A CIA Cyber False Flag

Tyler Durden's picture

Authored by Federico Pieraccini via The Strategic Culture Foundation,

New revelations from Wikileaks’ 'Vault 7' leak shed a disturbing light on the safeguarding of privacy. Something already known and largely suspected has now become documented by Wikileaks. It seems evident that the CIA is now a state within a state, an entity out of control that has even arrived at the point of creating its own hacking network in order to avoid the scrutiny of the NSA and other agencies.

Reading the revelations contained in the documents released by WikiLeaks and adding them to those already presented in recent years by Snowden, it now seems evident that the technological aspect regarding espionage is a specialty in which the CIA, as far as we know, excels. Hardware and software vendors that are complicit -- most of which are American, British or Israeli -- give the CIA the opportunity to achieve informational full-spectrum dominance, relegating privacy to extinction. Such a convergence of power, money and technology entails major conflicts of interest, as can be seen in the case of Amazon AWS (Amazon's Cloud Service), cloud provider for the CIA, whose owner, Jeff Bezos, is also the owner of The Washington Post. It is a clear overlap of private interests that conflicts with the theoretical need to declare uncomfortable truths without the need to consider orders numbering in the millions of dollars from clients like the CIA.

While it is just one example, there are thousands more out there. The perverse interplay between media, spy agencies and politicians has compromised the very meaning of the much vaunted democracy of the land of the Stars and Stripes. The constant scandals that are beamed onto our screens now serve the sole purpose of advancing the deep interest of the Washington establishment. In geopolitical terms, it is now more than obvious that the deep state has committed all available means toward sabotaging any dialogue and détente between the United States and Russia. In terms of news, the Wikileaks revelations shed light on the methods used by US intelligence agencies like the CIA to place blame on the Kremlin, or networks associated with it, for the hacking that occurred during the American elections.

Perhaps this is too generous a depiction of matters, given that the general public has yet to see any evidence of the hacking of the DNC servers. In addition to this, we know that the origin of Podesta’s email revelations stem from the loss of a smartphone and the low data-security measures employed by the chairman of Hillary Clinton’s presidential campaign. In general, when the 16 US spy agencies blamed Russia for the hacking of the elections, they were never specific in terms of forensic evidence. Simply put, the media, spies and politicians created false accusations based on the fact that Moscow, together with RT and other media (not directly linked to the Kremlin), finally enjoy a major presence in the mainstream media. The biggest problem for the Washington establishment lies in the revelation of news that is counterproductive to the interests of the deep state. RT, Sputnik, this site and many others have diligently covered and reported to the general public every development concerning the Podesta revelations or the hacking of the DNC.

Now what is revealed through Wikileaks’ publications in Vault 7 is the ability of a subsection of the CIA, known as Umbrage, to use malware, viruses, trojans and other cyber tools for their own geopolitical purposes. The CIA’s Umbrage collects, analyzes and then employs software created variously from foreign security agencies, cyber mafia, private companies, and hackers in general. These revelations become particularly relevant when we consider the consequences of these actions. The main example can be seen in the hacking of the DNC. For now, what we know is that the hacking - if it ever occurred - is of Russian origin. This does not mean at all that the Kremlin directed it. It could actually be very much the opposite, its responsibility falling into the category of a cyber false-flag. One thing is for sure: all 16 US intelligence agencies are of the view that “the Russians did it”. That said, the methods used to hack vulnerabilities cannot be revealed, so as to limit the spread of easily reusable exploits on systems, such as the one that hosted the DNC server. It is a great excuse for avoiding the revelation of any evidence at all.

So, with little information available, independent citizens are left with very little information on which to reliably form an opinion on what happened. There is no evidence, and no evidence will be provided to the media. For politicians and so-called mainstream journalists, this is an acceptable state of affairs. What we are left with instead is blind faith in the 16 spy agencies. The problem for them is that what WikiLeaks revealed with Vault 7 exposes a scenario that looks more likely than not: a cyber false-flag carried out by the Central Intelligence Agency using engineered malware and viruses made in Russia and hypothetically linking them back to hacking networks in Russia. In all likelihood, it looks like the Democrats’ server was hacked by the CIA with the clear objective of leaving Russian fingerprints and obvious traces to be picked up by other US agencies.

In this way, it becomes easier to explain the unique views of all 16 spy agencies. Thus, it is far more likely that the CIA intentionally left fake Russian fingerprints all over the DNC server, thereby misleading other intelligence agencies in promoting the narrative that Russia hacked the DNC server. Of course the objective was to create a false narrative that could immediately be picked up by the media, creating even more hysteria surrounding any rapprochement with Russia.

Diversification of computer systems.

The revelations contained in the Wikileaks vault 7 (less than 1 % of the total data in Wikileaks’ possession has been released to date) have caused a stir, especially by exposing the astonishing complicity between hardware and software manufacturers, often intentionally creating backdoors in their products to allow access by the CIA and NSA. In today’s digital environment, all essential services rely on computer technology and connectivity. These revelations are yet more reason why countries targeted by Washington, like China, Russia, Iran and North Korea, should get rid of European and American products and invest in reducing technological dependence on American products in particular.

