The uprising of the people against greed and repression
17.5K views | +0 today
Follow
The uprising of the people against greed and repression
the elite rules, brings people to despair poverty, we like to help organise a real revolt against greed and repression.
Curated by CineversityTV
Your new post is loading...
Your new post is loading...
Scooped by CineversityTV
Scoop.it!

#Nobel Peace Prize winner on #whorerunner #liar Trump pulling out of #Iran deal: ‘This is so stupid!’

#Nobel Peace Prize winner on #whorerunner #liar Trump pulling out of #Iran deal: ‘This is so stupid!’ | The uprising of the people against greed and repression | Scoop.it
A 2017 winner of the Nobel Peace Prize on Tuesday tore into President Trump over the expected announcement that he will pull the U.S. out of the Iran nuclear deal, saying that doing so would be “so stupid.”
more...
No comment yet.
Scooped by CineversityTV
Scoop.it!

James #Hansen: Why I must speak out about #climate change | #TED Talk

James #Hansen: Why I must speak out about #climate change | #TED Talk | The uprising of the people against greed and repression | Scoop.it
Top climate scientist James Hansen tells the story of his involvement in the science of and debate over global climate change. In doing so he outlines the overwhelming evidence that change is happening and why that makes him deeply worried about the future.
more...
No comment yet.
Scooped by CineversityTV
Scoop.it!

#FF Again #Facebook admits #privacy settings 'bug' affecting 14 million users #tech #humanrights #UN

#FF Again #Facebook admits #privacy settings 'bug' affecting 14 million users #tech #humanrights #UN | The uprising of the people against greed and repression | Scoop.it
Facebook acknowledged Thursday a software glitch that changed the settings of some 14 million users, potentially making some posts public even if they were intended to be private.
more...
No comment yet.
Scooped by CineversityTV
Scoop.it!

