Wikileaks

WIKILEAKS BOMBSHELL! SETH RICH, THE MURDERED DNC STAFFER, WAS THE DNC LEAKER – NOT RUSSIA!

Posted on

 

It was called the Clinton body bags. People threatening to expose the Clintons during 2016 election campaign die suspiciously and one of them was Seth Rich. On July 8, 2016,  27- year-old Democratic staffer Seth Conrad Rich was murdered a block from his D.C. home at 4 am, shot twice in the back, yet nothing was taken. The killer or killers took nothing from Rich, leaving behind his wallet, watch and phone.  It was alleged he was going to meet with an FBI to discuss election fraud that happened during the Democrat Party primary. Surprisingly, the DNC never let the FBI looked into their server.

Today, Wikileaks released a bombshell. Seth Rich was the DNC leaker, not Russia. Wikileaks posts a series direct messages from “Russian spy” Guccifer 2.0 to actress model Robin Young (according to Young).  In the stream of texts the discussion leads to the DNC leaker.

And according to Guccifer, his name is “Seth”:

Guccifer 2.0: his name is seth.he was my whistleblower
I suppose you know who I’m talking about

Robin Young: Yes, and it was horrifying to hear abut his death. I have no facts, but my opinion is Hillary had him murdered.

 

 

 

 

 

 

CIA BUGS iPHONES, USES NIGHTSKIES TOOL TO HACK, MONITOR AND REMOTELY CONTROL iPHONES – WIKILEAKS

Posted on Updated on

WIKILEAKS: CIA BUGS ‘FRESH FACTORY’ iPHONES, USES NIGHTSKIES TOOL TO HACK, MONITOR AND REMOTELY CONTROL iPHONES WITHOUT YOU KNOWING IT.

 

From Heavy: WikiLeaks Vault 7 Leak Claims CIA Bugs ‘Factory Fresh’ iPhones

A new WikiLeaks Vault 7 leak titled “Dark Matter” claims, with unreleased documents, that the Central Intelligence Agency has been bugging “factory fresh” iPhones since at least 2008. WikiLeaks further claims that the CIA has the capability to permanently bug iPhones, even if their operating systems are deleted or replaced.

The documents are expected to be released in the next 24-hours. The announced was made after a “press briefing” that WikiLeaks promoted on its Twitter.

 

From RT: CIA’s NightSkies tool can hack, remotely control iPhones without user knowing

WikiLeaks has revealed the CIA’s alleged ability to infiltrate and control iPhones through a tool called NightSkies, which is physically installed onto factory fresh iPhones and allows the CIA to monitor and download files from targets’ phones undetected.

The revelation is part of WikiLeaks’ latest Vault 7 release named ‘Dark Matter.

NightSkies works in the background and grants “full remote command and control,”to the CIA, allowing it to upload and download files from iPhones, including details from the owner’s phonebook, text messages and call logs, and to execute actions on the phones as it wishes.

In the press release regarding the latest ‘Vault 7’ leak, WikiLeaks claims that NightSkies “is expressly designed to be physically installed onto factory fresh iPhones.”

A 2008 document featured in the release explains that NightSkies v1.2 must be physically installed and will only start beaconing information once the user starts to use the phone.

 

READ MORE: #Vault7: WikiLeaks releases ‘Dark Matter’ batch of CIA hacking tactics for Apple products

 

 

 

#Vault7: WikiLeaks releases ‘Dark Matter’ batch of CIA hacking tactics for Apple products

 

 

CIA CAN HACK CARS FOR UNDETECTABLE ASSASSINATIONS, EAVESDROP ON SAMSUNG SMART TV EVEN WHEN IT’S OFF

Posted on

Every gram of CO2 counts as carmakers race to cut emissions before tough new rules kick in

 

( BREITBART ) The CIA has considered developing technology to hack the driving systems of road vehicles including cars and trucks, according to a WikiLeaks dump of agency documents released earlier today.

From WikiLeaks’ press release:

As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.

CIA meeting notes from 2014 show that the agency’s Embedded Devices Branch (EDB) was looking at “vehicle systems (e.g VSEP)” as a “potential mission area.”

