Trump and Vault 7

President Trump’s victory over the intelligence community may be a triumph or a disaster for the American people.

Guest post by Robert Gore at Straight Line Logic

After Wikileak’s Vault 7 disclosures, President Trump can checkmate the intelligence agencies. Much more importantly, he will also have it in his power to be either the greatest champion of, or the greatest threat to, freedom and civil liberties America has ever had.

Hacking is the heart of electronic surveillance. The intelligence community (IC) works with technology companies—internet service providers, hardware manufacturers, software companies, communications and media companies—obtaining a great deal of information with their consent. Information is also obtained surreptitiously—hacking. The ways to gather such information are limited only by the imaginations and capabilities of legions of extremely bright hackers, operating around the world for country, profit, or personal gratification, within and outside the bounds of the law.


By the end of 2016, the CIA’s hacking division, which formally falls under the agency’s Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other “weaponized” malware. Such is the scale of the CIA’s undertaking that by 2016, its hackers had utilized more code than that used to run Facebook. The CIA had created, in effect, its “own NSA” with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.

Wikileaks, Vault 7 Press Release, 3/7/17 (Wikileaks, Vault 7)

Wikileaks claims that the CIA lost control of its hacking archive to former US government hackers and contractors, one of whom provided substantial portions to Wikileaks. In the first (“Year Zero”) of a promised series of Vault 7 releases, there are 8,761 documents, many of which Wikileaks has not completely analyzed (although it has made numerous redactions). It also said that it will not distribute “‘armed’ cyberweapons” until they can be analyzed and disarmed, and a “consensus emerges on the technical and political nature of the CIA’s program.” Wikileaks has invited anyone who wants to see the documents to do so, making them accessible via a link and a password: SplinterItIntoAThousandPiecesAndScatterItIntoTheWinds. (That password comes from a threat President Kennedy purportedly made to dismantle the CIA a month before his assassination.) Full analyses of these first documents plus the thousands that follow will probably take months, if not years.

UMBRAGE

The CIA’s hand crafted hacking techniques pose a problem for the agency. Each technique it has created forms a “fingerprint” that can be used by forensic investigators to attribute multiple different attacks to the same entity.

This is analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible. As soon one murder in the set is solved then the other murders also find likely attribution.

The CIA’s Remote Devices Branch’s UMBRAGE group collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.

With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from.

Wikileaks, Vault 7

This lays waste to the IC’s “assessments” that Russia hacked the DNC and passed its information on to Wikileaks. That claim was already on thin ice because the source materials for those assessments were never disclosed. Even if they were, the quoted passage makes clear that the CIA, and by implication any other intelligence agency with the same capability, could have committed the hack and left behind Russian hackers’ “fingerprints,” a not unlikely possibility given the IC’s hostility towards Trump.

This is the smallest victory Wikileaks has handed to Trump. Whether he realizes larger victories depends on whether he and his team study the Wikileaks press release and disclosures and realize their implications. As Commander in Chief, Trump is duty bound to ask questions and investigate. How did the CIA lose “control of the majority of it’s hacking arsenal” and documentation? How did Wikileaks obtain so many of the nuclear warheads of the US’s cyber-warfare armory?

After Edward Snowden’s disclosures in 2013, an uproar ensued over US technology companies’ vulnerability to and complicity in IC hacking and surveillance. At the insistence of the technology companies, in January 2014 President Obama secured commitments from the IC that any vulnerabilities they detected in the companies’ hardware or software would be disclosed to them.

The U.S. government’s commitment to the Vulnerabilities Equities Process came after significant lobbying by US technology companies, who risk losing their share of the global market over real and perceived hidden vulnerabilities. The government stated that it would disclose all pervasive vulnerabilities discovered after 2010 on an ongoing basis.

“Year Zero” documents show that the CIA breached the Obama administration’s commitments. Many of the vulnerabilities used in the CIA’s cyber arsenal are pervasive and some may already have been found by rival intelligence agencies or cyber criminals.

Wikileaks, Vault 7

Why, Trump should ask, did the CIA violate the Obama administration’s commitments” and leave American technology open to hacks not just from the CIA, but “rival intelligence agencies or cyber criminals?”

By hiding these security flaws from manufacturers like Apple and Google the CIA ensures that it can hack everyone &mdsh [SIC]; at the expense of leaving everyone hackable.