#WikiLeaks - #Vault7: Projects

#WikiLeaks - #Vault7: Projects | The uprising of the people against greed and repression | Scoop.it
Vault 7: Projects This publication series is about specific projects related to the Vault 7 main publication. Releases Documents All Releases Protego - 7 September, 2017 Angelfire - 31 August, 2017 ExpressLane - 24 August, 2017 CouchPotato - 10 August, 2017 Dumbo - 3 August, 2017 Imperial - 27 July, 2017 UCL / Raytheon - 19 July, 2017 Highrise - 13 July, 2017 BothanSpy - 6 July, 2017 OutlawCountry - 30 June, 2017 Elsa - 28 June, 2017 Brutal Kangaroo - 22 June, 2017 Cherry Blossom - 15 June, 2017 Pandemic - 1 June, 2017 Athena - 19 May, 2017 AfterMidnight - 12 May, 2017 Archimedes - 5 May, 2017 Scribbles - 28 April, 2017 Weeping Angel - 21 April, 2017 Hive - 14 April, 2017 Grasshopper - 7 April, 2017 Marble Framework - 31 March, 2017 Dark Matter - 23 March, 2017 Protego 7 September, 2017 Today, September 7th 2017, WikiLeaks publishes four secret documents from the Protego project of the CIA, along with 37 related documents (proprietary hardware/software manuals from Microchip Technology Inc.). The project was maintained between 2014 and 2015. Protego is not the "usual" malware development project like all previous publications by WikiLeaks in the Vault7 series. Indeed there is no explicit indication why it is part of the project repositories of the CIA/EDG at all. The Protego project is a PIC-based missile control system that was developed by Raytheon. The documents indicate that the system is installed on-board a Pratt & Whitney aircraft (PWA) equipped with missile launch systems (air-to-air and/or air-to-ground). Protego consists of separate micro-controller units that exchange data and signals over encrypted and authenticated channels:   » On-board TWA are the 'Master Processor' (MP) and the 'Deployment Box'. Both systems are layed-out with master/slave redundancy.   » The missle system has micro-controllers for the missle itself ('Missle Smart Switch', MSS), the tube ('Tube Smart Switch', TSS) and the collar (which holds the missile before and at launch time). The MP unit receives three signals from a beacon: 'In Border' (PWA is within the defined area of an operation), 'Valid GPS' (GPS signal available) and 'No End of Operational Period' (current time is within the defined timeframe for an operation). Missiles can only be launched if all signals received by MP are set to 'true'. Similary safeguards are in place to auto-destruct encryption and authentication keys for various scenarios (like 'leaving a target area of operation' or 'missing missle'). Leaked Documents Angelfire 31 August, 2017 Today, August 31st 2017, WikiLeaks publishes documents from the Angelfire project of the CIA. Angelfire is an implant comprised of five components: Solartime, Wolfcreek, Keystone (previously MagicWand), BadMFS, and the Windows Transitory File system. Like previously published CIA projects (Grasshopper and AfterMidnight) in the Vault7 series, it is a persistent framework that can load and execute custom implants on target computers running the Microsoft Windows operating system (XP or Win7). Solartime modifies the partition boot sector so that when Windows loads boot time device drivers, it also loads and executes the Wolfcreek implant, that once executed, can load and run other Angelfire implants. According to the documents, the loading of additional implants creates memory leaks that can be possibly detected on infected machines. Keystone is part of the Wolfcreek implant and responsible for starting malicious user applications. Loaded implants never touch the file system, so there is very little forensic evidence that the process was ever ran. It always disguises as "C:\Windows\system32\svchost.exe" and can thus be detected in the Windows task manager, if the operating system is installed on another partition or in a different path. BadMFS is a library that implements a covert file system that is created at the end of the active partition (or in a file on disk in later versions). It is used to store all drivers and implants that Wolfcreek will start. All files are both encrypted and obfuscated to avoid string or PE header scanning. Some versions of BadMFS can be detected because the reference to the covert file system is stored in a file named "zf". The Windows Transitory File system is the new method of installing AngelFire. Rather than lay independent components on disk, the system allows an operator to create transitory files for specific actions including installation, adding files to AngelFire, removing files from AngelFire, etc. Transitory files are added to the 'UserInstallApp'. Leaked Documents See more ExpressLane 24 August, 2017 Today, August 24th 2017, WikiLeaks publishes secret documents from the ExpressLane project of the CIA. These documents show one of the cyber operations the CIA conducts against liaison services -- which includes among many others the National Security Agency (NSA), the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI). The OTS (Office of Technical Services), a branch within the CIA, has a biometric collection system that is provided to liaison services around the world -- with the expectation for sharing of the biometric takes collected on the systems. But this 'voluntary sharing' obviously does not work or is considered insufficient by the CIA, because ExpressLane is a covert information collection tool that is used by the CIA to secretly exfiltrate data collections from such systems provided to liaison services. ExpressLane is installed and run with the cover of upgrading the biometric software by OTS agents that visit the liaison sites. Liaison officers overseeing this procedure will remain unsuspicious, as the data exfiltration disguises behind a Windows installation splash screen. The core components of the OTS system are based on products from Cross Match, a US company specializing in biometric software for law enforcement and the Intelligence Community. The company hit the headlines in 2011 when it was reported that the US military used a Cross Match product to identify Osama bin Laden during the assassination operation in Pakistan. Leaked Documents See more CouchPotato 10 August, 2017 Today, August 10th 2017, WikiLeaks publishes the the User Guide for the CoachPotato project of the CIA. CouchPotato is a remote tool for collection against RTSP/H.264 video streams. It provides the ability to collect either the stream as a video file (AVI) or capture still images (JPG) of frames from the stream that are of significant change from a previously captured frame. It utilizes ffmpeg for video and image encoding and decoding as well as RTSP connectivity. CouchPotato relies on being launched in an ICE v3 Fire and Collect compatible loader. Leaked Documents Dumbo 3 August, 2017 Today, August 3rd 2017 WikiLeaks publishes documents from the Dumbo project of the CIA. Dumbo is a capability to suspend processes utilizing webcams and corrupt any video recordings that could compromise a PAG deployment. The PAG (Physical Access Group) is a special branch within the CCI (Center for Cyber Intelligence); its task is to gain and exploit physical access to target computers in CIA field operations. Dumbo can identify, control and manipulate monitoring and detection systems on a target computer running the Microsoft Windows operating sytem. It identifies installed devices like webcams and microphones, either locally or connected by wireless (Bluetooth, WiFi) or wired networks. All processes related to the detected devices (usually recording, monitoring or detection of video/audio/network streams) are also identified and can be stopped by the operator. By deleting or manipulating recordings the operator is aided in creating fake or destroying actual evidence of the intrusion operation. Dumbo is run by the field agent directly from an USB stick; it requires administrator privileges to perform its task. It supports 32bit Windows XP, Windows Vista, and newer versions of Windows operating system. 64bit Windows XP, or Windows versions prior to XP are not supported. Leaked Documents See more Imperial 27 July, 2017 Today, July 27th 2017, WikiLeaks publishes documents from the Imperial project of the CIA. Achilles is a capability that provides an operator the ability to trojan an OS X disk image (.dmg) installer with one or more desired operator specified executables for a one-time execution. Aeris is an automated implant written in C that supports a number of POSIX-based systems (Debian, RHEL, Solaris, FreeBSD, CentOS). It supports automated file exfiltration, configurable beacon interval and jitter, standalone and Collide-based HTTPS LP support and SMTP protocol support - all with TLS encrypted communications with mutual authentication. It is compatible with the NOD Cryptographic Specification and provides structured command and control that is similar to that used by several Windows implants. SeaPea is an OS X Rootkit that provides stealth and tool launching capabilities. It hides files/directories, socket connections and/or processes. It runs on Mac OSX 10.6 and 10.7. Leaked Documents UCL / Raytheon 19 July, 2017 Today, July 19th 2017, WikiLeaks publishes documents from the CIA contractor Raytheon Blackbird Technologies for the "UMBRAGE Component Library" (UCL) project. The documents were submitted to the CIA between November 21st, 2014 (just two weeks after Raytheon acquired Blackbird Technologies to build a Cyber Powerhouse) and September 11th, 2015. They mostly contain Proof-of-Concept ideas and assessments for malware attack vectors - partly based on public documents from security researchers and private enterprises in the computer security field. Raytheon Blackbird Technologies acted as a kind of "technology scout" for the Remote Development Branch (RDB) of the CIA by analysing malware attacks in the wild and giving recommendations to the CIA development teams for further investigation and PoC development for their own malware projects. Leaked Documents See more Highrise 13 July, 2017 Today, July 13th 2017, WikiLeaks publishes documents from the Highrise project of the CIA. HighRise is an Android application designed for mobile devices running Android 4.0 to 4.3. It provides a redirector function for SMS messaging that could be used by a number of IOC tools that use SMS messages for communication between implants and listening posts. HighRise acts as a SMS proxy that provides greater separation between devices in the field ("targets") and the listening post (LP) by proxying "incoming" and "outgoing" SMS messages to an internet LP. Highrise provides a communications channel between the HighRise field operator and the LP with a TLS/SSL secured internet communication. Leaked Documents BothanSpy 6 July, 2017 Today, July 6th 2017, WikiLeaks publishes documents from the BothanSpy and Gyrfalcon projects of the CIA. The implants described in both projects are designed to intercept and exfiltrate SSH credentials but work on different operating systems with different attack vectors. BothanSpy is an implant that targets the SSH client program Xshell on the Microsoft Windows platform and steals user credentials for all active SSH sessions. These credentials are either username and password in case of password-authenticated SSH sessions or username, filename of private SSH key and key password if public key authentication is used. BothanSpy can exfiltrate the stolen credentials to a CIA-controlled server (so the implant never touches the disk on the target system) or save it in an enrypted file for later exfiltration by other means. BothanSpy is installed as a Shellterm 3.x extension on the target machine. Gyrfalcon is an implant that targets the OpenSSH client on Linux platforms (centos,debian,rhel,suse,ubuntu). The implant can not only steal user credentials of active SSH sessions, but is also capable of collecting full or partial OpenSSH session traffic. All collected information is stored in an encrypted file for later exfiltration. It is installed and configured by using a CIA-developed root kit (JQC/KitV) on the target machine. Leaked Documents OutlawCountry 30 June, 2017 Today, June 30th 2017, WikiLeaks publishes documents from the OutlawCountry project of the CIA that targets computers running the Linux operating