Posts Tagged ‘GCHQ’

Wikileaks-CIA-738241.jpg

WikiLeaks publishes ‘biggest ever leak of secret CIA documents’

The 8,761 documents published by WikiLeaks focus mainly on techniques for hacking and surveillance

This is not really new, except for the specifics. Backdoor security holes have plagued corporate America since forever.

This is why I’m not interested in the slightest in the much touted “Internet of Things.” They will be able to infiltrate every aspect of your life. They are already in your cars, which have the same types of vulnerabilities.

“The attack against Samsung smart TVs was developed in cooperation with the United Kingdom’s MI5/BTSS. After infestation, Weeping Angel places the target TV in a ‘Fake Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the internet to a covert CIA server.”

More:

CIA’s UMBRAGE Allows Agency To Carry Out ‘False Flag’ Cyber Attacks

 

85% of world’s smart phones ‘weaponized’ by CIA
The majority of the world’s smartphones have been “weaponized,” according to WikiLeaks, which revealed in its latest leak that the CIA went to extreme measures to utilize the Android OS for spying.

Google’s Android operating system, used in 85 percent of the world’s smart phones, including Samsung and Sony, was found to have 24 ‘zero days’ – the code name used by the CIA to identify and exploit vulnerabilities…

Big_Brother_by_joeadonis-2_25267

Big Brother is real, and he’s called GCHQ.

The NSA’s British partner in crime is very busy disrupting communications globally, hacking and planting falsehoods.

CONTROVERSIAL GCHQ UNIT ENGAGED IN DOMESTIC LAW ENFORCEMENT, ONLINE PROPAGANDA, PSYCHOLOGY RESEARCH

jtrig-540x520

ps

NSA, GCHQ targeted Kaspersky, other cybersecurity companies – Snowden docs

 deception_p24

human beings can be manipulated using “leaders,” “trust,” “obedience” and “compliance”

HOW COVERT AGENTS INFILTRATE THE INTERNET TO MANIPULATE, DECEIVE, AND DESTROY REPUTATIONS

Men in Black … not so far from the truth, according to Mirage Makers.

The real Men in Black, Hollywood and the great UFO cover-up

In a new documentary, US government agents claim they spent decades giving fake evidence of extraterrestrials to gullible ufologists. But why? And how can we trust them now?

 
MIRAGE MEN WEBSITE

 

Ties into Edward Snowden revelations about deliberate covert deception:

The Art of Deception

 

totalitarianism_poster1

 

 

 

GCHQ

GCHQ has tools to manipulate online information, leaked documents show

 

Listen up. It’s about social control, not fighting terrorism. They actually benefit quite a bit more whenever they let an act of terrorism succeed.

• GATEWAY: the “ability to artificially increase traffic to a website”.

• CLEAN SWEEP which “masquerade[s] Facebook wall posts for individuals or entire countries”.

• SCRAPHEAP CHALLENGE for “perfect spoofing of emails from BlackBerry targets”.

• UNDERPASS to “change outcome of online polls”.

• SPRING BISHOP to find “private photos of targets on Facebook”.

The document also details a range of programs designed to collect and store public postings from Facebook, Twitter, LinkedIn and Google+, and to make automated postings on several of the social networks.

Capabilities to boost views of YouTube videos, or to boost the circulation of particular messages are also detailed.

 

Gerd Wiesler (Ulrich Mühe) bei seiner Arbeit.The Lives of Others (STASI)

 

What Europe Should Know about US Mass Surveillance

 

Despite the extraordinary intrusions of the NSA and EU national governments into private communications world-wide, Umar Farouk Abdulmutallab, the “Underwear Bomber,” was allowed to board an airplane traveling from Europe to the United States in 2009. The 290 persons on board were not saved by mass surveillance, but by his own incompetence, when he failed to detonate the device. While even Mutallab’s own father warned the US government he was dangerous in November 2009, our resources were tied up monitoring online games and tapping German ministers. That extraordinary tip-off didn’t get Mutallab a dedicated US investigator. All we gave him was a US visa.

I could have read the private communications of any member of this committee, as well as any ordinary citizen. I swear under penalty of perjury that this is true.

 

img_P1

One company is Phantom Secure, a Canadian-based seller of encrypted Blackberries.

Standard fearmongering playbook has the Australian government rallying the public against privacy and encryption.  What should have been the default: privacy for all, is now the source of dread and panic because SHOCK!  There are criminals in the world!  Did you know this?

Uncrackable phones provided by Phantom Secure linked to murder of Hells Angels bikies

We are all to be treated as criminals and under surveillance, and we should accept life in the digital goldfish bowl.

trollhunter_415

 

See more:

All the King’s Trolls
Disinformation Killed 9/11 “Truth”
MUST SEE: NSA whistleblower Edward Snowden
Russell Tice on Breaking the Set
Optic Nerve: Hacks Your Web Cam

All posts on NSA

 

 

Internet Market Considers MIcrosoft Bid for Yahoo

NSA’s UK branch has now been exposed for spying directly into people’s residences with imagery from hacked web cameras.  These unaccountable monsters are the enemies of humanity and should be arrested and tried for their myriad ongoing crimes.

Yahoo webcam images from millions of users intercepted by GCHQ
• Optic Nerve program collected Yahoo webcam images in bulk
• 1.8m users targeted by UK agency in six-month period alone
• Yahoo: ‘A whole new level of violation of our users’ privacy’
• Material included large quantity of sexually explicit images

deception_p47

NSA British partner GCHQ spills secrets over at Glenn Greenwald’s Intercept site.  Their reach is global, and they are partners who share what they call “intelligence” with one another in secret arrangements.  NSA conspiring with GCHQ to target innocent American citizens could be construed as Treason, waging a cyber “war” against them.

How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations

They also target businesses, particularly foreign business rivals in order to protect and advance their own nation’s corporate behemoths.  This is the empire business.  This is not democracy.

Screenshot3

screenshot4

Screenshot2

deception_p11

More:

Reddit Censors Big Story About Government Manipulation and Disruption of the Internet

main2

How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations

 

GetImage

Guardian editors working on the Edward Snowden story were targeted in a multi-prong operation of intimidation, theft and hacking.

Writing The Snowden Files: ‘The paragraph began to self-delete’

The paragraph I had just written began to self-delete. The cursor moved rapidly from the left, gobbling text. I watched my words vanish. When I tried to close my OpenOffice file the keyboard began flashing and bleeping.