Rep. Rohrabacher: ‘Rendezvous’ with President Trump Being Set Up To Provide Info from WikiLeaks’ Julian Assange on DNC Hacking
THIS SHOULD BE INTERESTING, MAKES YOU WONDER WHY MUELLER DID NOT GO THIS ROUTE …
As reported at CNN, Republican Rep. Dana Rohrabacher said Monday that a “rendezvous” is being set up between him and President Donald Trump to relay information he received from WikiLeaks founder Julian Assange about the hack of the Democratic National Committee last year. Rohrabacher has stated that this information would absolve Russia of allegations that it hacked the Democratic National Committee.
Listen to the interview above
“It is my understanding from other parties who are trying to arrange a rendezvous with myself and the President, it is being arranged for me to give him the firsthand information from (Assange),” Rohrabacher said.
Earlier in the interview, Rohrabacher said evidence he saw painted the Democratic National Committee hack being an “inside job,” a claim Rohrabacher has made before. The Office of the Director of National Intelligence released an unclassified report in January revealing the conclusions from the CIA, FBI and National Security Agency that the Russian government was behind the hack of the DNC.
“If the information comes out, there will be an outrage among the American people that their time has been wasted,” Rohrabacher said. “They’ve had this story over and over and again shoved down their throats as if the Russians colluded with Donald Trump, and this is an attempt, as I say, to negate their vote in the ballot booth. When the American people realize that this is a con job and a power grab they’ll be upset.”
“I’m trying to get this out in the public now where we can get this Julian Assange thing straightened out so that people know that it wasn’t the Russians that hacked into the system, and that’s not how this information was released,” he said.
Julian Assange Denying hacking info came from Russia
SWEDEN DROPS RAPE INVESTIGATION AGAINST WIKILEAKS FOUNDER …
As reported in the NY Times, prosecutors in Sweden have dropped the rape investigation into the WikiLeaks founder, Julian Assange. For the past five years, Assange has taken refuge in the Ecuadorean Embassy in London after the authorities in Stockholm opened a preliminary rape inquiry against him. Chief Prosecutor Marianne Ny said in a statement, that the prosecutors office said it decided to end the investigation because “there is no reason to believe that the decision to surrender him to Sweden can be executed in the foreseeable future.”
Prosecutors in Sweden said on Friday that they would drop their investigation into Julian Assange, the WikiLeaks founder who sought refuge in the Ecuadorean Embassy in London five years ago after the authorities in Stockholm opened a preliminary rape inquiry against him.
With a legal cloud hanging over him, Mr. Assange, 45, an Australian, had refused to go to Sweden for fear of being extradited to the United States, but the prosecutors’ decision does not mean that Mr. Assange is in the clear.
In Britain, he still faces a warrant for failing to appear in court, and the London police said on Friday that they would arrest Mr. Assange, who has maintained his innocence, if he tried to leave the embassy.
MAKES ONE ALMOST WANT TO GO BACK TO A ROTARY DIAL LAND LINE OR BETTER YET, TELEGRAPH AND A PHILCO BLACK & WHITE TV WITH RABBIT EARS ANTENNA…
In the wake of the latest Wikileaks dump, several of the tech firms whose products have been allegedly compromised by the CIA have given their first reactions to the claims. Companies like Apple looked quell worries from their users by issuing a statement to TechCrunch designed to alleviate concerns that the company’s products might still be vulnerable to a laundry list of CIA exploits. In short, Apple maintains that many of the iOS vulnerabilities the CIA previously relied upon have already been patched.
Apple’s statement was the most detailed, saying it had already addressed some of the vulnerabilities.
“The technology built into today’s iPhone represents the best data security available to consumers, and we’re constantly working to keep it that way,” it said.
“Our products and software are designed to quickly get security updates into the hands of our customers, with nearly 80% of users running the latest version of our operating system.
“While our initial analysis indicates that many of the issues leaked today were already patched in the latest iOS, we will continue work to rapidly address any identified vulnerabilities.
“We always urge customers to download the latest iOS to make sure they have the most recent security update.”