system. OutlawCountry allows for the redirection of all outbound network traffic on the target computer to CIA controlled machines for ex- and infiltration purposes. The malware consists of a kernel module that creates a hidden netfilter table on a Linux target; with knowledge of the table name, an operator can create rules that take precedence over existing netfilter/iptables rules and are concealed from an user or even system administrator. The installation and persistence method of the malware is not described in detail in the document; an operator will have to rely on the available CIA exploits and backdoors to inject the kernel module into a target operating system. OutlawCountry v1.0 contains one kernel module for 64-bit CentOS/RHEL 6.x; this module will only work with default kernels. Also, OutlawCountry v1.0 only supports adding covert DNAT rules to the PREROUTING chain. Leaked Documents Elsa 28 June, 2017 Today, June 28th 2017, WikiLeaks publishes documents from the ELSA project of the CIA. ELSA is a geo-location malware for WiFi-enabled devices like laptops running the Micorosoft Windows operating system. Once persistently installed on a target machine using separate CIA exploits, the malware scans visible WiFi access points and records the ESS identifier, MAC address and signal strength at regular intervals. To perform the data collection the target machine does not have to be online or connected to an access point; it only needs to be running with an enabled WiFi device. If it is connected to the internet, the malware automatically tries to use public geo-location databases from Google or Microsoft to resolve the position of the device and stores the longitude and latitude data along with the timestamp. The collected access point/geo-location information is stored in encrypted form on the device for later exfiltration. The malware itself does not beacon this data to a CIA back-end; instead the operator must actively retrieve the log file from the device - again using separate CIA exploits and backdoors. The ELSA project allows the customization of the implant to match the target environment and operational objectives like sampling interval, maximum size of the logfile and invocation/persistence method. Additional back-end software (again using public geo-location databases from Google and Microsoft) converts unprocessed access point information from exfiltrated logfiles to geo-location data to create a tracking profile of the target device. Leaked Documents Brutal Kangaroo 22 June, 2017 Today, June 22nd 2017, WikiLeaks publishes documents from the Brutal Kangaroo project of the CIA. Brutal Kangaroo is a tool suite for Microsoft Windows that targets closed networks by air gap jumping using thumbdrives. Brutal Kangaroo components create a custom covert network within the target closed network and providing functionality for executing surveys, directory listings, and arbitrary executables. The documents describe how a CIA operation can infiltrate a closed network (or a single air-gapped computer) within an organization or enterprise without direct access. It first infects a Internet-connected computer within the organization (referred to as "primary host") and installs the BrutalKangeroo malware on it. When a user is using the primary host and inserts a USB stick into it, the thumbdrive itself is infected with a separate malware. If this thumbdrive is used to copy data between the closed network and the LAN/WAN, the user will sooner or later plug the USB disk into a computer on the closed network. By browsing the USB drive with Windows Explorer on such a protected computer, it also gets infected with exfiltration/survey malware. If multiple computers on the closed network are under CIA control, they form a covert network to coordinate tasks and data exchange. Although not explicitly stated in the documents, this method of compromising closed networks is very similar to how Stuxnet worked. The Brutal Kangaroo project consists of the following components: Drifting Deadline is the thumbdrive infection tool, Shattered Assurance is a server tool that handles automated infection of thumbdrives (as the primary mode of propagation for the Brutal Kangaroo suite), Broken Promise is the Brutal Kangaroo postprocessor (to evaluate collected information) and Shadow is the primary persistence mechanism (a stage 2 tool that is distributed across a closed network and acts as a covert command-and-control network; once multiple Shadow instances are installed and share drives, tasking and payloads can be sent back-and-forth). The primary execution vector used by infected thumbdrives is a vulnerability in the Microsoft Windows operating system that can be exploited by hand-crafted link files that load and execute programs (DLLs) without user interaction. Older versions of the tool suite used a mechanism called EZCheese that was a 0-day exploit until March 2015; newer versions seem use a similar, but yet unknown link file vulnerability (Lachesis/RiverJack) related to the library-ms functionality of the operating system. Leaked Documents See more Cherry Blossom 15 June, 2017 Today, June 15th 2017, WikiLeaks publishes documents from the CherryBlossom project of the CIA that was developed and implemented with the help of the US nonprofit Stanford Research Institute (SRI International). CherryBlossom provides a means of monitoring the Internet activity of and performing software exploits on Targets of interest. In particular, CherryBlossom is focused on compromising wireless networking devices, such as wireless routers and access points (APs), to achieve these goals. Such Wi-Fi devices are commonly used as part of the Internet infrastructure in private homes, public spaces (bars, hotels or airports), small and medium sized companies as well as enterprise offices. Therefore these devices are the ideal spot for "Man-In-The-Middle" attacks, as they can easily monitor, control and manipulate the Internet traffic of connected users. By altering the data stream between the user and Internet services, the infected device can inject malicious content into the stream to exploit vulnerabilities in applications or the operating system on the computer of the targeted user. The wireless device itself is compromized by implanting a customized CherryBlossom firmware on it; some devices allow upgrading their firmware over a wireless link, so no physical access to the device is necessary for a successful infection. Once the new firmware on the device is flashed, the router or access point will become a so-called FlyTrap. A FlyTrap will beacon over the Internet to a Command & Control server referred to as the CherryTree. The beaconed information contains device status and security information that the CherryTree logs to a database. In response to this information, the CherryTree sends a Mission with operator-defined tasking. An operator can use CherryWeb, a browser-based user interface to view Flytrap status and security info, plan Mission tasking, view Mission-related data, and perform system administration tasks. Missions may include tasking on Targets to monitor, actions/exploits to perform on a Target, and instructions on when and how to send the next beacon. Tasks for a Flytrap include (among others) the scan for email addresses, chat usernames, MAC addresses and VoIP numbers in passing network traffic to trigger additional actions, the copying of the full network traffic of a Target, the redirection of a Target’s browser (e.g., to Windex for browser exploitation) or the proxying of a Target’s network connections. FlyTrap can also setup VPN tunnels to a CherryBlossom-owned VPN server to give an operator access to clients on the Flytrap’s WLAN/LAN for further exploitation. When the Flytrap detects a Target, it will send an Alert to the CherryTree and commence any actions/exploits against the Target. The CherryTree logs Alerts to a database, and, potentially distributes Alert information to interested parties (via Catapult). Leaked Documents See more Pandemic 1 June, 2017 Today, June 1st 2017, WikiLeaks publishes documents from the "Pandemic" project of the CIA, a persistent implant for Microsoft Windows machines that share files (programs) with remote users in a local network. "Pandemic" targets remote users by replacing application code on-the-fly with a trojaned version if the program is retrieved from the infected machine. To obfuscate its activity, the original file on the file server remains unchanged; it is only modified/replaced while in transit from the pandemic file server before being executed on the computer of the remote user. The implant allows the replacement of up to 20 programs with a maximum size of 800 MB for a selected list of remote users (targets). As the name suggests, a single computer on a local network with shared drives that is infected with the "Pandemic" implant will act like a "Patient Zero" in the spread of a disease. It will infect remote computers if the user executes programs stored on the pandemic file server. Although not explicitly stated in the documents, it seems technically feasible that remote computers that provide file shares themselves become new pandemic file servers on the local network to reach new targets. Leaked Documents See more Athena 19 May, 2017 Today, May 19th 2017, WikiLeaks publishes documents from the "Athena" project of the CIA. "Athena" - like the related "Hera" system - provides remote beacon and loader capabilities on target computers running the Microsoft Windows operating system (from Windows XP to Windows 10). Once installed, the malware provides a beaconing capability (including configuration and task handling), the memory loading/unloading of malicious payloads for specific tasks and the delivery and retrieval of files to/from a specified directory on the target system. It allows the operator to configure settings during runtime (while the implant is on target) to customize it to an operation. According to the documentation (see Athena Technology Overview), the malware was developed by the CIA in cooperation with Siege Technologies, a self-proclaimed cyber security company based in New Hampshire, US. On their website, Siege Technologies states that the company "... focuses on leveraging offensive cyberwar technologies and methodologies to develop predictive cyber security solutions for insurance, government and other targeted markets.". On November 15th, 2016 Nehemiah Security announced the acquisition of Siege Technologies. In an email from HackingTeam (published by WikiLeaks here), Jason Syversen, founder of Siege Technologies with a background in cryptography and hacking, "... said he set out to create the equivalent of the military’s so-called probability of kill metric, a statistical analysis of whether an attack is likely to succeed. 'I feel more comfortable working on electronic warfare,' he said. 