Wikileaks, Vault 7

Incredibly, much of malware, Listening Post, and Command and Control Systems the CIA, and by implication other members of the IC, dropped into computers, communications devices, and networks is not classified!

To attack its targets, the CIA usually requires that its implants communicate with their control programs over the internet. If CIA implants, Command & Control and Listening Post software were classified, then CIA officers could be prosecuted or dismissed for violating rules that prohibit placing classified information onto the Internet. Consequently the CIA has secretly made most of its cyber spying/war code unclassified. The U.S. government is not able to assert copyright either, due to restrictions in the U.S. Constitution. This means that cyber ‘arms’ manufactures and computer hackers can freely “pirate” these ‘weapons’ if they are obtained. The CIA has primarily had to rely on obfuscation to protect its malware secrets.

Wikileaks, Vault 7

How in the world, Trump should query, could the CIA, and by implication the IC, implant top-secret software that’s not classified?

Most of the above questions would fit on a tweet, and all of them go directly to matters that should be investigated. They are readily understandable and obvious; other questions will follow. If he wants, Trump can tie the IC in knots for the next eight years in pursuit of answers. These issues pose threats to national security; nobody, including Democrats, neoconservatives, and hard-core Deep Staters, can object to comprehensive probes. SLL has argued that Trump has the upper hand in his battle with the IC and that the Deep State has been acting out of weakness, not strength (see “Plot Holes” Vault 7 strengthens that argument.

Isn’t WikiLeaks worried that the CIA will act against its staff to stop the series?

No. That would be certainly counter-productive.

Wikileaks Vault 7

This little exchange may be the most important quote from “Year Zero.” Wikileaks has given Trump the means to assert complete dominance, and the message is clear. Anything the CIA does to counterattack will “be certainly counter-productive.” In other words, Wikileaks has information that could irreparably damage or destroy the agency. (We can probably also assume that if Julian Assange is not already dead, he is not going to die anytime soon of “unnatural” causes.) After Vault 7, if Trump goes on the offensive, nobody but its mainstream media mouthpieces will pay attention to emanations from an IC beset by inquiries and investigations. And it will have no idea if or how Wikileaks, a de facto Trump ally, might respond.

The question then becomes: do we want Donald Trump, or anyone else, to have complete dominance over the IC and all the information it posses? Vault 7 details how the CIA has infiltrated hardware, software, networks, and the Internet of Things (including televisions and cars), eviscerated encryption, and compromised the products and services of a Who’s Who of technology companies. In so doing, it has made a mockery of the Fourth Amendment and opened the door for nefarious hackers all over the world. Donald Trump has championed the IC and called Edgar Snowden a “traitor.” However, Trump was justifiably outraged when he discovered the IC had been monitoring him. Will his outrage translate into outrage that his fellow citizens, powerful and powerless alike, are being treated the same way? Will he, as he gains the upper hand, cast this ring of power into the fire or will he use it for his own corrupting purposes?

In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.

Wikileaks, Vault 7

By all means, let the debate begin. However, no human being can be trusted, no laws can be promulgated, to restrain the power the IC now has to surveil and blackmail each and every one of us, from the president on down. Whatever ephemeral “security” it has achieved is far outweighed by its many crimes—stretching back to the 1940s—and the civil liberties and rights it has abridged and obliterated. Trump can be a great president if he fulfills President Kennedy’s vow to splinter the CIA into a thousand pieces and scatter it (and the rest of the IC) to the winds. If he does not, we will have only replaced one devil with another.

Subscribe
Notify of
guest
41 Comments
Uncola
Uncola
March 8, 2017 4:39 pm

A lot to unpack there, Robert, and some very serious questions and concerns. You beat me to the punch. I wrote an article this afternoon mentioning UMBRAGE, but with more of a “media spin”. I am about to post it now into the TBP queue.

I am so grateful for the alternative media, and for writers such as yourself. Keep rockin’…

Iska Waran
Iska Waran
March 8, 2017 4:52 pm

“President Trump’s victory over the intelligence community may be a triumph or a disaster for the American people.” Lemme get this straight, Robert. We have a disclosure of the entire intelligence community basically going rogue like HAL 9000, and you’re worried about Trump? That’s like the captives at Dachau worrying about their Allied liberators.

kokoda - the most deplorable
kokoda - the most deplorable
March 8, 2017 5:38 pm

Thanks Robert – this is a keeper.

