By Matt Agorist
Moments ago, WikiLeaks released another set of data from the Vault 7 CIA documents which, believe it or not, paints an even more ominous picture of the world’s most unscrupulous spy agency. The latest leak consists of 676 source code files from the CIA’s anti-forensic “Marble” framework — which allows the CIA to covertly create malware, trojans, and hacking attacks — while attributing them to foreign entities.
RELEASE: CIA Vault 7 part 3 “Marble” https://t.co/M5NBFlXRu4 #Vault7 pic.twitter.com/HFyEf26FHK
— WikiLeaks (@wikileaks) March 31, 2017
With each release from these Vault 7 leaks, it becomes more apparent that everything we thought the CIA might get in this 1984-esque world — they already have.
According to WikiLeaks, Marble is able to hide or cloak their virus signature by “by hiding (“obfuscating”) text fragments used in CIA malware from visual inspection. This is the digital equivalent of a specialized CIA tool to place covers over the English language text on U.S. produced weapons systems before giving them to insurgents secretly backed by the CIA.”
Marble is “[D]esigned to allow for flexible and easy-to-use obfuscation” as “string obfuscation algorithms (especially those that are unique) are often used to link malware to a specific developer or development shop.”
Over the course of the last 4 months, the deep state has claimed — without evidence — that Russia has interfered in US elections. With this technology, the CIA could theoretically present the evidence it needs to “prove” Russian meddling.
According to WikiLeaks, this blame game is possible due to the fact that the source code shows that Marble has test examples not just in English but also in Chinese, Russian, Korean, Arabic and Farsi. This would permit a forensic attribution double game, for example by pretending that the spoken language of the malware creator was not American English, but Chinese, but then showing attempts to conceal the use of Chinese, drawing forensic investigators even more strongly to the wrong conclusion, — but there are other possibilities, such as hiding fake error messages.
As Leak of Nations reports, in the second batch of ‘Vault 7’ documents, WikiLeaks released a user guide for Sonic Screwdriver – an implant on the Apple Thunderbolt-to-USB converter that allows code to be booted onto an attached device, even if the device is password-protected.
What this means is that the CIA can infect the firmware of Macs at the core of the system with a trojan horse. Having a proverbial ocean of computers to choose from, the CIA could then pick one of those infected computers, launch an attack, use Marble to cover it up and blame it on whomever they wish.
It is no wonder Ubuntu founder Mark Shuttleworth called this “a trojan horse of monumental proportions.”
For now, however, the only one to be caught hacking US elections is the Department of Homeland Security. As the Free Thought Project previously reported, the Department of Homeland Security, under the Obama administration, attempted to hack the Indiana State electoral system nearly 15,000 times.
Prior to the hacks in Indiana, it was the State of Georgia to expose DHS meddling in their elections.
While these revelations are certainly disheartening on the surface, imagine what it would be like if we didn’t know. Thankfully, there are heroes in this world like Assange who risk their very lives to shine light into the darkness.
However, it also makes heroes like Assange targets.
Plans to arrest me sometime after Sunday in violation of political asylum lawhttps://t.co/GVry7lLAWj
Background https://t.co/w56mb7qHdH
— Julian Assange (@JulianAssange) March 30, 2017
Matt Agorist is the co-founder of TheFreeThoughtProject.com, where this article first appeared. He is an honorably discharged veteran of the USMC and former intelligence operator directly tasked by the NSA. This prior experience gives him unique insight into the world of government corruption and the American police state. Agorist has been an independent journalist for over a decade and has been featured on mainstream networks around the world. Follow @MattAgorist. and now on Steemit
Comey is now proposing to “fix” the hacking problems with international intelligence cooperation on encryption back doors. Problem, reaction, solution. Here comes the official entrance of a Global Big Brother Eye of Sauron.
Now you also know why a couple of years ago the G20, along with many other nations, signed a formal agreement to create a global database of income and taxes of all individuals in those nations.
“Eye of Sauron” -priceless paralle!l……which means that individual & national “sovereignty” around the world has already been clandestinely by covert omission ..has been tossed out the window by the 0.01% NWO Globalist’s …ie: the unleashed “Just Us Justice” of a draconian totalitarian dictatorship by a very few.
Yep, CIA, serving lucifer since it’s inception.
Makes old school paper look good.
Sorry to detour from this thread…. but what in the world has happened to the free thought project? In 3 days it’s gone from normal to new logo/home page, to titles with no articles, but had a comment section, to home page with no articles and no comment section… what is going on Matt? Is this your choice or have you been attacked by the black state?