This appears to have been part of a wider effort on the part of the CIA to take control of the “internet things” — a term used in the technology community to refer to the growing connectivity of physical devices through the internet.

The meeting notes specifically notes “the internet of things” as another potential EDB mission area.

The CIA has also successfully breached Samsung’s Smart TVs, and now has the ability to covertly switch on the Smart TVs’ microphones to monitor nearby audio, even when the devices are switched off.

 

READ MORE: Cars Hacked for ‘Nearly Undetectable Assassinations’

 

WIKILEAKS VAULT 7: CIA CAN MIMIC RUSSIAN HACKERS USING STOLEN MALWARE…OBAMA AND CIA CREATED THE RUSSIAN HOAX?

Posted on

( Gateway Pundit ) Wikileaks unveiled what they dubbed ‘Vault 7’ on Tuesday in their largest CIA document drop yet. One of the documents revealed that under a project named ‘Umbrage’, the CIA maintained a library of Russian cyber-attack techniques ‘stolen’ from malware. The CIA can then mimic Russian hackers by leaving ‘fingerprints’ of Russian style hacking.

The CIA can essentially pose as hackers from anywhere in the world as long as they have the malware to create the ‘fingerprints’. They can create any narrative they want with this ability. They can claim the Russians hacked the DNC even if it was actually the CIA.

READ MORE: Wikileaks #Vault7 – CIA Can Mimic Russian Hackers Using ‘Stolen’ Malware

 

 

 

 

 

 

OBAMAGATE FILE: LIST OF OBAMA’S WIRETAP VICTIMS

Posted on

Obamagate file – list of Barack  Obama’s wiretap victims when he was in office.

 


 

 

( Gateway Pundit ) This is now being referred to as Obamagate!

It is not unfounded that former President Obama would wire tap President Trump during the election process.  This is because he has done this before.  Here is a list of individuals who were wire tapped by the Obama Administration.

WikiLeaks released the following list on February 23rd (see link here) of Obama Administration wire taps:

* The US National Security Agency bugged a private climate change strategy meeting; between UN Secretary General Ban Ki-Moon and German Chancellor Angela Merkel in Berlin;
* Obama bugged Chief of Staff of UN High Commissioner for Refugees (UNHCR) for long term interception targetting his Swiss phone;
* Obama singled out the Director of the Rules Division of the World Trade Organisation (WTO), Johann Human, and targetted his Swiss phone for long term interception;
* Obama stole sensitive Italian diplomatic cables detailing how Israel’s Prime Minister Benjamin Netanyahu implored Italy’s Prime Minister Silvio Berlusconi to help patch up his relationship with US President Barack Obama, who was refusing to talk to Netanyahu;
* Obama intercepted top EU and Japanese trade ministers discussing their secret strategy and red lines to stop the US “extort[ing]” them at the WTO Doha arounds (the talks subsequently collapsed);
* Obama explicitly targeted five other top EU economic officials for long term interception, including their French, Austrian and Belgium phone numbers;
* Obama explicitly targetted the phones of Italy’s ambassador to NATO and other top Italian officials for long term interception; and
* Obama intercepted details of a critical private meeting between then French president Nicolas Sarkozy, Merkel and Berluscon, where the latter was told the Italian banking system was ready to “pop like a cork”.

In addition to the above list we also know now that Obama wire tapped various individuals in the US media that were reporting information not flattering to the Obama Administration.  It is widely known that Obama’s Justice Department targeted journalists with wiretaps in 2013:

* In 2013 the liberal Washington Post expressed outrage after the revelation that the Justice Department had investigated the newsgathering activities of a Fox News reporter as a potential crime in a probe of classified leaks.  The reporter, Fox News’ James Rosen and his family, were part of an investigation into government officials anonymously leaking information to journalists. Rosen was not charged but his movements and actions were tracked.
* Also in 2013, members of the Associated Press were also a target of the surveillance.  The ultra liberal New Yorker even noted that “In moderate and liberal circles, at least, the phone-records scandal, partly because it involves the dear old A.P. and partly because it raises anew the specter of Big Brother, may well present the most serious threat to Obama’s reputation.”
* Reporter Sharyl Attkisson said in 2014 that her personal computer and CBS laptop were hacked after she began filing stories about Benghazi that were unflattering to the Obama administration.  A source who checked her laptop said the hacker used spyware “proprietary to a government agency,” according to an article in the New York Post.

