Advertisements

[VIDEO] Bombshell: Seth Rich, Slain DNC Staffer, Had Contact with WikiLeaks, say Multiple Sources

Assange has not returned a series of recent emails from Fox News about Rich. MacFadyen, who was considered a mentor by Assange, died of lung cancer on Oct. 22 at age 76.

D.C. police have announced a $25,000 reward for information leading to the conviction of Rich’s killer. Republican lobbyist Jack Burkman has offered a separate $130,000 reward.

g59KU4X-.jpeg

Rich had been at Lou’s City Bar a couple of miles from his home until about 1:15 a.m. He walked home, calling several people along the way. He called his father, Joel Rich, who he missed because he had gone to sleep. He talked with a fraternity brother and his girlfriend, Kelsey Mulka.

Around 4:17 a.m., Rich was about a block from his home when Mulka, still on the phone with him, heard voices in the background. Rich reassured her that he was steps away from being at his front door and hung up.

Two minutes later, Rich was shot twice. Police were on the scene within three minutes. Rich sustained bruising on his hands and face. He remained conscious, but died at a nearby hospital less than two hours later. Read the rest of this entry »

Advertisements

How the CIA Allegedly Turns Everyday Devices into High-Tech Spy Weapons

Some of the computer programs target the iOS software that runs Apple iPhones as well as Google’s Android operating system, which does the same for phones built by Samsung, HTC and Sony, WikiLeaks said.

The “weaponized” software also reportedly provides techniques to defeat the encryption abilities of popular apps including WhatsApp, Signal, Telegram and Wiebo, which claim to supply users with secure and private communications.

One program, known as “Weeping Angel,” can even be used to infect Samsung “smart” TVs and covertly activate their built-in microphones to record conversations and then transmit them over the internet, WikiLeaks said.

[Read the full story here, at New York Post]

The documents also reveal that the CIA as of 2014 was “looking at infecting the vehicle control systems used by modern cars and trucks,” WikiLeaks said.

“The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations,” WikiLeaks suggested.

Although it posted online nearly 9,000 documents and files related to the Orwellian tools — a cache it called “Year Zero — WikiLeaks said it had decided to hold off on releasing the actual software.

“WikiLeaks has carefully reviewed the ‘Year Zero’ disclosure and published substantive CIA documentation while avoiding the distribution of ‘armed’ cyberweapons until a consensus emerges on the technical and political nature of the CIA’s program and how such ‘weapons’ should be analyzed, disarmed and published,” the hack clearinghouse said in a press release.

There is nothing in the WikiLeaks documents to suggest that the CIA — which is charged with obtaining foreign intelligence for national security purposes — uses any of these devices to spy on American citizens.

The CIA refused to confirm or deny the authenticity of the WikiLeaks information, and White House press secretary Sean Spicer wouldn’t comment, saying it “has not been fully evaluated.”

A retired CIA operative told The Post that the WikiLeaks disclosure could cripple the agency’s high-tech surveillance capabilities.

“This essentially gives our enemies a playbook on how we go about our clandestine cyber-operations,” the former agent said.

“This will be bad for the agency. They will have to re-examine its procedures for doing this type of work.”

Cybersecurity experts said the material appeared genuine.

Jake Williams of Rendition InfoSec, who has experience dealing with government hackers, noted the files’ repeated references to operation security.

“I can’t fathom anyone fabricated that amount of operational security concern,” he said. “It rings true to me.” Read the rest of this entry »