'It’s a little different than bombs and nuclear weapons -- that’s a morally complex field to be in. Now instead of bombing things and having collateral damage, you can really reduce civilian casualties, which is a win for everybody.'" Leaked Documents See more AfterMidnight 12 May, 2017 Today, May 12th 2017, WikiLeaks publishes "AfterMidnight" and "Assassin", two CIA malware frameworks for the Microsoft Windows platform. "AfterMidnight" allows operators to dynamically load and execute malware payloads on a target machine. The main controller disguises as a self-persisting Windows Service DLL and provides secure execution of "Gremlins" via a HTTPS based Listening Post (LP) system called "Octopus". Once installed on a target machine AM will call back to a configured LP on a configurable schedule, checking to see if there is a new plan for it to execute. If there is, it downloads and stores all needed components before loading all new gremlins in memory. "Gremlins" are small AM payloads that are meant to run hidden on the target and either subvert the functionality of targeted software, survey the target (including data exfiltration) or provide internal services for other gremlins. The special payload "AlphaGremlin" even has a custom script language which allows operators to schedule custom tasks to be executed on the target machine. "Assassin" is a similar kind of malware; it is an automated implant that provides a simple collection platform on remote computers running the Microsoft Windows operating system. Once the tool is installed on the target, the implant is run within a Windows service process. "Assassin" (just like "AfterMidnight") will then periodically beacon to its configured listening post(s) to request tasking and deliver results. Communication occurs over one or more transport protocols as configured before or during deployment. The "Assassin" C2 (Command and Control) and LP (Listening Post) subsystems are referred to collectively as" The Gibson" and allow operators to perform specific tasks on an infected target.. Leaked Documents See more Archimedes 5 May, 2017 Today, May 5th 2017, WikiLeaks publishes "Archimedes", a tool used by the CIA to attack a computer inside a Local Area Network (LAN), usually used in offices. It allows the re-directing of traffic from the target computer inside the LAN through a computer infected with this malware and controlled by the CIA. This technique is used by the CIA to redirect the target's computers web browser to an exploitation server while appearing as a normal browsing session. The document illustrates a type of attack within a "protected environment" as the the tool is deployed into an existing local network abusing existing machines to bring targeted computers under control and allowing further exploitation and abuse. Leaked Documents See more Scribbles 28 April, 2017 Today, April 28th 2017, WikiLeaks publishes the documentation and source code for CIA's "Scribbles" project, a document-watermarking preprocessing system to embed "Web beacon"-style tags into documents that are likely to be copied by Insiders, Whistleblowers, Journalists or others. The released version (v1.0 RC1) is dated March, 1st 2016 and classified SECRET//ORCON/NOFORN until 2066. Scribbles is intended for off-line preprocessing of Microsoft Office documents. For reasons of operational security the user guide demands that "[t]he Scribbles executable, parameter files, receipts and log files should not be installed on a target machine, nor left in a location where it might be collected by an adversary." According to the documentation, "the Scribbles document watermarking tool has been successfully tested on [...] Microsoft Office 2013 (on Windows 8.1 x64), documents from Office versions 97-2016 (Office 95 documents will not work!) [and d]ocuments that are not be locked forms, encrypted, or password-protected". But this limitation to Microsoft Office documents seems to create problems: "If the targeted end-user opens them up in a different application, such as OpenOffice or LibreOffice, the watermark images and URLs may be visible to the end-user. For this reason, always make sure that the host names and URL components are logically consistent with the original content. If you are concerned that the targeted end-user may open these documents in a non-Microsoft Office application, please take some test documents and evaluate them in the likely application before deploying them." Security researches and forensic experts will find more detailed information on how watermarks are applied to documents in the source code, which is included in this publication as a zipped archive. Leaked Documents Weeping Angel 21 April, 2017 Today, April 21st 2017, WikiLeaks publishes the User Guide for CIA's "Weeping Angel" tool - an implant designed for Samsung F Series Smart Televisions. Based on the "Extending" tool from the MI5/BTSS, the implant is designed to record audio from the built-in microphone and egress or store the data. The classification marks of the User Guide document hint that is was originally written by the british MI5/BTSS and later shared with the CIA. Both agencies collaborated on the further development of the malware and coordinated their work in Joint Development Workshops. Leaked Documents Hive 14 April, 2017 Today, April 14th 2017, WikiLeaks publishes six documents from the CIA's HIVE project created by its "Embedded Development Branch" (EDB). HIVE is a back-end infrastructure malware with a public-facing HTTPS interface which is used by CIA implants to transfer exfiltrated information from target machines to the CIA and to receive commands from its operators to execute specific tasks on the targets. HIVE is used across multiple malware implants and CIA operations. The public HTTPS interface utilizes unsuspicious-looking cover domains to hide its presence. Anti-Virus companies and forensic experts have noticed that some possible state-actor malware used such kind of back-end infrastructure by analyzing the communication behaviour of these specific implants, but were unable to attribute the back-end (and therefore the implant itself) to operations run by the CIA. In a recent blog post by Symantec, that was able to attribute the "Longhorn" activities to the CIA based on the Vault 7, such back-end infrastructure is described: For C&C servers, Longhorn typically configures a specific domain and IP address combination per target. The domains appear to be registered by the attackers; however they use privacy services to hide their real identity. The IP addresses are typically owned by legitimate companies offering virtual private server (VPS) or webhosting services. The malware communicates with C&C servers over HTTPS using a custom underlying cryptographic protocol to protect communications from identification. The documents from this publication might further enable anti-malware researchers and forensic experts to analyse this kind of communication between malware implants and back-end servers used in previous illegal activities. Leaked Documents See more Grasshopper 7 April, 2017 Today, April 7th 2017, WikiLeaks releases Vault 7 "Grasshopper" -- 27 documents from the CIA's Grasshopper framework, a platform used to build customized malware payloads for Microsoft Windows operating systems. Grasshopper is provided with a variety of modules that can be used by a CIA operator as blocks to construct a customized implant that will behave differently, for example maintaining persistence on the computer differently, depending on what particular features or capabilities are selected in the process of building the bundle. Additionally, Grasshopper provides a very flexible language to define rules that are used to "perform a pre-installation survey of the target device, assuring that the payload will only [be] installed if the target has the right configuration". Through this grammar CIA operators are able to build from very simple to very complex logic used to determine, for example, if the target device is running a specific version of Microsoft Windows, or if a particular Antivirus product is running or not. Grasshopper allows tools to be installed using a variety of persistence mechanisms and modified using a variety of extensions (like encryption). The requirement list of the Automated Implant Branch (AIB) for Grasshopper puts special attention on PSP avoidance, so that any Personal Security Products like 'MS Security Essentials', 'Rising', 'Symantec Endpoint' or 'Kaspersky IS' on target machines do not detect Grasshopper elements. One of the persistence mechanisms used by the CIA here is 'Stolen Goods' - whose "components were taken from malware known as Carberp, a suspected Russian organized crime rootkit." confirming the recycling of malware found on the Internet by the CIA. "The source of Carberp was published online, and has allowed AED/RDB to easily steal components as needed from the malware.". While the CIA claims that "[most] of Carberp was not used in Stolen Goods" they do acknowledge that "[the] persistence method, and parts of the installer, were taken and modified to fit our needs", providing a further example of reuse of portions of publicly available malware by the CIA, as observed in their analysis of leaked material from the italian company "HackingTeam". The documents WikiLeaks publishes today provide an insights into the process of building modern espionage tools and insights into how the CIA maintains persistence over infected Microsoft Windows computers, providing directions for those seeking to defend their systems to identify any existing compromise Leaked Documents See more Marble Framework 31 March, 2017 Today, March 31st 2017, WikiLeaks releases Vault 7 "Marble" -- 676 source code files for the CIA's secret anti-forensic Marble Framework. Marble is used to hamper forensic investigators and anti-virus companies from attributing viruses, trojans and hacking attacks to the CIA. Marble does this by hiding ("obfuscating") text fragments used in CIA malware from visual inspection. This is the digital equivallent of a specalized CIA tool to place covers over the english language text on U.S. produced weapons systems before giving them to insurgents secretly backed by the CIA. Marble forms part of the CIA's anti-forensics approach and the CIA's Core Library of malware code. It is "[D]esigned to allow for flexible and easy-to-use obfuscation" as "string obfuscation algorithms (especially those that are unique) are often used to link malware to a specific developer or development shop." The Marble source code also includes a deobfuscator to reverse CIA text obfuscation. Combined with the revealed obfuscation techniques, a pattern or signature emerges which can assist forensic investigators attribute previous hacking attacks and viruses to the CIA. Marble was in use at the CIA during 2016. It reached 1.0 in 2015. The source code shows that Marble has test examples not just in English but also in Chinese, Russian, Korean, Arabic and Farsi. This would permit a forensic attribution double game, for example by pretending that the spoken language of the malware creator was not American English, but Chinese, but then showing attempts to conceal the use of Chinese, drawing forensic investigators even more strongly to the wrong conclusion, --- but there are other possibilities, such as hiding fake error messages. The Marble Framework is used for obfuscation only and does not contain any vulnerabilties or exploits by itself. Leaked Documents Dark Matter 23 March, 2017 Today, March 23rd 2017, WikiLeaks releases Vault 7 "Dark Matter", which contains documentation for several CIA projects that infect Apple Mac firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA's Embedded Development Branch (EDB). These documents explain the techniques used by CIA to gain 'persistence' on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware. Among others, these documents reveal the "Sonic Screwdriver" project which, as explained by the CIA, is a "mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting" allowing an attacker to boot its attack software for example from a USB stick "even when a firmware password is enabled". The CIA's "Sonic Screwdriver" infector is stored on the modified firmware of an Apple Thunderbolt-to-Ethernet adapter. "DarkSeaSkies" is "an implant that persists in the EFI firmware of an Apple MacBook Air computer" and consists of "DarkMatter", "SeaPea" and "NightSkies", respectively EFI, kernel-space and user-space implants. Documents on the "Triton" MacOSX malware, its infector "Dark Mallet" and its EFI-persistent version "DerStarke" are also included in this release. While the DerStarke1.4 manual released today dates to 2013, other Vault 7 documents show that as of 2016 the CIA continues to rely on and update these systems and is working on the production of DerStarke2.0. Also included in this release is the manual for the CIA's "NightSkies 1.2" a "beacon/loader/implant tool" for the Apple iPhone. Noteworthy is that NightSkies had reached 1.2 by 2008, and is expressly designed to be physically installed onto factory fresh iPhones. i.e the CIA has been infecting the iPhone supply chain of its targets since at least 2008. While CIA assets are sometimes used to physically infect systems in the custody of a target it is likely that many CIA physical access attacks have infected the targeted organization's supply chain including by interdicting mail orders and other shipments (opening, infecting, and resending) leaving the United States or otherwise. Leaked Documents See more Media Partners DER SPIEGEL - Germany LA REPUBBLICA - Italy LIBERATION - France MEDIAPART - France Expert Organizations
more...
No comment yet.
Scooped by CineversityTV
Scoop.it!

