Last August, the intel world was abuzz following the news that a previously unknown hacker collective, “The Shadow Brokers” had hacked and released legitimate hacking tools from the NSA’s own special-ops entity, the “Equation Group”, with initial speculation emerging that the Russians may have penetrated the US spy agency as suggested by none other than Edward Read More…
cyberwarfare
The Election Interference We Should Be Talking About Wasn’t Done by Russia
On February 7, 2014, the BBC published a transcript of a bugged phone conversation between Assistant Secretary of State Victoria Nuland and the U.S. Ambassador to Ukraine, Geoffrey Pyatt. The media reports that followed the leak distracted audiences from the actual content of the phone call, focusing instead on Nuland’s crass statement, “Fuck the EU.” Read More…
Whistleblower Confirms NSA Targeted Congress, The Supreme Court & Trump
NSA whistleblower William Binney told Tucker Carlson on Friday that the NSA is spying on “all the members of the Supreme Court, the Joint Chiefs of Staff, Congress, both House and Senate, as well as the White House.” Binney, who served the NSA for 30 years before blowing the whistle on domestic spying in 2001, Read More…
A CIA Cyber False Flag
New revelations from WikiLeaks’ ‘Vault 7’ leak shed a disturbing light on the safeguarding of privacy. Something already known and largely suspected has now become documented by Wikileaks. It seems evident that the CIA is now a state within a state, an entity out of control that has even arrived at the point of creating its own Read More…
The North Korean Nuclear Cha-cha-cha
There are few events in geopolitics so metronomically dependable you could dance to them, but the North Korean nuclear situation is one of them. It’s a military exercise cha cha cha and a nuclear testing cha cha cha. It’s a tightening sanctions cha cha cha and a “Death To America!” cha cha cha. Still, as Read More…
The Real Point Of Wikileaks Vault 7
WikiLeaks has released the first of its highly anticipated “Vault 7″… and the documents prove that the CIA not only has an enormous arsenal of lovely hacking tools and malware at its disposal, but the agency also has a fat bag of exploits that essentially allow it to take backdoor control of smart phones, televisions, Read More…