Enough is enough, Silicon Valley must end its elitism and arrogance

Enough is enough, Silicon Valley must end its elitism and arrogance

By Vivek Wadhwa


A storm is brewing over Silicon Valley. The world expects better behavior from its tech titans. (Jeff Chiu/AP)

When computers were just for nerds and large corporations, Silicon Valley’s elite could get away with arrogance, insularity and sexism. They were building products for people that looked just like them.  The child geniuses inspired so much awe that their frat-boy behavior was a topic of amusement.

Now technology is everywhere.  It is being used by everyone. Grandma downloads apps and communicates with junior over Facebook. Women are dominating social media and African Americans are becoming Twitter’s fastest-growing demographic group.

The public is investing billions of dollars in tech companies and expects professionalism, maturity, and corporate social responsibility.  It is losing its tolerance for elitism and arrogance.

Note what just happened when Silicon Valley luminary Tom Perkins wrote to the Wall Street Journal to complain of public criticism of the Bay Area elite and his ex-wife Danielle Steel. He said “Writing from the epicenter of progressive thought, San Francisco, I would call attention to the parallels of fascist Nazi Germany to its war on its ‘one percent,’ namely its Jews, to the progressive war on the American one percent, namely the ‘rich.’”

There was such an outpouring of anger on social media over the comparison to the Nazi genocide that the venture capital firm Perkins founded, Kleiner Perkins Caufield & Byers, disavowed its association with him. Tech blogs and newspapers lashed out. Silicon Valley heavyweights such as Marc Andreessen and Marc Benioff expressed their disapproval. It is a rare thing in Silicon Valley for any venture capitalist or CEO to speak up against a tech luminary — no matter how much out of line he may be. So this was a surprise.

The Perkins controversy is the tip of the iceberg. Kleiner Perkins is itself embroiled in a sexual-harassment scandal that it chose to litigate rather than settle. When Twitter filed for an IPO with an all-male board, the New York Times slammed it for being an old boys’ club. Rather than admitting that his company may have erred, Twitter CEO Dick Costolo chose to lash out publicly against a critic—me—for expressing outrage in the article. A few weeks later, Twitter gave in to the growing backlash and announced a woman director. There was no apology or humility, however.

In most industries, discriminating on the basis of gender, race, or age would be considered illegal. Yet in the tech industry, venture capitalists routinely show off about their “pattern recognition” capabilities. They say they can recognize a successful entrepreneur, engineer, or business executive when they see one. The pattern always resembles Mark Zuckerberg, Bill Gates, Jeff Bezos, or them: a nerdy male. Women, blacks, and Latinos are at a disadvantage as are older entrepreneurs. VCs openly admit that they only fund young entrepreneurs and claim that older people can’t innovate.

It isn’t just venture capitalists who are insensitive to federal employment-discrimination laws. Most tech companies refuse to release gender, race, or age data. They claim this information is a trade secret. Whatever data are available reveal a strong bias towards young males.

In his letter to Wall Street Journal, Tom Perkins complained of the outraged public reaction to Google buses carrying technology workers and to rising real-estate prices. But these are genuine grievances. Long-time residents of San Francisco are being displaced because of skyrocketing rents. Bus stops are being clogged with fleets of luxury buses. The tech industry is taking advantage of the investment that taxpayers made in public infrastructure, the Internet, and education—without giving much back or even acknowledging its debts to society.

Silicon Valley’s tech companies are also disconnected from the communities in which they live. They remain aloof about the problems that the poor face. Very few help set up soup kitchens, build houses for the homeless, or provide scholarships for disadvantaged children. Tech moguls such as Peter Thiel go as far as admonishing the value of higher education itself—and paying children $100,000 to drop out of college. Most startups focus on building senseless social media-type apps or solving the problems of the rich—and that is what venture capitalists typically fund.

Silicon Valley has an important role to play in solving the world’s problems.  It is the epicenter of innovation. Most technologists I know have a social conscience and want to do whatever they can to make the world a better place. Yet the power brokers—most venture capitalists, super-rich angel investors, and CEOs consistently show a disregard for social causes. They display a high level of arrogance, demand tax cuts for themselves, and have a don’t-care attitude. As demonstrated by the Perkins letter, this sends the wrong message to the world and holds Silicon Valley back.

It is time for the Silicon Valley elite to smell the coffee and realize that the world has changed—and that they must too. It is time for tech entrepreneurs to focus on solving big problems and giving back to the world.

Vivek Wadhwa is Distinguished Fellow and professor at Carnegie Mellon University Engineering at Silicon Valley and a director of research at Center for Entrepreneurship and Research Commercialization at Duke. His past appointments include Stanford Law School, the University of California, Berkeley, Harvard Law School, and Emory University.

Follow @wadhwa

Ex-Obama Official Suggests ‘Military Coup’ Against Trump

Ex-Obama Official Suggests ‘Military Coup’ Against Trump

Win McNamee/Getty

by Aaron Klein

In a blog post for Foreign Policy magazine, Rosa Brooks, a former Obama administration official, outlined four ways to “get rid” of President Trump, including declaring him mentally unfit for command or carrying out a military coup.

Brooks is a Schwartz senior fellow at the New America Foundation, which is funded by billionaire George Soros’s Open Society Foundations and Google. She served from 2009-2011 as Counselor to the Under Secretary of Defense for Policy and served as a senior adviser at Obama’s State Department.

Her posting is titled “3 Ways to Get Rid of President Trump Before 2020,” although the piece actually outlines four ways.

In what seems to be a deliberate tactic, Brooks repeatedly questions Trump’s mental stability, claiming that the president’s first week in office “has made it all too clear: Yes, he is as crazy as everyone feared.”

Brooks, who is not a mental health professional, offered no evidence for her armchair psychological evaluation other than citing policies that she doesn’t like.

Remember those optimistic pre-inauguration fantasies? I cherished them, too. You know: “Once he’s president, I’m sure he’ll realize it doesn’t really make sense to withdraw from all those treaties.” “Once he’s president, surely he’ll understand that he needs to stop tweeting out those random insults.” “Once he’s president, he’ll have to put aside that ridiculous campaign braggadocio about building a wall along the Mexican border.” And so on.

Nope. In his first week in office, Trump has made it eminently clear that he meant every loopy, appalling word — and then some.

Brooks listed four ways to get rid of a “crummy” president. Elect him out of office after his four-year term. “But after such a catastrophic first week, four years seems like a long time to wait,” she wrote. Impeachment. However, she lamented, “impeachments take time: months, if not longer — even with an enthusiastic Congress. And when you have a lunatic controlling the nuclear codes, even a few months seems like a perilously long time to wait.” Utilizing a claim of mental instability to invoke the 25th Amendment of the Constitution, which sets the path for the commander-in-chief’s removal if the “president is unable to discharge the powers and duties of his office.” A military coup. She writes: “The fourth possibility is one that until recently I would have said was unthinkable in the United States of America: a military coup, or at least a refusal by military leaders to obey certain orders.” Regarding her suggested military coup, a creative Brooks proposes preposterous scenarios that she fears Trump might try to play out:What would top U.S. military leaders do if given an order that struck them as not merely ill-advised, but dangerously unhinged? An order that wasn’t along the lines of “Prepare a plan to invade Iraq if Congress authorizes it based on questionable intelligence,” but “Prepare to invade Mexico tomorrow!” or “Start rounding up Muslim Americans and sending them to Guantánamo!” or “I’m going to teach China a lesson — with nukes!”When it comes to invoking the 25th Amendment, Brooks argues for appealing to the “ambitions” of Vice President Mike Pence.That Amendment states:Whenever the Vice President and a majority of either the principal officers of the executive departments or of such other body as Congress may by law provide, transmit to the President pro tempore of the Senate and the Speaker of the House of Representatives their written declaration that the President is unable to discharge the powers and duties of his office, the Vice President shall immediately assume the powers and duties of the office as Acting President.“Surely Pence wants to be president himself one day, right?” Brooks writes. “Pence isn’t exactly a political moderate — he’s been unremittingly hostile to gay rights, he’s a climate change skeptic, etc. — but, unappealing as his politics may be to many Americans, he does not appear to actually be insane. (This is the new threshold for plausibility in American politics: ‘not actually insane.’)”During the 2016 presidential campaign, opponents of Trump similarly attempted to delegitimize his policies by raising questions about his mental health.  As I wrote at the time, the template for such attacks may have been set more than five decades ago when such claims were deployed against Senator Barry Goldwater during his 1964 presidential campaign, which was widely considered a threat to the political establishment.

That theme has continued into Trump’s first two weeks in office.

Earlier this week, U.S. News and World Report ran a story titled, “Temperament Tantrum: Some say President Donald Trump’s personality isn’t just flawed, it’s dangerous.”

Apparently violating the so-called Goldwater Rule, established by the American Psychiatric Association after similar attacks against Goldwater, the magazine quoted numerous health care professionals attempting to categorize Trump’s mental stability. The APA’s Goldwater Rule forbids psychiatrists from commenting on someone’s mental status unless they first carry out an examination and the doctor is authorized by the patient to speak to the public.

The U.S. News story, for example, quotes John D. Gartner, described as a “practicing psychotherapist who taught psychiatric residents at Johns Hopkins University Medical School” as claiming Trump is “dangerously mentally ill and temperamentally incapable of being president.”

The Independent newspaper this week ran a story that also attempted to diagnose Trump. It was titled, “’Malignant narcisissm’: Donald Trump displays classic traits of mental illness, claim psychologists.” The article similarly cited mental health professionals commenting on Trump’s alleged psychological disorder.

The Independent article partially drew from a New York Daily News story from this week titled, “President Trump exhibits classic signs of mental illness, including ‘malignant narcissism,’ shrinks say.”

Narcissism impairs his ability to see reality,” Dr. Julie Futrell, a clinical psychologist, told the newspaper while pointing out that she never actually treated Trump.

During Goldwater’s candidacy, the campaign to distort the public’s perception of the politician culminated in an infamous 1964 article in Fact Magazine, which surveyed members of the American Psychiatric Association, or APA, on Goldwater’s mental stability, though none of the psychiatrists had personally examined the presidential candidate.

The New York Times reported on the Goldwater smear:

The survey, highly unscientific even by the standards of the time, was sent to 12,356 psychiatrists, of whom 2,417 responded. The results were published as a special issue: “The Unconscious of a Conservative: A Special Issue on the Mind of Barry Goldwater.”

The psychiatrists’ assessment was brutal. Half of the respondents judged Mr. Goldwater psychologically unfit to be president. They used terms like “megalomaniac,” “paranoid,” and “grossly psychotic,” and some even offered specific diagnoses, including schizophrenia and 

Only 27 percent of the respondents said Mr. Goldwater was mentally fit, and 23 percent said they didn’t know enough about him to make a judgment.

The Obama Vendetta Machine Used Retribution As Policy

The Obama Vendetta, Reprisal and Retribution Pay-Back Administration: Meet Kenneth “The Rat” Cestari

By Tony Leveque

(Opinion)

This is as much addressed to the newly minted Secretary of Energy, Rick Perry as it is to the American voters.

Donald Trump and the 2017 Congress have learned the truth about Obama’s insane need for payback via the goons he hired to put hit-jobs, character assassinations and momentum-sabotage on any person, reporter, or policy that conflicted with his Silicon Valley handlers.

Take one Mr. Kenneth Cestari, Obama’s insider at the scandal-ridden U.S. Department of Energy, “officially” with DOE since August of 2009. As he migrated into the Obama insiders club he was still working with the law firm Dickstein Shapiro LLP, who help conduit Sony Pictures money to Obama and tried get get pedophile Speaker of the House Dennis Hastert as a lobbyist shortly after he resigned his seat in Congress. Hastert was later indicted in May 2015 on charges of illegally withdrawing money from banks to pay hush money to an individual that he committed misconduct against years ago. Hastert resigned from his lobbyist position the day the indictment was unsealed. Hastert’s biography was quickly removed from the firm’s website, and the firm also purged all mentions of Hastert from its previously posted press releases.[9] Hastert’s resignation from Dickstein Shapiro following the indictment against him, left the law firm and lobbying firm “reeling,” according to news reports.[9] The firm’s lobbying business had already been struggling; it was reported that the firm had billed $130,000 on behalf of eight clients for the first quarter of 2015, “not close to being on track for its overall 2014 billings, when it brought in $3.7 million for the year.”[9] In the few years preceding the indictment, Dickstein Shapiro had already “faced an exodus of … talent” to rival firms Greenberg Traurig and Cozen O’Connor, as well as “the loss of major client contracts” including Lorillard Tobacco Co., Peabody Energy Corp., Bayer Corp., and Covanta Energy Corp.[9] Following the Hastert indictment, it was reported that Dickstein Shapiro’s biggest domestic client, Fuels America, terminated its lobbying contract with the firm.[9] Shockingly, Trump-hating Ken Cestari remains at his post even as Trump sits in the Oval Office.

Cestari’s job is to avoid any actual human contact or conversation with the public or Congress. Cestari files papers. He files papers that are intimately calculated to manipulate the legal system to Obama’s advantage and to the voters disadvantage. Even though Obama is out of the White House, Cestari is still one of the hit men that tries to find legal tricks which can cause as much damage to Trump (or pretty much anyone) that the departed, but aggressively vindictive, Obama fingers in attacks from his red brick DC mansion where he now delegates payback.