BTW, how do you like the ‘timing’ of the Vault 7 and Trump accusing Obama of ‘tapping’ being released at about the same time.

I think Trump has a Poker hand with 4 Aces.
Trump also has Binney on his side.

Ed
Ed
March 8, 2017 5:50 pm

“These issues pose threats to national security; nobody, including Democrats, neoconservatives, and hard-core Deep Staters, can object to comprehensive probes.”

Watch them. They’ll surely try to dismiss the findings as unimportant, last year’s news, fabricated, or something equally ridiculous.

“Wikileaks has given Trump the means to assert complete dominance, and the message is clear. Anything the CIA does to counterattack will “be certainly counter-productive.” In other words, Wikileaks has information that could irreparably damage or destroy the agency.”

Yep, you’re exactly right. Trump could effectively stick a finger in the eye of the entire IC. I can imagine lots of the higher ups frantically trying to rat out analysts and cyber operatives to try to save their own skins. ANYTHING these career bureaucrats and appointed hacks do in response to Trump’s use of this information will be counterproductive for them.

“The question then becomes: do we want Donald Trump, or anyone else, to have complete dominance over the IC and all the information it posses?…… Will he, as he gains the upper hand, cast this ring of power into the fire or will he use it for his own corrupting purposes?”

The way it looks to me is that someone should hold the upper hand over this monster, at least for as long as it would take to shut it down. If he attacks publicly, that would show that he isn’t trying to keep this going for his own use.

I agree with your conclusion. This kind of secret power has no good use.

Ouirphuqd
Ouirphuqd
March 8, 2017 7:22 pm

The IC has us by the “balls”, never thought “1984” was so near. I don’t know what the answer is to combat this situation, but thank you Robert for explaining it in understandable terms. I guess I’ll just keep on hoping for the best, but prepare for the worse. What are the other options?

RT Rider
RT Rider
March 8, 2017 8:34 pm

Did you notice the one pic of a woman mailing a letter, somewhere in East Germany, back in the bad old days? So is IC code for high tech, American Stasi? No need to recruit family, friends, and neighbors to do your spying when Igadget does it for you.

Not Sure
Not Sure
March 8, 2017 8:55 pm

The information available as offered by wiki leaks seems to have the same impact as the dropping of the atomic bomb; we live in a new age with a new Pandora box opened for better and worse. I Don’t think the general real public has fully wrapped it head around all the implications that along with all the benefits available through the age of computers and the internet, there is now the realization that there is now no ability to for privacy; our only privacy will be unuttered thoughts. It should scare us as much as the IC that there are still hidden chapters of damaging info to silence them and further shock us at the power that can be used against us.
At the beginning of the nuclear age there was much lamenting that the genie can not be put back in the bottle, and so today the genie is again unleashed and quite uncontrollable. Why stop at President Trump? For in just the same way the constitution has been attacked and rendered impotent in limiting the power of government over the nation, so to will this new cancer be useful by any power hungry polititians who would seek to control the masses; whether it be Trump or any future leader with designs on becoming the next “Big Brother”.

Westcoaster
Westcoaster
March 8, 2017 10:30 pm

Good one Mr. Gore, however his name is “Edward” not “Edgar”.

Anonymous
Anonymous
  Westcoaster
March 8, 2017 11:01 pm

Thanks. I’ll correct the original.

Francis Marion
Francis Marion
March 8, 2017 11:38 pm

Robert, I’m a gen X’er – nomad generation by 4th turning standards. I always try to take predictive models like Strauss and Howe’s with a grain of salt. The future is not written in stone but there are definitely moments that you can sense are pivotal. I think this is one of them. If it goes the wrong way I fear it will be my generation that has to make the hard choices and my kid’s generation that will have to fight for them. Not the life I envisioned for any of us when I decided to start a family. Let’s hope Trump does the right thing and doesn’t get crushed in the process.

norman franklin
norman franklin
March 9, 2017 12:35 am

Robert thanks for taking the time and breaking this down. I think this has gone on longer than we realize, privacy as we all knew it back in the day is gone for good. For years whenever we had friends or family over I would insist that the smart phones go in a metal bucket by the front door. Now they understand why.

