Would the CIA frame Russia in DNC attack, yet wiretap Trump Tower? 


horiz grey line

tgplogo12313

by Steve Cunningham


The new release from Wikileaks shows the CIA has all the tools it needs to leave “Russian” footprints behind its own hacking jobs. The spooks at Langley can pretend to be “Cozy Bear” and “Fancy Bear” at will. Therefore, “the question we ought to ask is, would the CIA frame Russia and hack the DNC?”


“If it looks like the Russians did it, than I can guarantee you, it was not the Russians.”


The recent Wikileaks contains hacking tools for the CIA that are used to “avoid fingerprints implicating the CIA and the US government” in its hacking. Indeed, according to Wikileaks’ analysis, the UMBRAGE and these related projects can “misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from.” Since the security company Crowdstrike, funded by the DNC, has identified “two separate Russian intelligence-affiliated adversaries present in the DNC network in May 2016,” by the name of COZY BEAR and FANCY BEAR, and the Obama-led intelligence community (or “band of leakers”) “confirmed” this in their report in the dying days of their administration, many have thought it was Russia behind the DNC attack. Since we can assume, based on the recent wikileak, that the CIA can replicate a Cozy Bear and fancy Bear attack, the question we ought to ask is, would the CIA frame Russia and hack the DNC?

Certainly, the case can be made that the CIA, at least outwardly, has been Pro-Obama and Anti-Trump. Take into account the many leaks from the Trump administration, to which President Trump tweeted on Feb. 14, asking, “The real story here is why are there so many illegal leaks coming out of Washington? President Trump went further and claimed that the CIA obtained the leak-worthy information through illegal monitoring, when he tweeted on Mar. 4 that he “just found out that Obama had my ‘wires tapped’ in Trump Tower just before the victory.” Mr. Trump also said in a Fox News interview, regarding the leaks, that “I think that President Obama’s behind it because his people are certainly behind it.” The question remains, how can the CIA be so obviously against Trump, yet potentially have helped him so much with the DNC leaks?


“Either the Russians wanted everyone to know it was them when they hacked the DNC, or it wasn’t them at all.”

The answer is that there could be rogue Pro-Trump individuals within the CIA agency doing the hacking behind the back of their Pro-Obama superiors. That would be the only way to explain the discrepancy, if it is true that the CIA framed Russia in the DNC attack. According to the Wikileaks trove of CIA files, these cover-up tools are contained in the documents entitled Development Tradecract Dos and Don’ts, use of encryption to hide CIA hacker and malware communicationdescribing targets & exfiltrated data as well as executing payloads and persisting in the target’s machines over time. Since the CIA has this cover-up capability, does Russia have it too?

According to John McAfee, the internationally-renowned information security pioneer and founder of global computer security software company McAfee, “Any hacker capable of breaking into something is extraordinarily capable of hiding their tracks. If I was the Chinese and I wanted to make it look like the Russians did it, I would use Russian language within the code, I would use Russian techniques of breaking into organizations. (…) He continued, “If it looks like the Russians did it, than I can guarantee you, it was not the Russians.” The question is, why would Russia leave its fingerprints in the hacking job, if it was them, since they could have deleted those tracks?

Either the Russians wanted everyone to know it was them when they hacked the DNC, or it wasn’t them at all. It could also have been another country or group that replicated Russia’s fingerprints, including rogue individuals in the CIA, or it really could have been a Romanian hacker utilizing Russian hacking tools, as Guccifer 2.0 has claimed he is Romanian all along.

More needs to be done to find if there any Pro-Trump elements in the intelligence community in the run up to the 2016 Presidential Election, if Russia has in the past covered its tracks when it uses established hacking tools, and how easy it is for another country or group to replicate a Fancy Bear or Cozy Bear attack.




NOTE: ALL IMAGE CAPTIONS, PULL QUOTES AND COMMENTARY BY THE EDITORS, NOT THE AUTHORS • PLEASE COMMENT AND DEBATE DIRECTLY ON OUR FACEBOOK GROUP CLICK HERE

Note to Commenters
Due to severe hacking attacks in the recent past that brought our site down for up to 11 days with considerable loss of circulation, we exercise extreme caution in the comments we publish, as the comment box has been one of the main arteries to inject malicious code. Because of that comments may not appear immediately, but rest assured that if you are a legitimate commenter your opinion will be published within 24 hours. If your comment fails to appear, and you wish to reach us directly, send us a mail at: editor@greanvillepost.com

We apologize for this inconvenience. 

horiz-long grey

uza2-zombienationWhat will it take to bring America to live according to its own propaganda?


black-horizontal

black-horizontal

=SUBSCRIBE TODAY! NOTHING TO LOSE, EVERYTHING TO GAIN.=
free • safe • invaluable
Please see our red registration box at the bottom of this page

If you appreciate our articles, do the right thing and let us know by subscribing. It’s free and it implies no obligation to you—ever. We just want to have a way to reach our most loyal readers on important occasions when their input is necessary. In return you get our email newsletter compiling the best of The Greanville Post several times a week.

horiz-black-wide
REMEMBER: ALL CAPTIONS AND PULL-QUOTES BY THE EDITORS, NOT THE AUTHORS.




black-horizontal

THE GREANVILLE POST

Disclaimer: The contents of this article are of sole responsibility of the author(s). The Greanville Post, a publication of The Voice of Nature Network, Inc., (VNN), a not-for-profit 501 (c) (3) corporation, will not be responsible for any inaccurate or incorrect statement in this article.  The Greanville Post grants permission to cross-post original The Greanville Post articles on community internet sites as long as the text & title are not modified. The source and the author’s copyright must be displayed. For publication of The Greanville Post articles in print or other forms including commercial internet sites, contact: 

THE GREANVILLE POST contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available to our readers under the provisions of “fair use” in an effort to advance a better understanding of political, economic and social issues, and the furtherance of peace and social justice, the defence of our planetary ecosystems, and the prevention and eventual elimination of human abuse, exploitation,.and cruelty toward any and all non-human species The material on this site is distributed without profit to those who have expressed a prior interest in receiving it for research and educational purposes. If you wish to use copyrighted material for purposes other than “fair use” you must request permission from the copyright owner.

For media inquiries contact us at greanville@gmail.com

If YOU don't share this, who will? Break the system's disinformation machine. Share!
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •