Exclusive: Deep State Planning False Flag Cyber Attack to Blame Russia

3 months ago NEWSWARSONLINE 0

 

Exclusive: Deep State Planning False Flag Cyber Attack to Blame Russia


CIA, NSA capable of false flag cyber attacks, according to Vault 7 & other revelations


By Alex Jones & Kit Daniels Tuesday, November 21, 2017

The deep state is considering a cyber false flag to blame on Russia to salvage the anti-Trump “Russian collusion” narrative, intelligence sources told Infowars:

We’ve known for years that the NSA, in particular, is capable of false flag attacks that can be blamed on any state actor, thanks to a 2010 Defcon speech by former NSA expert Charlie Miller.

“It will make attribution [of the real culprit] really hard… because you’ll be able to attack from a thousand different places, and from all over the world and they’re not going to know who you are,” he said.

Theoretically, the agency can launch bot attacks from computers it controls in other countries and then blame the country where the computers are located.

US intelligence agencies have spent years installing malware and back-door vulnerabilities in computer networks across the world to provide itself easy access to foreign computers.

That’s the ultimate deep state false flag: control computers in Russia to attack targets in the US, then use “appeal to authority” arguments to declare that US intelligence experts have “determined” the attacks were launched by Russia.

Remember how Hillary Clinton once claimed that “17 intelligence agencies” agreed that Russian hackers “interfered” in the presidential election, a claim that was later debunked?

And, according to the Vault 7 revelations published by Wikileaks, the CIA is also able to stage fake “Russian hacking” attacks.

“The CIA’s Remote Devices Branch‘s UMBRAGE group collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation,” Wikileaks reported. “With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the ‘fingerprints’ of the groups that the attack techniques were stolen from.”

“UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.”

original at infowars.com

newswarsonline.com

309 total views, 4 views today

Related Posts

Why Salon’s Virtuous Pedophile Is Not So Virtuous

NEWSWARSONLINE 4 months ago
  Why Salon’s Virtuous Pedophile Is Not So Virtuous AP Photo/B.K. Bangash by John Sexton22 Sep 2015104 Is there such a thing as a virtuous pedophile? That’s the claim... Read More

Trump Doubles Down: Network Licenses ‘Must Be Challenged’

NEWSWARSONLINE 5 months ago
    Trump Doubles Down: Network Licenses ‘Must Be Challenged’   “Network news has become so partisan, distorted and fake.” By Susan Jones October 12, 2017 Following two tweets... Read More

Egyptian Lawyer Says It Is A ‘National Duty’ To Rape

NEWSWARSONLINE 4 months ago
  Egyptian Lawyer Says It Is A ‘National Duty’ To Rape Women Muslim lawyer says men must rape women who dress inappropriately. By The Alex Jones Show Thursday, November... Read More

MSNBC Conspiracy Theory: Travel Ban Caused Deaths of U.S. Troops in Niger

NEWSWARSONLINE 4 months ago
MSNBC Conspiracy Theory: Travel Ban Caused Deaths of U.S. Troops in Niger Maddow peddled an unsubstantiated conspiracy theory. By Newsbusters Saturday, October 21, 2017 On her primetime show Thursday... Read More

Leave a comment.

Your email address will not be published. Required fields are marked*

More News

November 2017
S M T W T F S
« Oct   Jan »
 1234
567891011
12131415161718
19202122232425
2627282930  

Archives

NEWSWARSONLINE Facebook Stream

https://www.facebook.com/Newswars3/posts/?ref=page_internal