CYBER ATTACKS ATTRIBUTED TO THE CIA:

Knowing the truth about the Kennedy Assassination is understanding America today.

Moderators: kenmurray, dankbaar, Bob, Dealey Joe

CYBER ATTACKS ATTRIBUTED TO THE CIA:

Postby Bruce Patrick Brychek » Tue Apr 11, 2017 11:56 pm

04.11.2017:

Dear JFK Murder Solved Forum Members and Readers:

CYBER ATTACKS by the CIA have often been alluded to, believed to have occurred, considered,
suggested, etc.

The pattern of Misleading Warfare has been consistent with the Mental Games of both Military
Leader's and Intelligence Communities throughout history. The Ancient Egyptians, Greeks,
Roman's, Nazi's, and American's have used this COMBINED MENTAL AND PHYSICAL PLOY.

The Beginning of the U.S. Civil War, OPERATION NORTHWOOD's, and too many situations to
review have been uncovered.

OPERATION NORTHWOOD's was both A MILITARY INDUSTRIAL COMPLEX AND INTELLIGENCE COMMUNITY
DECEPTIVE OPERATION of monumental proportions that almost came to fruition.

Pearl Harbor, the Oklahoma Bombing, 09.11.2001, and constant other U.S. False Flags have continued
to occur.

FALSE FLAG CYBER ATTACKS BY THE CIA IS ONE OF BUT MANY PROGRAMS OF THE CIA THAT HAS ALREADY
BEEN PERPETRATED ON "We the People..."

THINK THE FOLLOWING THROUGH CAREFULLY, AND BEGIN APPLYING THIS THOUGHT PROCESS TO TODAY.
My Opinion.

SEMANTEC ATTRIBUTES 40 CYBER ATTACKS TO CIA-LINKED HACKING TOOLS:
By Joseph Menn, Reuters:

SAN FRANCISCO (Reuters) - Past cyber attacks on scores of organizations around the world were conducted
with top-secret hacking tools that were exposed recently by the Web publisher Wikileaks, the security
researcher Symantec Corp said on Monday.

That means the attacks were likely conducted by the U.S. Central Intelligence Agency. The files posted by
WikiLeaks appear to show internal CIA discussions of various tools for hacking into phones, computers and
other electronic gear, along with programming code for some of them, and multiple people familiar with
the matter have told Reuters that the documents came from the CIA or its contractors.

Symantec said it had connected at least 40 attacks in 16 countries to the tools obtained by WikiLeaks,
though it followed company policy by not formally blaming the CIA.

The CIA has not confirmed the Wikileaks documents are genuine. But agency spokeswoman Heather Fritz
Horniak said that any WikiLeaks disclosures aimed at damaging the intelligence community "not only
jeopardize U.S. personnel and operations, but also equip our adversaries with tools and information to do
us harm.

"It is important to note that CIA is legally prohibited from conducting electronic surveillance targeting
individuals here at home, including our fellow Americans, and CIA does not do so," Horniak said.

She declined to comment on the specifics of Symantec's research.

The CIA tools described by Wikileaks do not involve mass surveillance, and all of the targets were
government entities or had legitimate national security value for other reasons, Symantec researcher
Eric Chien said ahead of Monday's publication.

In part because some of the targets are U.S. allies in Europe, "there are organizations in there that
people would be surprised were targets," Chien said.

Symantec said sectors targeted by operations employing the tools included financial, telecommunications,
energy, aerospace, information technology, education, and natural resources.

Besides Europe, countries were hit in the Middle East, Asia, and Africa. One computer was infected
in the United States in what was likely an accident - the infection was removed within hours. All the
programs were used to open back doors, collect and remove copies of files, rather than to destroy
anything.

The eavesdropping tools were created at least as far back as 2011 and possibly as long ago as 2007,
Chien said. He said the WikiLeaks documents are so complete that they likely encompass the CIA’s
entire hacking toolkit, including many taking advantage of previously unknown flaws.

The CIA is best-known for its human intelligence sources and analysis, not vast electronic operations.
For that reason, being forced to build new tools is a setback but not a catastrophe.

It could lead to awkward conversations, however, as more allies realize the Americans were spying
and confront them.

Separately, a group calling itself the Shadow Brokers on Saturday released another batch of pilfered
National Security Agency hacking tools, along with a blog post criticizing President Donald Trump for
attacking Syria and moving away from his conservative political base.

It is unclear who is behind the Shadow Brokers or how the group obtained the files.

As always, I strongly recommend that you first read, research, and study material completely
yourself about a Subject Matter, and then formulate your own Opinions and Theories.

Any additional analyses, interviews, investigations, readings, research, studies, thoughts,
or writings on any aspect of this Subject Matter ?

Bear in mind that we are trying to attract and educate a Whole New Generation of JFK
Researchers who may not be as well versed as you.

Comments ?

Respectfully,
BB.
Bruce Patrick Brychek
 
Posts: 1596
Joined: Sat May 26, 2007 9:09 am

Re: CYBER ATTACKS ATTRIBUTED TO THE CIA:

Postby kenmurray » Wed Apr 12, 2017 2:43 am

kenmurray
 
Posts: 4594
Joined: Mon May 04, 2009 8:55 pm


Return to Who shot JFK, and why?

Who is online

Users browsing this forum: No registered users and 5 guests

cron