Cestari ran cover for the Solyndra scam, Steven Chu’s scandals, and the huge number of other historically disastrous Obama campaign financier payouts that led to instant bankruptcies, yet epic covert profits, via skims and tax frauds, for those financiers and their schemes.

In one case, a group of Applicants had joined forces to address the stated needs of America’s energy, jobs and security requirements through Department of Energy solicitations.

A Cartel of Department of Energy and White House officials have recently stated that The Department of Energy was being used by the Obama Administration as a “political slush-fund to pay off campaign financiers while sabotaging their competitors…”. Cestari seems to be in the middle of that!

A large number of Applicants were the competitors who were sabotaged by Obama Administration officials including Cestari’s group.

A group of Department of Energy and White House officials have recently stated that The Department of Energy had been ordered to “…never allow those specific applicants to ever receive a drop of funding for the rest of their lives…” as part of the vendetta, reprisal and retribution campaign illegally ordered by Department of Energy and White House officials from the Obama Administration.

Applicants mailed by Ken Cestari include those “specific applicants”. Applicants have submitted over 2 million pages of application material in the current and previous applications, all of which were covered in national media, FBI investigations and Congressional hearings, thus, it is impossible for Ken Cestari to not be aware that Applicants have, in fact, submitted ten times more application data than Tesla Motors. This is a fact proven in a side-by-side comparison of Tesla Motors’ actual application and applicants full sets of materials.

Ken Cestari is fully aware that Applicants are able to prove all of their assertions before a federal Special Counsel in public hearings. He knows what type of corruption-based crimes he is covering up. The current hearings and investigations, already underway, prove that the Obama Administration abused the resources of the intelligence community, DOJ and Agency resources. Obama and his hordes did this in order to operate vendetta, reprisal and retribution campaigns they illegally ordered.

At no point did any DOE officials credibly, nor sincerely, communicate with Applicants to clarify the questions posed by Applicants. Cestari and his team actually avoid talking to any Applicants who are not campaign financiers. In fact, a side-by-side comparison of IC phone logs and meeting logs shows that Applicants received over 200% less interactive support than campaign financier Tesla Motors received. Cestari and his Department of Energy Freedom Of Information staff have refused to allow the public to see Tesla’s original, UN-doctored application. They have violated the FOIA laws by refusing to show it to the public and the media. They won’t allow it to see the light of day because it reveals crimes by Cestari’s compatriots.

Upon presentation of the fact that DOE intends to “…never allow those specific applicants to ever receive a drop of funding for the rest of their lives…” and with the positive progression of multiple lawsuits and investigations proving the above facts, Applicants were advised to stand by while the new Administration reviews the facts and the elements for a Special Prosecutor to work with Applicants.

Thus, the DOE responses produced and delivered by Ken Cestari are illegal, unethical, and a gross violation of the precepts of fairness governing the voters and citizens of the United States Of America. Mr. Cestari is knowingly participating in a felony-class cover up of a “slush-fund” and the vendetta, reprisal and retribution campaign against Applicants and all those who cooperated with law enforcement to interdict those crimes.

Cestari should be fired from the U.S. Department of Energy. America has no room for Obama’s left-over retribution goons. Trump has been hacked by Obama’s team and harassed with Obama’s Russian insiders led by Obama’s DNC goons.

There are hundreds of Obama saboteur/hold-overs still in Washington DC, who are still out to destroy any progress by small business or modern innovations that Obama’s financiers say must be killed off. They have already been caught trying to ruin President Trump’s efforts from within spy agencies and internet companies

Cestari and his progress-killing brood must be rooted out and sent packing. Instead of a promotion, Cestari needs a Jeff Sessions indictment!

More: Department of Energy, Mr. Kenneth Cestari, Mr. Kenneth Cestari Department of Energy, Steven Chu, Ken Cestari,

Elon Musk’s next big crony taxpayer scam: THE HYPERLOOP, is ALL HYPE

Elon Musk’s next big crony taxpayer scam: THE HYPERLOOP, is ALL HYPE

Just a bunch of big sewage pipes and logos..”

The future of travel? First photos of Hyperloop test track built in Nevada desert show it to be a load of crap

ELON MUSK’S SCAM TO TRY TO SNAG TAX DOLLARS ALON WITH DIANNE FEINSTEINS FAMILY RAILROAD COMPANY HAS TURNED OUT TO BE A WHOLE LOT OF NOTHING.

