In the Obama administration’s last days, some White House officials scrambled to spread information about Russian efforts to undermine the presidential election — and about possible contacts between associates of President-elect Donald J. Trump and Russians — across the government. Beyond Obama leaving a trail of Russia for the Trump Administraion; Did Obama wiretap Donald Trump at Trump Tower just before winning his victory as President? Continue reading

Former White House officials coming forward with claims they were told by Obama to work against incoming Trump Administration


WikiLeaks new dump!

#Vault7:  RELEASE: Vault 7 Part 1 “Year Zero”: Inside the CIA’s global hacking force


#Vault7: How CIA steals hacking fingerprints from Russia & others to cover its tracks

The CIA can hide its own fingerprints from its hacking exploits and attribute blame to others, such as Russia and China, according to WikiLeaks’ Year Zero confidential data release.

Every hacking technique leaves a “fingerprint” which, when collated, can be used to connect different attacks and tie them to the same culprit.

The CIA’s Remote Development Branch (RDB)’s Umbrage sub-group collects an archive of hacking exploits created by other actors, like Russia and other hackers, and leaves this false trace for others to detect. Continue reading


Ingraham: New WikiLeaks Release Could Be ‘Really Damning’ for CIA

Laura Ingraham joined Sean Hannity tonight to react to a bombshell WikiLeaks release that allegedly reveals the “entire hacking capacity of the CIA.”

According to purported internal CIA documents, the agency uses high-tech phones and televisions to spy on people worldwide.

To hide its operations, the CIA routinely adopted hacking techniques that enabled them to appear as if they were hackers in foreign countries, such as Russia, WikiLeaks alleged.

“It’s really damning if it’s true,” Ingraham said. Continue reading


New WikiLeaks Documents Fuel Tension Between Intelligence Agencies, Tech Sector

The release of documents that purportedly describe hacking of consumer gadgets by the Central Intelligence Agency fueled new concern in the technology industry that U.S. intelligence agencies are working at odds with tech companies.

WikiLeaks said the 8,761 documents and files it made public Tuesday describe techniques the CIA uses to circumvent the security of dozens of products, including mobile phones from Apple Inc. and Alphabet Inc.’s Google, software from Microsoft Corp., and televisions from Samsung Electronics Co. Continue reading