2 TB For Life! 65% Off pCloud Lifetime

We’ve Created A Monster – Ron Paul Says It’s “Fantastic” That WikiLeaks Exposed The CIA
@Alt_News_TK @Breaking_NewsCA #alternativenews #FreePress ALTERNATIVE NEWS CENSORSHIP CONSPIRACY CORRUPTION COURTS CRIME CYBER CRIME Ethics GOVERNMENT INTERNET JUSTICE LAW LEGISLATION LIBERTY MEDIA POLITICS PRIVACY PROPAGANDA RIGHTS SOCIETY TECHNOLOGY USA VIDEO WAR WEAPONS WORLD NEWS

We’ve Created A Monster – Ron Paul Says It’s “Fantastic” That WikiLeaks Exposed The CIA

Ron Paul, the prominent libertarian communicator and three-time US presidential candidate, declared this week in a Fox Business interview that it is ā€œfantasticā€ that WikiLeaks revealed on Tuesday thousands of US Central Intelligence Agency (CIA) documents and files.

Speaking with host Kennedy, Paul further says that the information exposed “indicates that liberty is in big trouble” and states his concern about there having been insufficient media coverage of the information and outlines the potential dangers related to technology…

 


 

Paul’s discussion raises the very crucial question “do we live in a police state?” As AntiWar’s Justin Raimondo warns, the latest wikileaks revelations tell us the answer is ‘Yes’.

WikiLeaks and Julian Assange would have gone down in history as the greatest enemies of government oppression of all kinds in any case, but their latest release ā€“ a comprehensive exposĆ© of the US intelligence communityā€™s cyberwar tools and techniques ā€“ is truly the capstone of their career. And given that this release ā€“ dubbed ā€œVault 7ā€ ā€“ amounts to just one percent of the documents they intend to publish, one can only look forward to the coming days with a mixture of joyful anticipation and ominous fear.

Fear because the power of the Deep State is even more forbidding ā€“ and seemingly invincible ā€“ than anyone knew. Joyful anticipation because, for the first time, it is dawning on the most unlikely people that we are, for all intents and purposes, living in a police state. I was struck by this while watching Sean Hannityā€™s show last [Wednesday] night ā€“ yes, Fox is my go-to news channel ā€“ and listening to both Hannity and his guests, including the ultra-conservative Laura Ingraham, inveigh against the ā€œDeep State.ā€ For people like Hannity, Ingraham, and Newt Gingrich (of all people!) to be talking about the Surveillance State with fear ā€“ and outrage ā€“ in their voices says two things about our current predicament: 1) Due to the heroic efforts of Julian Assange in exposing the power and ruthlessness of the Deep State, the political landscape in this country is undergoing a major realignment, with conservatives returning to their historic role as the greatest defenders of civil liberties, and 2) American ā€œliberalismā€ ā€“ which now champions the Deep State as the savior of the country ā€“ Ā  has become a toxic brew that is fundamentally totalitarian.

On the first point: yes, there are more than a few holdouts, like Bill Oā€™Reilly and the neocons, but the latter are increasingly isolated, and the former is increasingly irrelevant. What we are seeing, as the role of the ā€œintelligence communityā€ in basically leading a seditious conspiracy against a sitting President is revealed, is a complete switch in the political polarities in this country: what passes for the ā€œleftā€ has become the biggest advocate of the Surveillance State, and the rising populist right is coming to the hard-won conclusion that we are rapidly becoming a police state.

Ah, but wait! Thatā€™s not the whole story: bear with me for a while.

The material in ā€œVault 7ā€ is extensive: it ranges from examining the ways in which a Samsung television set that is seemingly turned off can beā€“ and no doubt has been ā€“ used to spy on the conversations and activities of a roomā€™s occupants, to the various ways in which our spooks infiltrate and subvert common electronic devices, such as the I-Phone, in order to gather information. ā€œInfected phones,ā€ we are told in the introduction to the material, ā€œcan be instructed to send the CIA the userā€™s geolocation, audio and text communications as well as covertly activate the phoneā€™s camera and microphone.ā€ The CIA is even working on remotely controlling the electronic steering systems installed in cars ā€“ a perfect route to pulling off an assassination that looks like an ā€œaccident.ā€ Not that the intelligence services of the ā€œleader of the Free Worldā€ would ever consider such an act.

The massive infection of commonly used software and electronic devices leads to a major problem: proliferation. As these viruses and other invasive programs are unleashed on an unsuspecting public, they fall into the hands of a variety of bad actors: foreign governments, criminals, and teenagers on a lark (not necessarily in descending order of malevolence). This plague is being spread over the Internet by a veritable army of CIA hackers: ā€œBy the end of 2016,ā€ WikiLeaks tells us, ā€œthe CIAā€™s hacking division, which formally falls under the agencyā€™s Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other ā€˜weaponizedā€™ malware.ā€ The inevitable end result: a world infected with so much malware that computers become almost useless ā€“ and this parlous condition is paid for by you, the American taxpayer.

This is, in effect, the cybernetic equivalent of the Iraq war ā€“ an invasion that led to such unintended consequences as the rise of ISIS, the devastation of Syria, and the empowerment of Iran. In short, a war that made us less safe.

One aspect of the Vault 7 data dump thatā€™s drawing particular attention is the CIAā€™s Remote Devices Branchā€™s ā€œUmbrage group,ā€ which, we are told, ā€œcollects and maintains a substantial library of attack techniques ā€˜stolenā€™ from malware produced in other states including the Russian Federation.ā€ The idea is to mask the Agencyā€™s cyberwar operations by attempting to hide the unique forensic attributes of its techniques. The process of attribution, WikiLeaks explains, is ā€œanalogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible. As soon one murder in the set is solved then the other murders also find likely attribution.ā€

So how does the CIA hide its ā€œfingerprintsā€?

It simply draws on computer code used by its adversaries ā€“ and not only Russia ā€“ and inserts it into its own handcrafted malware and other invasive programs, thus leaving Russian (or Chinese, or North Korean) fingerprints on the handiwork of CIA hackers.

Now youā€™ll recall that the attribution of the DNC/Podesta email hacks was ā€œprovedā€ by the DNCā€™s hired hands on the basis of the supposedlyunique characteristics of the programs used by the supposed Russian hackers. One of these alleged Russians even left behind the name of Felix Dzerzhinsky ā€“ founder of the Soviet KGB ā€“ embedded in the code, hardly the height of subtlety. So now we learn that the CIA has perfected the art of imitating its rivals, mimicking the Russians ā€“ or whomever ā€“ in a perfect setup for a ā€œfalse flagā€ scenario.

After months of the nonstop campaign to demonize the Russians as ā€œsubverting our democracyā€ and supposedly throwing the election to Donald Trump by hacking the DNC and Podesta, a new possibility begins to emerge. I say ā€œpossibilityā€ because, despite the craziness that is fast becoming the norm, there has got to be a limit to it ā€“ or does there?

No, Iā€™m not suggesting the CIA hacked the DNC and poor hapless John Podesta. Yet others are suggesting something even more explosive.

In an appearance on Sean Hannityā€™s Fox News television program, retired Lt. Col. Tony Shaffer, a former senior intelligence officer, told the audience that he had heard from his intelligence contacts that retired NSA officials were responsible for hacking the DNC and Podesta, and then releasing the materials to WikiLeaks His co-guest, William Binney, a former NSA insider who was among the first to expose the extent of that agencyā€™s surveillance of American citizens, agreed.

This is nothing new: Judge Andrew Napolitano said the same thing months ago. The alleged motivation was animus toward Mrs. Clinton.

Although ā€œthe Russians did itā€ is now the accepted conventional wisdom, which hardly anyone bothers to question anymore, the level of evidence proffered to support this conclusion has been laughably inadequate. And youā€™ll note that, although the CIA and the FBI, along with other intelligence agencies, advanced this hypothesis with ā€œhigh confidence,ā€ the NSA demurred, awarding it with only ā€œmoderateā€ confidence.

And one more thing: I found it extremely odd that, when the hacking of the DNC and John Podestaā€™s email was discovered, party officials refused to let the FBI and other law enforcement agencies examine either their server or Podestaā€™s devices. Instead, they gave it over to CrowdStrike, a private firm that regularly does business with the DNC. CrowdStrike then came out with the now-accepted analysis that it was a Russian job.

Could it be that the ā€œexplanationā€ for the hacking was determined in advance?

I donā€™t know the answer to that question. Nor do I necessarily buy Col. Shafferā€™s thesis. What Iā€™m saying is that itā€™s entirely possible ā€“ indeed, it is just as likely, given what we know now, as pinning the blame Vladimir Putin.

So what is the lesson of all this?

We have created a monster, a Deep State with such unchecked power, armed with such Orwellian technology, that it represents a clear and present danger to our constitutional republic. This threat is underscored not only by the latest WikiLeaks revelations, but also by the intelligence communityā€™s intervention in our domestic politics, which has been documented in the headlines of the nationā€™s newspapers for the past few months.

This cancer has been allowed to grow, undiagnosed and unopposed, within the vitals of our government in the name of ā€œnational security.ā€ Accelerated by our foreign policy of perpetual war, the national security bureaucracy has accumulated immense power, and our elected leaders have neglected to provide any oversight. Indeed, they are at its mercy.

The latest WikiLeaks revelations should be a wake-up call for all of us who want to preserve whatā€™s left of our constitutionally-guaranteed liberties. Either we slay the monster or it will enslave us.

Q
BREAKING-NEWS.CA