#Yes #corrupt Mariano #Rajoy ousted as #Spain's prime minister #Catalonia #indignados #Barcelona

#Yes #corrupt Mariano #Rajoy ousted as #Spain's prime minister #Catalonia #indignados #Barcelona | The uprising of the people against greed and repression | Scoop.it
Parliament passes vote of no confidence in ruling People’s party over corruption scandal...
more...
No comment yet.
Scooped by CineversityTV
Scoop.it!

�� #EU moves to block #warmonger #US sanctions on #Iran | Al Jazeera English

EU leaders are planning to legally block companies from complying with any new US sanctions on Iran that were imposed when President Donald Trump pulled ou
more...
No comment yet.
Scooped by CineversityTV
Scoop.it!

'I peed the bed out of fear': #Jazz star Madeleine #Peyroux on #Trump's new #fascism

'I peed the bed out of fear': #Jazz star Madeleine #Peyroux on #Trump's new #fascism | The uprising of the people against greed and repression | Scoop.it
A socialist background echoes loudly in songs protesting 'the brand new deal'....
more...
No comment yet.
Scooped by CineversityTV
Scoop.it!

#WikiLeaks - #Macron Campaign Emails #France #EU

#WikiLeaks - #Macron Campaign Emails #France #EU | The uprising of the people against greed and repression | Scoop.it
Today, Monday 31 July 2017, WikiLeaks publishes a searchable archive of 21,075 unique verified emails associated with the French presidential campaign of Emmanual Macron. The emails range from 20 March 2009 to 24 April 2017. The 21,075 emails have been individually forensically verified by WikiLeaks through its DKIM system. The full archive of 71,848 emails with 26,506 attachments from 4,493 unique senders is provided for context. WikiLeaks only certifies as verified the 21,075 emails marked with its green "DKIM verified" banner however based on statistical sampling the overwheling majority of the rest of the emails archive are authentic. As the emails are often in chains and include portions of each other it is usually possible to confirm the integrity other emails in the chain as a result of the DKIM verified emails within it. Guillaume Poupard, the head of French government cyber security agency ANSSI, told AP on June 1 this year that the method used to obtain the emails resembled the actions of an "isolated individual". Poupard stated that, contrary to media speculation, ANSSI could not attribute the attack to Russia and that France had previously been subject to hacking attacks designed to falsify attribution.
more...
No comment yet.
Scooped by CineversityTV
Scoop.it!

#US is Determined to Block #Freedom of Speech in Form of #WikiLeaks #Assange fight the evil #USempire

#US is Determined to Block #Freedom of Speech in Form of #WikiLeaks #Assange fight the evil #USempire | The uprising of the people against greed and repression | Scoop.it
WikiLeaks has called for a global blockade of Coinbase after its online store was banned from using Coinbase’s services. The world’s biggest bitcoin brokerage imposed a ban for violating US financial regulations, without specifying which ones.
more...
No comment yet.
Scooped by CineversityTV
Scoop.it!

#WikiLeaks is a rare #truth-teller. Smearing Julian #Assange is shameful. We agree

#WikiLeaks is a rare #truth-teller. Smearing Julian #Assange is shameful. We agree | The uprising of the people against greed and repression | Scoop.it
WikiLeaks is a rare truth-teller. Smearing Julian Assange is shameful.
more...
No comment yet.
Scooped by CineversityTV
Scoop.it!

Taika #Waititi’s comments on #racism in #NewZealand got people talking

Taika #Waititi’s comments on #racism in #NewZealand got people talking | The uprising of the people against greed and repression | Scoop.it
In a recent interview on Dazed, the filmmaker said the country was ‘racist as fuck’
more...
No comment yet.
Scooped by CineversityTV
Scoop.it!

#Wyoming #football players fought #racism on the field decades ago in #America #history repeating with #KKK #Trump

#Wyoming #football players fought #racism on the field decades ago in #America #history repeating with #KKK #Trump | The uprising of the people against greed and repression | Scoop.it
LARAMIE, WY— A new short film “Black 14” tells the story of a group of University of Wyoming students who tried to stand up against racism on the football field. Spoiler alert: it didn’t go well for them. But the …
more...
No comment yet.
Scooped by CineversityTV
Scoop.it!

Julian #Assange ‘Dead Man's Switch’? Global Support after Silence of #Wikileaks Founder

Julian #Assange ‘Dead Man's Switch’? Global Support after Silence of #Wikileaks Founder | The uprising of the people against greed and repression | Scoop.it
The Goldwater - Julian Assange ‘Dead Man's Switch’? Global Support after Silence of Wikileaks Founder
more...
No comment yet.
Scooped by CineversityTV
Scoop.it!

Birgitta #Jonsdottir - #Wikileaks and Freedom of Information

Birgitta #Jonsdottir - #Wikileaks and Freedom of Information | The uprising of the people against greed and repression | Scoop.it
Birgitta Jonsdottir – Wikileaks and Freedom of Information Cultural Studies, 2011 Presented By: Birgitta Jónsdóttir As a co-producer of the “Collateral Murder” Wikileaks video, Icelandic MP Birgitta Jonsdottir has a lot to say about freedom of information. In this talk, she discusses her activism and the legislation she is bringing about to keep information available in the public domain.
more...
No comment yet.
Scooped by CineversityTV
Scoop.it!

#MacBeth Sibaya: #Racism in South #Africa worse than #Russia

#MacBeth Sibaya: #Racism in South #Africa worse than #Russia | The uprising of the people against greed and repression | Scoop.it
Former Bafana Bafana player MacBeth Sibaya, who played for Rubin Kazan for seven years, insists racism back home in South Africa is a lot worse than in Russia.
more...
No comment yet.
Scooped by CineversityTV
Scoop.it!