 

SOURCE: Here’s the List: More Than a Dozen Proven Victims of Obama’s Many Wiretaps

 

 

 

STUPID! NO SECRET PODESTA’S PASSWORD WAS ‘PASSWORD’, TOLD HIS STAFF ABOUT IT: ‘EVEN 14-YEAR-OLD COULD HAVE HACKED DEMOCRAT EMAILS’ – JULIAN ASSANGE

Posted on

John Podesta, whose emails Julian Assange said could have been hacked by a 14-year-old

 

Democrat Party’s emails were hacked last election because first off, Hillary Clinton used an illegal  mom-and-pop email server. Wikileaks Julian Assange tells Hannity Tuesday night. “Podesta gave out that his password was the word ‘password’. His own staff said this email that you’ve received, this is totally legitimate. So, this is something … a 14-year-old kid could have hacked Podesta that way.” Stupid eh!

 

( Fox News ) WikiLeaks founder Julian Assange told Fox News’ Sean Hannity in an exclusive interview that a teenager could have hacked into Hillary Clinton campaign chairman John Podesta’s computer and retrieved damaging email messages that the website published during last year’s election campaign.

“We published several … emails which show Podesta responding to a phishing email,” Assange said during the first part of the interview, which aired on “Hannity” Tuesday night. “Podesta gave out that his password was the word ‘password’. His own staff said this email that you’ve received, this is totally legitimate. So, this is something … a 14-year-old kid could have hacked Podesta that way.”

Assange also claimed that Clinton herself made “almost no attempt” to keep her private emails safe from potentially hostile states during her tenure as secretary of state.

 

READ MORE: Wikileaks’ Assange: ‘A 14-year-old kid could have hacked Podesta’ emails | Fox News

 

Julian Assange, whose interview will aired Fox News Tuesday, reiterated his claims that the Russian government was not responsible for the hacks during the 2016 presidential election and that a child could have hacked into the Democrats' emails

 

 

 

PRO-HILLARY JOURNALISTS EXPOSED BY WIKILEAKS WILL NOW COVER TRUMP WHITE HOUSE…WHAT TO EXPECT? DERANGED DONKEYS ON THE LOOSE WITH FAKE NEWS AND BIAS COVERAGE!

Posted on

JOURNALISTS WORKING WITH HILLARY CAMPAIGN AS EXPOSED BY WIKILEAKS WILL NOW COVER TRUMP:

  • JOHN HARWOOD of CNBC and NYT: In a December 2015 email to Podesta, Harwood claimed the Republican Party was “veering off the rails” and bragged about provoking Trump during a Republican presidential debate, where he asked Trump if he was running “a comic book version of a presidential campaign.
  • JOHN THRUSH of POLITICO: Emails released by WikiLeaks showed Thrush sending stories to Clinton staffers for approval before publication. “Because I have become a hack I will send u the whole section that pertains to [you],” he wrote in an April 30, 2015 email to Podesta, including five paragraphs from a piece titled “Hillary’s big money dilemma.”
  • MAGGIE HABERMAN of POLITICO: “We have has a very good relationship with Maggie Haberman of Politico over the last year. We have had her tee up stories for us before and have never been disappointed,” the memo continued. “While we should have a larger conversation in the near future about a broader strategy for reengaging the beat press that covers HRC, for this we think we can achieve our objective and do the most shaping by going to Maggie.”

 

What to expect from them? Just like with their 2016 fake news, fake scandals, fake polls and bias coverage, the frothing in the mouth liberal media would be covering Trump like a bunch of deranged donkeys after they got kicked hard by an elephant. America’s distrust and disgust for the media, suspicion they were working for the Hillary camp,  got vindicated after Wikileaks and hacker Guccifer 2.0 revealed list of journalists who were cozy with the Clinton campaign.

 

thrush