Samsung – whose F8000 series of televisions was reportedly compromised via a USB connection-based hack co-developed with the UK’s MI5 agency – was briefer.
“Protecting consumers’ privacy and the security of our devices is a top priority at Samsung,” it said.
“We are aware of the report in question and are urgently looking into the matter.”
The leaks also claimed that the CIA had created malware to target PCs running Microsoft’s Windows operating system.
“We are aware of the report and are looking into it,” a spokesman from Microsoft said.
Google declined to comment about allegations that the CIA was able to “penetrate, infest and control” Android phones due to its discovery and acquisition of “zero day” bugs – previously unknown flaws in the operating system’s code.
Likewise, the Linux Foundation has yet to publicly react to claims the agency had created “attack and control systems” that could hijack computers powered by Linux-based software.
The World Wide Web Foundation – which campaigns for internet privacy – said the US government needed to issue a detailed response.
WikiLeaks Publishes ‘Biggest Ever Leak of Secret CIA Documents’ & Exposes CIA Hacking Processes Through Smartphones & TV’s
AND WE ARE SUPPOSED TO BE WORRIED ABOUT THE RUSSIANS?
Yesterday Wikileaks unloaded the the biggest ever leak of CIA secret documents and detailed the tools it uses to break into phones, communication apps and other electronic devices. WikiLeaks named the leak the “Vault 7”. The leak is not only that of secret CIA documents but also how CIA hackers target smart phones, computers and Samsung F8000 TV’s.
Just how much information does the CIA have a regular, normal citizens who have never committed a crime and have never been charged with anything? Who is to say that info is not going to be used against a private citizen for political purposes? We still do have a US Constitution in this country, right?
The US intelligence agencies are facing fresh embarrassment after WikiLeaks published what it described as the biggest ever leak of confidential documents from the CIA detailing the tools it uses to break into phones, communication apps and other electronic devices.
The thousands of leaked documents focus mainly on techniques for hacking and reveal how the CIA cooperated with British intelligence to engineer a way to compromise smart televisions and turn them into improvised surveillance devices.
The leak, named “Vault 7” by WikiLeaks, will once again raise questions about the inability of US spy agencies to protect secret documents in the digital age. It follows disclosures about Afghanistan and Iraq by army intelligence analyst Chelsea Manning in 2010 and about the National Security Agency and Britain’s GCHQ by Edward Snowden in 2013.
The new documents appear to be from the CIA’s 200-strong Center for Cyber Intelligence and show in detail how the agency’s digital specialists engage in hacking. Monday’s leak of about 9,000 secret files, which WikiLeaks said was only the first tranche of documents it had obtained, were all relatively recent, running from 2013 to 2016.
The revelations in the documents include:
- CIA hackers targeted smartphones and computers.
- The Center for Cyber Intelligence, based at the CIA headquarters in Langley, Virginia, has a second covert base in the US consulate in Frankfurt which covers Europe, the Middle East and Africa.
- A programme called Weeping Angel describes how to attack a Samsung F8000 TV set so that it appears to be off but can still be used for monitoring.
CIA malware targets iPhone, Android, smart TVs
CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA’s DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details).
The EDG is responsible for the development, testing and operational support of all backdoors, exploits, malicious payloads, trojans, viruses and any other kind of malware used by the CIA in its covert operations world-wide.
The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell’s 1984, but “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.
The attack against Samsung smart TVs was developed in cooperation with the United Kingdom’s MI5/BTSS. After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.
As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.
Charles Krauthammer on the Hypocrisy Over the Bradly/Chelsea Manning Commutation vs. Wikileaks Hacked Emails (VIDEO)
The hypocrisy of Barack Obama and the LEFT that they would consider the Wikileaks embarrassing, hacked emails of Team Hillary damning and the reason why she lost a presidential election, while Manning’s release of documents and information of America’s actions in on going wars in Iraq and Afghanistan, including the identities of individuals who were working for us, many of whom are probably now dead as they were hunted down and killed as nothing and only worth a slap on the wrist.
People’s lives were put at risk, but Obama trumped national security issues vs. an individual with a gender issue.