, if they want to "prove" that something on your computer (or Donald Trump's computer) came from a "Russian source"  -- they can spoof the IP address of a Russian source.

The take-away:  no digital evidence the CIA or NSA produces on any subject whatsoever can be trusted.  No digital evidence should be acceptable in any case where the government has an interest, because they have the complete ability to fabricate and implant any evidence on any iphone or computer.  And worse:  they have intentionally created these digital vulnerabilities and pushed them onto the whole world via Microsoft and Google.     Government has long been at war with liberty, claiming that we need to give up liberty to be secure.  Now we learn that they have been deliberately sabotaging our security, in order to augment their own power.  Time to shut down the CIA and all the other spy agencies.  They're not keeping us free OR secure, and they're doing it deliberately.  Their main function nowadays seems to be lying us into wars against countries that never attacked us, and had no plans to do so.

Dabooda's picture

Thief!  LOL!  The last two paragraphs of your post are MY post from another thread, copy and pasted here. I guess they do bear repeating.  And I agree with your additions to the list.

chunga's picture

The timing of Trump's tweet on Obama's spying and the release of Vault 7 is no accident.

froze25's picture

Of coarse its not, Trump finds out what Obama did, bugs out, Obama denies it and goes on the offensive along with the other Dems, now its all tee'd up. Wikileaks get the Go-Ahead from the CIA/Intel Patriots (whitehats) to start releasing the Docs they gave to them. More is coming.

Doom Porn Star's picture

You don't arrest them; you 

You disband the departments via perfectly legal action.

Defund and de-legalize: tell all to turn in their badges, weapons, vehicles, information systems, buildings, etc., etc...

Cancellation of all sanctions and impunities.

We will all be civilians now.

End of 'police'.

freewolf7's picture

I guess that would be by executive order, because the swamp (Congress, military) is compromised.

I woke up's picture

What kind of vehicle did Aubrey McClendon drive again?

BullyBearish's picture

What more proof is needed to show the world that the deep state has turned this beautiful country into the great satan...

blue51's picture

From creating awe inspiring National Parks , to awe inspiring shame .

Bigly's picture

Sandy Hook

Building 7

BOS Marathon 

To start...

The Wizard's picture

If the sheep had to choose between living in the painful truth or living in a comfortable deceptive state, they would choose the latter.

SilverRoofer's picture

you sunk my Battle Ship!

Jim in MN's picture

Trump spanked their Tattle Sheep

algol_dog's picture

I thought Russia was the bad guys ....

Skateboarder's picture

They're the good bad guys, and we're the bad good guys, you see. The bad bad guys got rid of the good good guys, unfortunately, so we're kinda stuck in this situation until the balance is restored.

Mr. Schmilkies's picture

But if the Russians DID want to mess with the US, and they had the same capabilities as the CIA supposedly does, imagine the possibilities of spy vs spy, lies, and the mistaken interpretation of which could lead to all-out war. 

RICKYBIRD's picture

A veritible Boris and Natasha vs. Moose and Squirrel scenario!

PurpleNIRPle's picture
PurpleNIRPle (not verified) Mar 8, 2017 2:09 PM

WIKILEAKS VAULT 7 IS THE PROOF DONALD TRUMP HAS THAT HE WAS WIRETAPPED:

 

https://www.youtube.com/watch?v=RVp1xT78PUY&index=16&list=PLz5bXc3GZwmzP...

IridiumRebel's picture

CIA: Committing Incriminating Acts

jus_lite_reading's picture

The whole fucking world is laughing at us.

alexcojones's picture

Langley is just ONE Tentacle of the ZiOctopus

False Flags just a Fact of Life now. Sandy Hoax, Pulse, Boston Marathon etc.

Next Attack? Readers Respond To The Dead Pool

 

replaceme's picture

This is just what the Russians would want us to believe. I heard so on NPR, so that. NPR.

BullyBearish's picture

N   national 

P   propaganda

R   radio

 

froze25's picture

No, no no, the Russians want NPR to believe that's what they want you to believe.

DirtySanchez's picture

Looks like the Russians are vindicated, and Bozo's, Brennan's, Holder's, and Lynch's half assed and very criminal idea has backfired spectacularly.

These motherfuckers are inherently dangerous and need to see prison upon conviction.

The USA is the world's de facto evil empire.

Everyone sees this excepth the leftists and the establishment.

 

Drain the fucking swamp!

LetThemEatRand's picture

Trump has two choices here:  1) go after the leaker as a criminal and defend the CIA as a hero; or 2) go after the CIA as a criminal and defend the leaker as a hero.  Bets on which course of action he takes?  

At least we have had a situation arise fairly early in his administration by which to judge his true merit as an "outsider" who intends to drain the swamp, or a giant fraud who is going to give us more of the same.

BlindMonkey's picture

IMO he would have to issue pardons for Assange and Snowden to execute the latter strategy.  I hope he does.  His position on Snowden was one of the things I disagree with the God Emperor on.

MrBoompi's picture

The CIA would never hack businesses and hand over the info to the Rockefellers or Rothschilds.  Why?  Because they said so.  And we all know they are the most trustworthy people on the planet.  

koan's picture

CIA or some other agency ran ops on the election not Russia, or perhaps with Russia.
The DHS hacked elections in Georgia, and several other states and now want to be named the sole overseer of US elections.
Most likely so that it's easier to hide their tricks.

Basically they (deep state, MIC, whatever) will not allow any election without their control.

Until people go 1790's France on these fucks they will be their bitches.

redtie's picture

No wonder Obama said cyber teairousum was an act of war....

Akzed's picture

I read weeks ago about Western spooks using Cryllic keyboards for hacking. This almost guarantees that the Russians would be ruled out instantly though, I thought. Then I thought... "Or would they...?"

rbianco3's picture

It's eerily quiet now - regarding the Russian boogeyman.

Latest score... Trump: 2  Deep-State: 2.0

Salsa Verde's picture

Don't stop now, if you got em on the ropes start swinging for a KO, and maybe a quick elbow or three and an uppercut to the crotch.

johnnycanuck's picture

'Canada Free Press', whose entire front page is about American politics with a heavy right wing and pro Trump bent.

http://canadafreepress.com/categories/coverstory

Pretty professional looking site btw, wonder who ponied up the coin for that?  Mercer?  Breitbart shareholders? 

 

Once led by Steve Bannon, Breitbart is owned by family that poured millions into getting Trump elected

http://news.nationalpost.com/news/world/once-led-by-steve-bannon-breitba...

Lurk Skywatcher's picture

Thats interesting.

Can you show us the money behind CNN, MSNBC, Vox et al, and discuss their political leanings?

Or are you only drawing attention to one side of the story to convince yourself of your own righteous indignation?