Important change: PedoGate instead of PizzaGate. A very interesting interview that might be deleted by YouTube but has been posted elsewhere. The citizen investigation continues.
Robert Steele: “I Told You So” — From Elections to Yahoo, Everyone Has Been Grossly Irresponsible on Cyber-Security
Corruption, Government
The below letter was sent to the White House point person for cyber-security in 1994. I introduced NSA to hackers (they brought two bus-loads to my 1993 conference), co-founded the Information Warfare Conference with Winn Schwartau, and was the opening speaker at Hackers on Planet Earth (HOPE) in 1994. Apart from ignoring us entirely — note that the senior cyber-security engineer at NSA co-signed our letter (he chose to be anonymous at the time) — the White House allowed the NSA to subvert the mediocre emergent communications and communications security protocols — CEOs of major corporations — including Carly Fiorina — violated their fiduciary duties to stockholders and deliberately gutted their security with infantile backdoors provided by NSA for its own convenience. It can be said that NSA's subversion of US cyber-security spawned the Chinese and Russian hacker communities.
Antechinus: The Elite Coup of 2016 – Should Barack Obama Be Impeached?
Corruption, Government
- There is an “elite” coup attempt underway against the U.S. President-elect Trump.
- The coup is orchestrated by the camp of Hillary Clinton in association with the CIA and neoconservative powers in Congress.
- The plan is to use the CIA's “Russia made Trump the winner” nonsense to swing the electoral college against him. The case would then be bumped up to Congress. Major neocon and warmonger parts of the Republicans could then move the presidency to Clinton or, if that fails, put Trump's vice president-elect Mike Pence onto the throne. The regular bipartisan war business, which a Trump presidency threatens to interrupt, could continue.
- Should the coup succeed violent insurrections in the United States are likely to ensue with unpredictable consequences.
– – – – –
Continue reading “Antechinus: The Elite Coup of 2016 – Should Barack Obama Be Impeached?”
Chuck Spinney: Andrew Cockburn’s Questions Challenging the (False) CIA Assertion That Russians Did the Hacking…
Corruption, Government
Questions for the Electors on Russian Hacking
by ANDREW COCKBURN, Counterpunch, 14 December 2016
It is being reported that John Podesta, Chairman of the defeated $1.2 billion Clinton presidential campaign, is supporting the call by various officials, including at least forty Electors, that the members of the Electoral College be given a classified intelligence briefing on the alleged Russian hacking before the College votes on December 19.
In the event such a briefing comes to pass, it might be helpful if the Electors had some informed questions to ask the CIA.
Larry Nichols on Alex Jones: Coup USA – Clinton-Soros Have Flipped 30 Electors, Think They Can Get Another Eight
Civil Society, Commerce, Corruption, Cultural Intelligence, GovernmentTip of the Hat to Berto Jongman.
CounterPunch: Historical & Structural Reasons for Skepticism of CIA Claims – Remaining Agnostic on Claims of Russian Hackers
Corruption, Government, IO Deeds of War, Officers Call
Historical & Structural Reasons for Skepticism of CIA Claims: Remaining Agnostic on Claims of Russian Hackers
David Price
Suddenly, many on the American left now embrace notions of a CIA led coup against a rogue President-elect; with little discussion of the CIA’s long history of interfering in elections, covertly undermining candidates not of their liking. Now we have US liberals cheering for a possible CIA coup here at home.
Berto Jongman: James Scott, Institute for Critical Infrastructure Technology on John Brennan and CIA Being Full of Crap…
Corruption, Government
This is the best — most concise — of the many technical commentaries that make it clear CIA is completely out of its depth, has no understanding, and is almost certainly deceiving the public with its false statements.
It's the Russians! … or Is it? Cold War Rhetoric [Lies] in the Digital Age
by James Scott, Sr. Fellow, ICIT
Introduction
Malicious actors can easily position their breach to be attributed to Russia. It’s common knowledge among even script kiddies that all one needs to do is compromise a system geolocated in Russia (ideally in a government office) and use it as a beachhead for attack so that indicators of compromise lead back to Russia. For additional operational security, use publically available whitepapers and reports to determine the tool, techniques, and procedures of a well-known nation-state sponsored advanced persistent threat (APT), access Deep Web forums such as Alphabay to acquire a malware variant or exploit kit utilized in prolific attacks, and then employ the malware in new campaigns that will inevitably be attributed to foreign intelligence operations. Want to add another layer? Compromise a Chinese system, leap-frog onto a hacked Russian machine, and then run the attack from China to Russia to any country on the globe. Want to increase geopolitical tensions, distract the global news cycle, or cause a subtle, but exploitable shift in national positions? Hack a machine in North Korea and use it to hack the aforementioned machine in China, before compromising the Russian system and launching global attacks. This process is so common and simple that’s its virtually “Script Kiddie 101” among malicious cyber upstarts.