#corrupt Mariano #Rajoy #PM #Spain to step down as leader of People’s party | #Catalonia #independence

#corrupt Mariano #Rajoy #PM #Spain to step down as leader of People’s party | #Catalonia #independence | The uprising of the people against greed and repression | Scoop.it
Announcement comes days after he was ousted as Spain’s PM by a vote of no-confidence...
more...
No comment yet.
Rescooped by CineversityTV from 21st Century Innovative Technologies and Developments as also discoveries, curiosity ( insolite)...
Scoop.it!

#Microsoft has acquired #GitHub for $7.5B in stock | #Acquisitions will the platform be safe?

#Microsoft has acquired #GitHub for $7.5B in stock | #Acquisitions will the platform be safe? | The uprising of the people against greed and repression | Scoop.it

After a week of rumors, Microsoft today confirmed that it has acquired GitHub, the popular Git-based code sharing and collaboration service. The price of the acquisition was $7.5 billion in Microsoft stock. GitHub raised $350 million and we know that the company was valued at about $2 billion in 2015.

Former Xamarin CEO Nat Friedman (and now Microsoft corporate vice president) will become GitHub’s CEO. GitHub funder and former CEO Chris Wanstrath will become a Microsoft technical fellow and work on strategic software initiatives. Wanstrath had retaken his CEO role after his co-founder Tom Preston-Werner resigned following a harassment investigation in 2014.

GitHub says that as of March 2018, there were 28 million developers in its community, and 85 million code repositories, making it the largest host of source code globally and a cornerstone of how many in the tech world build software.

But despite its popularity with enterprise users, individual developers and open source projects, GitHub has never turned a profit and chances are that the company decided that an acquisition was preferable over trying to IPO.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/21st-century-innovative-technologies-and-developments/?&tag=Acquisitions

 

 


Via Gust MEES
more...
Gust MEES's curator insight, June 4, 9:28 AM

After a week of rumors, Microsoft today confirmed that it has acquired GitHub, the popular Git-based code sharing and collaboration service. The price of the acquisition was $7.5 billion in Microsoft stock. GitHub raised $350 million and we know that the company was valued at about $2 billion in 2015.

Former Xamarin CEO Nat Friedman (and now Microsoft corporate vice president) will become GitHub’s CEO. GitHub funder and former CEO Chris Wanstrath will become a Microsoft technical fellow and work on strategic software initiatives. Wanstrath had retaken his CEO role after his co-founder Tom Preston-Werner resigned following a harassment investigation in 2014.

GitHub says that as of March 2018, there were 28 million developers in its community, and 85 million code repositories, making it the largest host of source code globally and a cornerstone of how many in the tech world build software.

But despite its popularity with enterprise users, individual developers and open source projects, GitHub has never turned a profit and chances are that the company decided that an acquisition was preferable over trying to IPO.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/21st-century-innovative-technologies-and-developments/?&tag=Acquisitions

 

Scooped by CineversityTV
Scoop.it!

30% of #Greece's workers earn monthly just €385 gross, i.e. below #unemployment allowance #EU

30% of #Greece's workers earn monthly just €385 gross, i.e. below #unemployment allowance #EU | The uprising of the people against greed and repression | Scoop.it
Thirty percent of Greece's workers, that is more than 620,000 people, in private sector earn just 385.83 euros gross. Their net income is below the unemployment benefit.This has to do with the increasing rates in part-time jobs and the low salaries and wages in austerity and bailout agreements...
more...
No comment yet.
Scooped by CineversityTV
Scoop.it!

Narco News: #US, Mexican Officials Brokering Deals with Drug “Cartels,” #WikiLeaks Documents Show