hardscrabble farmer
hardscrabble farmer
March 9, 2017 9:34 am

On August 16, 2016, British officials threatened to raid the Ecuadorian embassy if they did not hand over Julian Assange.

http://www.reuters.com/article/us-wikileaks-assange-ecuador-idUSBRE87E16N20120816

On September 26th 2016 Ecuadorian officials expressed hope that the 4 year standoff would come to an end in the near future.

http://www.thetimes.co.uk/article/ecuador-hopes-for-an-end-to-stand-off-over-assange-fw382ltrq

On October 7th, with only one month until the US Presidential election, Wikileaks began the release of the John Podesta emails, dropping them daily for a period of ten days until the final release on the morning of October 16th, 2016. Wikileaks claims to have had over 50,000 of these emails in their possession, the total number released during the 10 day period was just over 5,000.

http://www.foxnews.com/politics/2016/10/11/7-biggest-revelations-from-wikileaks-release-podesta-emails.html

On the morning of the 16th of October, 2016 US Secretary of State John Kerry made an unscheduled stop in London.

http://www.upi.com/Top_News/World-News/2016/10/16/US-Secretary-John-Kerry-in-London-to-renew-Syrian-peace-efforts/5601476636928/

On the afternoon of October 16th, 2016 the Internet connection to the Ecuadorian embassy in London was cut. Several vans appeared in front of the address where Assange had been staying for the past several years and armed men created a perimeter. A man wearing a black hood was escorted out of the embassy and placed in the back of a van that drove off. Several bystanders who were using hand-held devices to record the event had them siezed by police officers at the scene.

https://www.nytimes.com/2016/10/19/world/europe/julian-assange-embassy.html

Since that day Julian Assange has not appeared live at any time through the window of the embassy as he had in the past. Despite several claims by media personalities such as Sean Hannity and Pamela Anderson, the only evidence of Assange has been pre-recorded releases of digital sound/video- again, no evidence of life.

I wouldn’t know for certain, but based on that timeline I would say that it is impossible to trust that Assange is still in control of anything related to Wikileaks and until such time as his living person walks into public view it would be a fair assumption that he is no longer living in the Ecuadorean Embassy in London.

I remember reading about Echelon in the 90’s, Carnivore in the early 00’s and now the latest release.

At no time has there been any firings, prosecutions, budgetary cutbacks or restrictions placed on the surveillance capabilities of the US Intelligence community, in fact, it has only expanded after each and every new revelation of their overreach has come to light.

It is my personal belief that these releases are in fact created by the Intelligence Agencies as a way of further castrating and nullifying the role of the citizen in the governance of this country, that they serve not as “revelations”, but as veiled threats.

Francis Marion
Francis Marion
  hardscrabble farmer
March 9, 2017 9:59 am
hardscrabble farmer
hardscrabble farmer
March 9, 2017 9:38 am

[imgcomment image[/img]

hardscrabble farmer
hardscrabble farmer
  Robert Gore
March 9, 2017 10:17 am

I was just watching it and there is something hinky going on with his lips as he reads. See my link below, it looks like the same technology.

RiNS
RiNS
  Robert Gore
March 9, 2017 10:37 am

I was watching it too. The cord got cut when Assange started talking about Langely HQ and what they do.

Someone no likey what he sayin’

hardscrabble farmer
hardscrabble farmer
  Robert Gore
March 9, 2017 10:55 am

I don’t know anything with any degree of certainty, I do know to trust my instincts and what I can see with my own two eyes and to always doubt anyone or anything that has a history of duplicity.

This entire episode is chock full of everything I don’t believe.

RiNS
RiNS
  hardscrabble farmer
March 9, 2017 11:51 am

Yep.

My gut is telling me the same thing. Maybe that it this has always been the case but are in midst of a very interesting, some would say pivotal, information war. The MSM having been drilling and doubling down about the Russians.

The hacking.
For months.

The MSM are playing an aimless game of whack-a-mole. Just a smokescreen to hide their blasé attitude towards the truth.

[imgcomment image[/img]

Why the effort?
Keeping it real I have found just gets the 1000 yard stare and few seem to care.