The People's Republic has already started down this track, with the replacement of many network devices with local vendors like Huawei in order to avoid the type of interference revealed by Snowden. Russia has been doing the same in terms of software, even laying the groundwork to launch of its own operating system, abandoning American and European systems. In North Korea, this idea was already put into practice years ago and is an excellent tool for deterrence for external interference. In more than one computer security conference, US experts have praised the capabilities of the DPRK to isolate its Internet network from the rest of the world, allowing them to have strong safety mechanisms. Often, the only access route to the DPRK systems are through the People's Republic of China, not the easiest way for the CIA or NSA to infiltrate a protected computer network.

An important aspect of the world in which we live today involves information security, something all nations have to deal with. At the moment, we still live in a world in which the realization of the danger and effect of hacking attacks are not apparent to many. On the other hand, militarily speaking, the diversification and rationalization of critical equipment in terms of networks and operability (smartphones, laptops, etc) has already produced strong growth in non-American and European manufacturers, with the aim of making their systems more secure.

This strengthening of technology also produces deleterious consequences, such as the need for intelligence agencies to be able to prevent the spread of data encryption so as to always enjoy access to any desired information. The birth of the Tor protocol, the deployment of Bitcoin, and apps that are more and more encrypted (although the WikiLeaks documents have shown that the collection of information takes place on the device before the information is encrypted) are all responses to an exponential increase in the invasion of privacy by federal or American government entities.

We live in a world that has an enormous dependence on the Internet and computer technology. The CIA over the years has focused on the ability to make sure vulnerable systems are exploited as well as seeking out major security flaws in consumer products without disclosing this to vendors, thereby taking advantage of these security gaps and leaving all consumers with a potential lack of security. Slowly, thanks to the work and courage of people like Snowden and Assange, the world is beginning to understand how important it is to keep personal data under control and prevent access to it by third parties, especially if they are state actors. In the case of national security, the issue is expanded exponentially by the need to protect key and vital infrastructure, considering how many critical services operate via the Internet and rely on computing devices.

The wars of the future will have a strong technological basis, and it is no coincidence that many armed forces, primarily the Russian and Chinese, have opted in recent years to training troops, and conducting operations, not completely relying on connectivity. No one can deny that in the event of a large-scale conflict, connectivity is far from guaranteed. One of the major goals of competing nations is to penetrate the military security systems of rival nations and be able to disarm the internal networks that operates major systems of defense and attack.

The Wikileaks revelations are yet another confirmation of how important it is to break the technological unipolar moment, if it may be dubbed this way, especially for nations targeted by the United States. Currently Washington dictates the technological capacities of the private and government sectors of Europe and America, steering their development, timing and methods to suit its own interests. It represents a clear disadvantage that the PRC and its allies will inevitably have to redress in the near future in order to achieve full security for its vital infrastructure.

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.
francis scott falseflag's picture

"The 'accepted facts' of the plebeians are the obligatory lies of the patricians."

                                (The Patriotic Noblesse Oblige) 


Let's use the example of the 'Giant Meteor'.  Not the humorous Giant Meteor bumper sticker we've all

chuckled at.  

But the one as big as Callisto, whom every Nobel Lauriate Astronomer swears will hit the Earth this

December 2nd.


Do you tell the people of the planet that they are to be reduced to atoms on that day or do you "Whistle A

Happy Tune" as if nothing is wrong?


Of course, you whistle the tune.


But when these same patricians lie about other countries and their leaders, they are dancing to another


There is nothing patriotic about what they're doing.  Nothing Noble.  Nothing Honorable in the false flag they

are saluting .  

They are ingratiating themselves to the Deep State.  Thinking only about their own skin and the skin of their


They are no better than the Nazis who did NOT hate the Jews, but joined the party to be

safe and to promote their own careers. Schwarzkopf, von Karajan come to mind. 



Why should I not listen to the music of Schwarzkopf and Karajan because they did not flee Germany in the


Aren't they are light years better than the scum bags in our MSM?  Or the Pentagon, like the French General

Staff at the turn of the 20th century who divided France into the Dreyfusards and the anti-Deryfusards, and

tore their country apart. 

There is only one thing that can keep one afloat during the times of the giant meteor and that's a true belief

in one god.  

That's what keeps me going.  God without religion.  


There are those for whom heaven (is for them) and hell (is for everybody else who doesn't believe what they

do) is sine qua non to their belief.  Often they are nice people who didn't trip on acid as much as they should

have and are today broken-recordy. 


I believe in heaven and hell  but without pearly gates and lakes of fire and brimstone.  Sorry.  


















francis scott falseflag's picture

They are succeeding but will Putin stop them?

It's possible.  

No one knows now whether Putin or MOLOCH will win.

What weapons they have and how far each is willing to go.

It's a matter of strategy and bluff, maybe even destiny.