Narco News: #US, Mexican Officials Brokering Deals with Drug “Cartels,” #WikiLeaks Documents Show | The uprising of the people against greed and repression | Scoop.it
US, Mexican Officials Brokering Deals with Drug “Cartels,” WikiLeaks Documents Show Revelation Exposed in Email Correspondence Between Private Intelligence Firm and Mexican Diplomat By Bill Conroy Special to The Narco News Bulletin August 20, 2012 A high-ranking Sinaloa narco-trafficking organization member’s claim that US officials have struck a deal with the leadership of the Mexican “cartel” appears to be corroborated in large part by the statements of a Mexican diplomat in email correspondence made public recently by the nonprofit media group WikiLeaks. Jesus Vicente Zambada Niebla after his arrest in Mexico City The Mexican diplomat’s assessment of the US and Mexican strategy in the war on drugs, as revealed by the email trail, paints a picture of a “simulated war” in which the Mexican and US governments are willing to show favor to a dominant narco-trafficking organization in order to minimize the violence and business disruption in the major drug plazas, or markets. A similar quid-pro-quo arrangement is precisely what indicted narco-trafficker Jesus Vicente Zambada Niebla, who is slated to stand trial in Chicago this fall, alleges was agreed to by the US government and the leaders of the Sinaloa “Cartel” — the dominate narco-trafficking organization in Mexico. The US government, however, denies that any such arrangement exists. Mexican soldiers arrested Zambada Niebla in late March 2009 after he met with DEA agents in a posh Mexico City hotel, a meeting arranged by a US government informant who also is a close confident of Ismael “El Mayo” Zambada Garcia (Zambada Niebla’s father) and Chapo Guzman — both top leaders of the Sinaloa drug organization. The US informant, Mexican attorney Humberto Loya Castro, by the US government’s own admission in court pleadings in the Zambada Niebla criminal case, served as an intermediary between the Sinaloa Cartel leadership and US government agencies seeking to obtain information on rival narco-trafficking organizations. According to Zambada Niebla, he and the rest of the Sinaloa leadership, through the US informant Loya Castro, negotiated an immunity deal with the US government in which they were guaranteed protection from prosecution in exchange for providing US law enforcers and intelligence agencies with information that could be used to compromise rival Mexican cartels and their operations. “The United States government considered the arrangements with the Sinaloa Cartel an acceptable price to pay, because the principal objective was the destruction and dismantling of rival cartels by using the assistance of the Sinaloa Cartel — without regard for the fact that tons of illicit drugs continued to be smuggled into Chicago and other parts of the United States and consumption continued virtually unabated,” Zambada Niebla’s attorneys argue in pleadings in his case. Email Trail The emails, obtained and made public by WikiLeaks, involve correspondence between a Mexican diplomat codenamed MX1 and an Austin, Texas-based intelligence firm called Stratfor— which describes itself as a privately owned, “subscription-based provider of geopolitical analysis.” Stratfor has been billed in some media reports as a “shadow CIA.” In a Stratfor email dated April 19, 2010, MX1 lays out the Mexican government’s negotiating, or “signaling,” strategy with respect to the major narco-trafficking organizations as follows: The Mexican strategy is not to negotiate directly. In any event, “negotiations” would take place as follows: Assuming a non-disputed plaza [— a major drug market, such as Ciudad Juarez]: • [If] they [a big narco-trafficking group] bring [in] some drugs, transport some drugs, [and] they are discrete, they don’t bother anyone, [then] no one gets hurt; • [And the] government turns the other way. • [If] they [the narco-traffickers] kill someone or do something violent, [then the] government responds by taking down [the] drug network or making arrests. (Now, assuming a disputed plaza:) • [A narco-trafficking] group comes [into a plaza], [then the] government waits to see how dominant cartel responds. • If [the] dominant cartel fights them [the new narco-trafficking group], [then the] government takes them down. • If [the] dominant cartel is allied [with the new group], no problem. • If [a new] group comes in and start[s] committing violence, they get taken down: first by the government letting the dominant cartel do their thing, then [by] punishing both cartels. MX1 then goes on to describe what he interprets as the US strategy in negotiating with the major narco-trafficking players in Ciudad Juarez — a major Mexican narco-trafficking “plaza” located across the border from El Paso, Texas: … This is how “negotiations” take place with cartels, through signals. There are no meetings, etc…. So, the MX [Mexican] strategy is not to negotiate. However, I think the US [recently] sent a signal that could be construed as follows: “To the VCF [the Vicente Carrillo Fuentes] and Sinaloa cartels: Thank you for providing our market with drugs over the years. We are now concerned about your perpetration of violence, and would like to see you stop that. In this regard, please know that Sinaloa is bigger and better than [the] VCF. Also note that CDJ [Juarez] is very important to us, as is the whole border. In this light, please talk amongst yourselves and lets all get back to business. Again, we recognize that Sinaloa is bigger and better, so either VCF gets in line or we will mess you up.” I don’t know what the US strategy is, but I can tell you that if the message was understood by Sinaloa and VCF as I described above, the Mexican government would not be opposed at all. In sum, I have a gut feeling that the US agencies tried to send a signal telling the cartels to negotiate themselves. They unilaterally declared a winner [the Sinaloa Cartel], and this is unprecedented, and deserves analysis. If there was no strategy behind this, and it was simply a leaked report, then I will be interested to see how it plays out in the coming months. In a separate Stratfor email dated April 15, 2010, MX1’s views on the US strategy with respect to the drug organizations in Juarez, essentially favoring the Sinaloa “Cartel,” is referenced yet again: Crime scene along a Mexican freeway in the aftermath of a drug-war-related murder. We believe that when the US made an announcement that was corroborated by several federal spokespersons simultaneously (that Sinaloa controlled CDJ [Juarez]), it was a message that the DEA wanted to send to Sinaloa. The message was that the US recognized Sinaloa’s dominance in the area [Juarez], although it was not absolute. It was meant to be read by the cartels as a sort of ultimatum: negotiate and put your house in order once and for all. One dissenting analyst thinks that the message is the opposite, telling Sinaloa to take what it had and to leave what remains of VCF. Regardless, the reports are saying that the US message to the cartels was to negotiate and stop the violence. It says that the US has never before pronounced that a cartel controls a particular plaza, so it is an unusual event. And in yet a third Stratfor email, dated June 3, 2010, the Mexican diplomat MX1 confirms that a deal was cut between drug organizations in Tijuana, Mexico, just south of San Diego, Calif., with the direct intervention of US and Mexican law enforcers. MX1 then, once again, revisits the alleged quid-pro-quo strategy he believes the US government is seeking to advance in Juarez. From the June 3, 2010, email: There have been more developments. I found out that there is a group of US and Mexican LE [law enforcement] that discretely attempted, and succeeded, in brokering a deal in Tijuana. If you notice, Tijuana violence has nearly ceased. There are only minor skirmishes that do not appear to be tied to any major cartel. It was this same group of guys that presented their “signaling strategy” and attempted it for CDJ [Juarez]. It is not so much a message for the Mexican government as it is for the Sinaloa cartel and VCF [the Juarez Cartel] themselves. Basically, the message they want to send out is that Sinaloa is winning and that the violence is unacceptable. They want the CARTELS to negotiate with EACH OTHER. The idea is that if they can do this, violence will drop and the governments will allow controlled drug trades. [Emphasis added.] Unfortunately, CDJ [Juarez] is not ripe for this kind of activity, as the major routes and methods for bulk shipping into the US have already been negotiated with US authorities. In this sense, the message that Sinaloa was winning was, in my view, intended to tell SEDENA [the Mexican military] to stop taking down large trucks full of dope as they made their way to the US. These large shipments were Sinaloa’s, and they are OK with the Americans. The argument is that most of the violence [in Juarez] remains related to the local market, and that SEDENA should focus on smaller gangs and fringe groups that try to cross smaller quantities…. More sources The description of MX1 in the Stratfor emails matches the publicly available information on Fernando de la Mora Salcedo, a Mexican foreign service officer who studied law at the University of New Mexico, served in the Mexican Consulate in El Paso, Texas, and is currently stationed as a consul in the Mexican Consulate in Phoenix. In one Stratfor email, with the subject line “Fwd: Another question for MX1,” a query from Stratfor analysts is directed to MX1, and his real name is revealed as Fernando de la Mora. The emails between the MX1 and Stratfor obtained by WikiLeaks were drafted between 2008 and 2011. He is described in one of them, as revealed in a prior Narco News report, as “being molded to be the Mexican ‘tip of the spear’ in the US.” Narco News has contacted the offices of de la Mora and Stratfor for comment on the email correspondence. To date, they have not responded. Beyond the deal brokering strategy he outlines in the Stratfor emails, MX1, in a Stratfor email dated April 4, 2010, also makes clear that, at the highest levels of the Mexican government, there is a recognition that the door is wide open to direct US involvement in Mexico’s drug war. From that email: Finally, the important observation: We are effectively at the start of a paradigm shift regarding sovereignty and how we see cooperation with the US. When the General in charge of all military education said that Mexico could not do this alone and that US military and LE [law enforcement] assistance was needed, no one shot him down. He was told by the [Mexican] Minister of Defense to say what he did. Everyone in the high levels of government is starting to recognize that more US involvement is necessary. In the mid-levels, it sounds more like a crazed cry for help. MX1 is not the only “source” providing intelligence to Stratfor’s analysts, according to the email correspondence obtained by WikiLeaks. Other US and Mexican officials providing information to the private intelligence firm, according to the Stratfor email trail, include MX31 (A CISEN bureau chief; CISEN is Mexico’s equivalent to the CIA); MX301, a former Mexican cop; MX702, a senior Mexican intelligence officer; US706, a US journalist; US711, a US law enforcement agent with border liaison responsibilities; and US714, a US law enforcement officer with direct oversight of border investigations. Unlike MX1, whose real identity is revealed in the Stratfor emails, information on the other sources’ identities was not available — at least not at this point in Narco News’ investigation. However, Stratfor emails involving US714 did provide direct corroboration of MX1’s claim that the path has been cleared for direct US involvement in the drug war in Mexico. In a Stratfor email dated Oct. 28, 2011, with the subject line, “Nuevo Laredo Firefight is Mex Op with US Help-US714,” the following is attributed to the US law enforcement officer overseeing border investigations: Mx [Mexico] planned [the] ops [operation] with U.S. help. [The firefight was a] MX PLANNED ops with “some US DOD [Department of Defense] assets [personnel and equipment].” Clean-up crew at the House of Death in Juarez, Mexico. Twelve bodies were discovered buried in the backyard of the house—all murder victims. In another Stratfor email dated June 15, 2011, titled “Re: Insight-Mexico-US Special Forces in Mexico-US714,” the US law enforcement supervisor is identified as the source for the following information (which Narco News has confirmed previously via other sources]: U.S. special operations forces are currently in Mexico. Small-scale joint ops [operations] with Mexico’s [special forces], but they are there. The Mexican diplomat MX1 also confirmed the same information, according to a separate Stratfor email: Information about US military involvement in Mexico is provided only as a need to know basis. The Americans have been adamant about this, and we agree even more. Therefore, I can confirm that there is Marine presence, but I don’t know if it is MFR [Marine Force Recon]. [Emphasis added.] …Furthermore, operational coordination and indeed joint exercises have been conducted, and there are more in the planning stages. We do indeed have US military presence in Mexico as part of the MI [Merida Initiative] coordination office (even though they are sometimes under official cover as DOS [Department of State], etc….) There are advisors and intelligence operatives that work on the tactical level with their Mexican counterparts…. Another remarkable claim also is attributed to Stratfor source US714 in an email dated April 1, 2011: Regarding ICE [US Immigration and Customs Enforcement] screwing up informants: They [ICE] were handling big hit men from Juarez and letting them kill in the U.S. Though Stratfor source US714’s revelation may seem too dark to be true, Narco News has already documented, via the multi-year House of Death investigative series, that ICE, with the approval of US prosecutors, allowed one of its informants to participate in multiple murders inside Mexico in order to make a drug case. Narco News was provided access to the Stratfor emails through an investigative partnership organized by WikiLeaks that includes journalists, academics and human rights organizations. Lea Ud. el Artículo en Español Discussion of this article from The Narcosphere Narco News is funded by your contributions to The Fund for Authentic Journalism.  Please make journalism like this possible by going to The Fund's web site and making a contribution today. - The Fund for Authentic Journalism For more Narco News, click here.
more...
No comment yet.
Scooped by CineversityTV
Scoop.it!