RiNS
RiNS
  hardscrabble farmer
March 9, 2017 10:29 am

I seen that before. Crazy eh!

Day is coming soon when they won’t even have to bother doing that. Just like the movie the Matrix,
they will figure out how to bypass controls in our brains, short circuiting and rewiring our thoughts.

[imgcomment image[/img]

RiNS
RiNS
March 9, 2017 10:21 am

The problem nowadays is that most don’t care about their privacy. The brain addled, iGadget addicted masses, continue to click away without reading the fine print just so that they can get the latest update of Angry Birds.

Why would they give two shits about vault seven?

[imgcomment image[/img]

hardscrabble farmer
hardscrabble farmer
March 9, 2017 10:33 am

I was having this same discussion with three elderly ladies from my neighborhood. They all voiced the exact same “I have nothing to hide” philosophy. I asked them if they would be cool with me coming over to rifle through their stuff when they weren’t home and it was like-

[imgcomment image[/img]

Reality hits you hard, bro.

Francis Marion
Francis Marion
  hardscrabble farmer
March 9, 2017 10:41 am

Yep. Unfortunately, this attitude is extremely prevalent throughout western society these days.

Diogenes
Diogenes
March 9, 2017 10:34 am

This is a psyop! The government want’s you to think they are watching everyone and everything. Granted they are storing everything in computers, however, they don’t have enough human eyes to watch everyone, and the humans who are watching, spend most of their time trying to find naked pictures and homemade porn on people’s computers.

Suzanna
Suzanna
March 9, 2017 10:35 am

Thank you Mr. Gore,
for your fine article on the implications of wiki-leaks
revelations.
HSF,
This is for you, and may I be succinct for once.
Last night I listened to Rense Radio guest Gordon Duff.
Mr. Duff is the senior editor with Veterans Today blog.
He stated he owns a consulting firm with a contract to advise
Russia on security matters. He then gave his opinion (absolute fact
he said) on the wiki-leaks releases. Wiki-Leaks is a Mossad operation
100%, and was designed to attract whistle blowers and provide propaganda.
He also stated Mr. Trump and Mr. Jeffery Epstein are best friends and business
partners. (We have been led to believe Epstein is the honey-pot/Brownstone
king and fully Mossad, plus a convicted pedophile) Further, he stated Epstein
and Trump fell in to a rage at a 12 yr. old girl, over some slight, and subsequently
beat her to death, together. (apparently several years ago)
During this rant, Jeff Rense was objecting, “Hey, this is a family show,”
and, “Mr. Guff and I don’t agree on everything.”
Those are some stunning accusations. (BTW, Rense Radio is a paid subscription,
$35/yr. but their are 20″ clips on you tube) They were made on the 3/7 broadcast.

Suzanna
Suzanna
  Suzanna
March 9, 2017 8:52 pm

Hello,
I am compelled to add that I want to share what was said on
a radio program about president Trump. It is my sincere hope
that Mr. Duff is a kook and that he is entirely wrong.
Suzanna

RiNS
RiNS
March 9, 2017 10:44 am

Looks like the rats are jumping off ship. Trump was right.

https://www.youtube.com/watch?v=CLNFzj36T-c

hardscrabble farmer
hardscrabble farmer
March 9, 2017 1:07 pm
RiNS
RiNS
March 9, 2017 1:11 pm

Why anyone would have a device like that in their house. It just makes no sense. I don’t own a cell phone and find my grace when disconnected from matrix. Why this urge by so many to be tracked others. 24/7.

I was on Google Play a while back to download a “free” app. Everyone should know that there is nothing free in this world. Seemed innocous but reading the terms I noticed that the app required access to microphone and camera.

What is stopping the owners of that app selling my TOS to the CIA. I don’t see any.

Now the CIA will insist that they don’t spy on American Citizens. But there is noting stopping them from contracting it out to one of the other 5 Eyes. The spooks need to be asked when they are on TV about the 5 Eyes.

Maybe we should ask Google home that question as well.

https://www.youtube.com/watch?v=dUsPTDTlAec

BL
BL
March 9, 2017 1:20 pm

Does the Donald & family keep their trademark agreements from China in vault #8 ?

http://www.dailymail.co.uk/news/article-4293122/China-grants-preliminary-approval-38-new- Trump-trademarks.html