Think of the end of the Super Bowl last month.  

coast1's picture

how many decades ago did eisenhower warn us about this?

uhland62's picture

Sounds like 6 decades. From where I sit, the CIA (and CIA type agencies) have always been a law onto themselves. They claim that the US overreach in the world is good and others just don't know what is good for them. They trap people with agents provocatuers. They help governments (French and German) to steal assets from people (like they did with our family), then say Russia is a country of thieves. Takes one to know one. People who are opposed to the US overreach, including from  their CIA type agencies, have accidents or terminal diseases at a higher rate than others.  

But there may be a shift developing. Hayden said that millennials do not have the same degree of loyalty any more as the old guard. Their faith in good judgement of government is not there. Honesty and the necessary degree of transparency are also different for them. So there will be more leaks he said - good. I must have missed the perjury trial for NSA's Clapper = lying to Congress. 

That's the good news, change developing. But the bad news is that it will take a bit of time until the old guard is gone and the old domineering mentality is reduced. 

stant's picture

4chan has captured my toaster.waiting for the data dump. To hit the net, Stant out. Oh and praise kek

tony bonn's picture

the cia is a psychopathic crime syndicate run by plutocratic jews and has been since the days of james jesus angleton. it should be bombed into a crater.

Marshall Planz's picture

A far-wiser move would be a 100% treason amnesty in exchange for truth...

It's full of assholes and guys who got balls deep in total top-down manipulation...

They make-em and break-em 10 times over before they're middle management...

Some serious psychological domination skills keep it like Clockwork Orange...

Get 100% treason-amnesty and all that knowledge doesn't go to waste...

Otherwise you either do diddly, or walk straight into their trap...


(Squirrel, 1.34, 'AKA' rent-kids for supreme court justices)...

artvandalai's picture

I have the new Windows 10 Home version. And it has it's own secret product ID number. Are they telling me that TPTB still might be able to get into my laptop if they wanted?

StaySunny3000's picture

Yes.  Jim Stone has a full break down on this from a Microsoft insider.  jimstone.is  Scroll down a bit.

quasi_verbatim's picture

CIA is Putin asset cut out.

francis scott falseflag's picture



jcdenton's picture

Guys do understand what the CIA is ..


Watch The Good Shepherd with Damon and DeNiro ..


Especially the two key scenes with Angelina Jolie (Wilson's wife) ..


The one scene with Hurt and Damon in London .. (notice those "Anu Sigs" in the background?)





MuffDiver69's picture

Author didn't mention the 5000 hacker army...Wonder why this Vault7 was leaked...Merkel must be shitting her diaper...Assange has lined her up conveniently for next drop shortly...Whole bunch of people are in for something that makes the BS Russia hacks look lame...ahahahaha

VWAndy's picture

 Boy they sure are working real hard at gettin all the hotheads all kinda wound up?  Every kinda stupid stunt just to piss everbody owf.

  Tis a fine show.


Cockoo's picture

Intel buys Israeli driverless car firm Mobileye for $15.3 billion, putting the tech company squarely in the game to develop self-driving vehicles and confirming the Jewish state’s status as an innovation hub.

“Congrats to Mobileye! Israeli genius, Israeli pride,” Prime Minister Benjamin Netanyahu took to Twitter after the deal’s announcement.

Science and Technology Minister Ofir Akunes, “The international companies see potential in Israel and are seeking to acquire Israeli companies that lead their prospective fields is a source of national pride for our technological strength.”

Mobileye produces sensors and other devices that let a car know where it is in space in relation to other vehicles, pedestrians and relevant objects. It was founded by Amnon Shashua in 1999 to help lower motorist fatalities and injuries.


What could go wrong with this program if you become the enemy of the State?    /sarc

Marshall Planz's picture

Guess you could be like "Arnie" in Total Recall and be "Amnon-e-mous" maybe? ;-)


(Video = 30 seconds of silly)...

Cockoo's picture

One less thing to worry about nice video.  In 2017 this guy juggled to prove he was not DUI. https://www.youtube.com/watch?v=dl-lqaKruwI

Marshall Planz's picture

Hey, Trumpf could hire "Juggler-guy" as the new Treasury Secretary ;-)

Cockoo's picture

Nowadays anything is possible, maybe a robot could take his place only down time is for maintenance or unless lighting strikes of course voids the warranty. 

Cockoo's picture

Remote Control Cars for Undetectable Assassinations known as a car cyber attack. Michael Hastings name comes to mind, if I only had access to artifical intelligence in real time. 

BritBob's picture

Interesting to note that Snowden revealed that the UK was keeping an eye on Argentina and her Malvinas aspirations. But what is the strength of Argentina's Falklands' claim?


Falklands- Never Belonged to Argentina:


Ah, just a political distraction then.



TeethVillage88s's picture

Bill of Rights, Amendment 3, Quartering of Soldiers.

No Civilian can be forced to Quarter the Govt or it's Paramilitaries in our smart phones, smart TVs, PCs, Email Servers, Refrigerators, Appliances, notebooks, tablets, or organizers. (Vault 7, violates this principal of govt ghost in the machine, or designing computers with backdoors, flaws, bugs, for govt to exploit)

sagramore's picture

The CIA operates under a type of diplomatic immunity.  Simple.  We all become diplomats.  I am sovereign, and you are too.  Stop listening to the Govern (control) ment (mind).