#WikiLeaks - The Hackingteam Archives

#WikiLeaks - The Hackingteam Archives | The uprising of the people against greed and repression | Scoop.it
You arre welcome, EricRabe@ME.COM ! :-) David --  David Vincenzetti  CEO Hacking Team Milan Singapore Washington DC www.hackingteam.com email: d.vincenzetti@hackingteam.com  mobile: +39 3494403823  phone: +39 0229060603  On May 4, 2015, at 3:10 AM, Eric Rabe <ericrabe@me.com> wrote: Many thanks, Eric On 4 May 2015, at 15:40, David Vincenzetti <d.vincenzetti@hackingteam.com> wrote: Please find a webinar invitation by CrowdStrike most likely worth watching. CrowdStrike is a distinguished and authoritative security company offering Security as a Service (SaaS) security prevention, DETECTION and RESPONSE at its best. This webinar is taking place on Thursday, Mat 7th last 0200pm ET. FYI,David   Join our live CrowdCast: Playing Chess Against Pandas and Bears Defending your organization against advanced international adversaries can feel like a high-stakes chess game. Each move and countermove carries consequences that could determine the final outcome of the match. In this detailed "how-to" session, principals of CrowdStrike's world class services team will discuss how to quickly size up your adversaries and implement a winning strategy to keep your environment secure from attack.  Join CrowdStrike's Christopher Scott and Justin Weissert as they share:  The latest TTPs attackers are using to monopolize the board The countermoves CrowdStrike employs against advanced global adversaries, including organized crime, hactivists and nation-state actors Defensive strategies to build a proactive wall against attackers attempting to use your own credentials against you How endpoint activity monitoring and protection can help you anticipate the adversary's next moves, and defend against them Why speed to remediation is critical to your business if/when you are compromised Register now to attend and learn business critical strategies you can implement in your organization today.          Register Today!  Thursday, May 7th  2pm - 3pm EDT About Our Speakers:  Christopher Scott has over 17 years experience working with the Department of Defense, Fortune 500 and Defense Industrial Base to develop business and network security processes and procedures. He has particular expertise in targeted threat detection and prevention and currently services as the Director of Remediation at CrowdStrike Services.---Justin Weissert is a Principal Consultant with the CrowdStrike Services team where he focuses on delivering the company's strategic services offerings. As an expert in strategy and development, he supports incident response engagements in a project manager or remediation specialist capacity.      CrowdStrike Corporate Headquarters, 15440 Laguna Canyon Road, Suite 250, Irvine, CA 92618 --  David Vincenzetti  CEO Hacking Team Milan Singapore Washington DC www.hackingteam.com
more...
No comment yet.
Scooped by CineversityTV
Scoop.it!

#Facebook Teams Up With Shady #DARPA Exec To Scan Your #Brain And Augment Your Reality #BigBrother 1984

#Facebook Teams Up With Shady #DARPA Exec To Scan Your #Brain And Augment Your Reality #BigBrother 1984 | The uprising of the people against greed and repression | Scoop.it
Social media is not the only business for Facebook.As part of an ongoing research and development venture, a project called Building 8 was created to develop technology “in the style of DARPA.”...
more...
No comment yet.
Scooped by CineversityTV
Scoop.it!

Two years' detention for #UK #teenager #Gamble who 'cyberterrorised' US officials #CIA exposing the #truth gets you jail

Two years' detention for #UK #teenager #Gamble who 'cyberterrorised' US officials #CIA exposing the #truth gets you jail | The uprising of the people against greed and repression | Scoop.it
Kane Gamble, 18, targeted CIA and FBI chiefs from Leicestershire housing estate
more...
No comment yet.
Rescooped by CineversityTV from De-Constructing Empire: Revolution, Food Securiity, Community Development
Scoop.it!

Hundreds of thousands demand release of #independence leaders in #Barcelona #Catalonia

Hundreds of thousands demand release of #independence leaders in #Barcelona #Catalonia | The uprising of the people against greed and repression | Scoop.it

More than 300,000 took to the streets of Barcelona on Sunday to demand that the Spanish government in Madrid release the Catalan independence movement leaders that are being held in detention ahead of the trial.
The protesters, carrying numerous Catalan flags, walked behind a huge banner reading: “For rights and liberties, for democracy and unity, we want them back home!” Many in the crowd also chanted: "Freedom for the political prisoners."


Via ThePlanetaryArchives
more...
No comment yet.
Rescooped by CineversityTV from De-Constructing Empire: Revolution, Food Securiity, Community Development
Scoop.it!

‘Mutant fish in murky waters’: #US brings chaos to the world & has no real friends #Russia #UN envoy #truth hurts

‘Mutant fish in murky waters’: #US brings chaos to the world & has no real friends #Russia #UN envoy #truth hurts | The uprising of the people against greed and repression | Scoop.it
Russia has warned the US and its allies against “fishing in murky waters” of the Middle East, causing further chaos there. The US shouldn’t assume it has friends, only countries unable to disagree, UN envoy Vassily Nebenzia said.

 

The US and its allies have failed to understand the warning of Russian President Vladimir Putin’s words at the 2015 UN General Assembly, ambassador Nebenzia told the Security Council on Monday.

 

“Do you now understand what you have done?” Nebenzia repeated Putin’s question about the West’s reckless geopolitical games in the Middle East. “No, you do not.”

 

“What [the] military misadventures of the West bring about is well known, as shown by the examples of Yugoslavia, Iraq and Libya. Nobody has vested you with the power to act like the world’s policeman, or to act like the prosecutor, judge, and executioner either,” he said.


Via ThePlanetaryArchives
more...
Lawrence Whaley's curator insight, April 22, 5:04 PM
Russia, don't Russia got a whole stolen country (Crimea) hanging out its back pocket.
Scooped by CineversityTV
Scoop.it!

#share #WikiLeaks founder Julian #Assange arbitrarily detained by #Sweden and the #UK, #UN panel finds human #rights #truth

#share #WikiLeaks founder Julian #Assange arbitrarily detained by #Sweden and the #UK, #UN panel finds human #rights #truth | The uprising of the people against greed and repression | Scoop.it
The founder of the WikiLeaks website, which published confidential diplomatic information, has been arbitrarily detained by Sweden and the United Kingdom since his arrest in London in December 2010, as a result of the legal action against him by both Governments, the United Nations Working Group on Arbitrary Detention said today.
more...
No comment yet.