Exclusive: Deep State Planning False Flag Cyber Attack to Blame Russia

3 weeks ago NEWSWARSONLINE 0

 

Exclusive: Deep State Planning False Flag Cyber Attack to Blame Russia


CIA, NSA capable of false flag cyber attacks, according to Vault 7 & other revelations


By Alex Jones & Kit Daniels Tuesday, November 21, 2017

The deep state is considering a cyber false flag to blame on Russia to salvage the anti-Trump “Russian collusion” narrative, intelligence sources told Infowars:

We’ve known for years that the NSA, in particular, is capable of false flag attacks that can be blamed on any state actor, thanks to a 2010 Defcon speech by former NSA expert Charlie Miller.

“It will make attribution [of the real culprit] really hard… because you’ll be able to attack from a thousand different places, and from all over the world and they’re not going to know who you are,” he said.

Theoretically, the agency can launch bot attacks from computers it controls in other countries and then blame the country where the computers are located.

US intelligence agencies have spent years installing malware and back-door vulnerabilities in computer networks across the world to provide itself easy access to foreign computers.

That’s the ultimate deep state false flag: control computers in Russia to attack targets in the US, then use “appeal to authority” arguments to declare that US intelligence experts have “determined” the attacks were launched by Russia.

Remember how Hillary Clinton once claimed that “17 intelligence agencies” agreed that Russian hackers “interfered” in the presidential election, a claim that was later debunked?

And, according to the Vault 7 revelations published by Wikileaks, the CIA is also able to stage fake “Russian hacking” attacks.

“The CIA’s Remote Devices Branch‘s UMBRAGE group collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation,” Wikileaks reported. “With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the ‘fingerprints’ of the groups that the attack techniques were stolen from.”

“UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.”

original at infowars.com

newswarsonline.com

95 total views, 1 views today

Related Posts

McConnell Pledges to Support Roy Moore and Donald Trump’s Agenda by Kristina Wong 27 Sep 2017

NEWSWARSONLINE 3 months ago
Senate Majority Leader Mitch McConnell (R-KY) congratulated Judge Roy Moore on his blowout victory in the Alabama Senate GOP primary over Sen. Luther Strange (R-AL) — the candidate he... Read More

Penalty for consciously exposing partners to HIV lowered in California

NEWSWARSONLINE 2 months ago
Penalty for consciously exposing partners to HIV lowered in California As of Jan. 1, 2018, it’ll no longer be a felony in California to knowingly expose partners to HIV.... Read More

SJWs Protesting Shapiro at UCLA Want to Shut Down Free Speech

NEWSWARSONLINE 4 weeks ago
SJWs Protesting Shapiro at UCLA Want to Shut Down Free Speech Clueless liberals shout “Nazis go home” at Jewish speaker. By Infowars.com Friday, November 17, 2017 On Monday, protesters... Read More

Steve Pieczenik quit Spouting Alex, Trump not going to be Taken Out!

NEWSWARSONLINE 3 months ago
481 total views, 5 views today Read More

Leave a comment.

Your email address will not be published. Required fields are marked*

More News

November 2017
S M T W T F S
« Oct    
 1234
567891011
12131415161718
19202122232425
2627282930  

Archives

NEWSWARSONLINE Facebook Stream

https://www.facebook.com/Newswars3/posts/?ref=page_internal