EXPERTS SAY: “ONE CRASH IN THIS THING WILL TURN ALL OF THE PASSENGERS INTO JELLIED PILES OF BLOOD AND GUTS WITH NO CHANCE OF SURVIVAL…”

hyperloop: A test track in the Nevada desert Credit: Hyperloop One 

The first images of a Hyperloop test track built in the middle of the Nevada desert have been released.

Announcing the SpaceX Hyperloop Pod Competition

It was designed by California company Hyperloop One, who has unveiled ambitious plans to transport people or cargo between cities at near-supersonic speed.

The 500 metre-long Hyperloop test structure, which has a diameter of 3.3 metres, is located around 30 minutes from Las Vegas.

The hyperloop is constructed in the desert  Credit: Reuters Hyperloop One announced in November an agreement with Dubai to evaluate the construction a 500mph train Watch | Hyperloop One stages first public test of high-speed propulsion system 01:20  they hope will be capable of travelling to the neighbouring UAE city of Abu Dhabi in just 12 minutes.

While technology is revolutionising many facets of our lives, we have not seen a radical change in transportation since the Wright brothers introduced air travel over 100 years ago,” explained Rob Lloyd, CEO of Hyperloop One.

Tying together the Middle East region would produce greater virtual density, without congestion and pollution, spurring innovation, productivity, job growth and more powerful sharing of knowledge, labour and investment.

Building a Hyperloop would vastly impact the economy and make any major city in the Gulf Cooperation Council accessible within one hour.”

The future of travel?  Credit: Getty 

Hyperloop One hope to perform a public trial later this year, with the aim of creating “a faster, more efficient and cleaner system of mobility” featuring Hyperloop pods travelling at 800 miles per hour.

Josh Giegel, co-founder of Hyperloop One, added: “Our team of more than 150 engineers, technicians and fabricators have been transforming what was, just over five months ago, a barren stretch of desert, into a hive of activity and now home to the world’s first full-scale Hyperloop test site.”

Hyperloop tubes  Credit: Getty The company said the latest photos showed they are “well-positioned to deliver the first working Hyperloop”, the brainchild of US billionaire Elon Musk.


			

The Silicon Sedition – FBI Vs. CIA

THE CIA VS. THE FBI: THE SILICON SEDITION AND WIKILEAKS VAULT 7 REVELATIONS

By WIKINEWS TEAM (with research support from The Intercept, The Guardian, Able Danger and WIKILEAKS)

The CIA and The FBI used to both be mostly Republican. Now the FBI is very Republican and the CIA is very DNC.

The CIA hates Trump because Republicans don’t do CIA profiteering stuff. Democrats do CIA profiteering stuff. The CIA are experts in “dirty tricks”. The Wikileaks Vault 7 revelations reveal that the dirty tricks tactics of the CIA touch every single thing you can buy in a store, experience on your phone, TV or computer and any transportation device you may get in, or near. They are now exposed doing these things “inside domestic borders”, ie: “Trump Tower”.

That is against the law!

The FBI and CIA brass are NEVER allowed to discuss the spy vs. spy war in the media but it is a running joke in Washington, DC that both agencies hate each other and each accuse the other of allowing 9-11, the Kennedy Assassination and other “epic IC errors” to have happened.

The divisive nature of American public politics has come to infest the biggest, spookiest, agencies on Earth?

How did this happen?

Here are some of the red flag facts you can see for yourself in Congressional and Vault 7 public records:

Former CIA Boss James Woolsey promoted lithium ion batteries, which is an industry owned by the Democrats. He also promoted his hatred for the competing fuel cells, which is an industry owned by the Republicans.

Woolsey got himself listed as a top spy advisor on the Trump Team and then was suddenly thrown out of the Trump Team when his insider gig for the DNC came to light.

Silicon Valley’s Elon Musk, John Doerr, Larry Page and Eric Schmidt are the biggest campaign financiers of Obama and Clinton. That Silicon Mafia cartel controls the lithium ion battery markets and paid off CIA insiders with stock in Google, Facebook, Tesla, Solyndra, and their “driverless car projects”, which all use lithium and Dept. of Transportation and Energy crony taxpayer financed kick-backs.

Woolsey, his USAID front operation (which Clinton Foundation is recorded on IRS records as the co-financiers of) and the Silicon Valley billionaires promoted the invasion of Afghanistan and covert incursions into Bolivia to control their Lithium mines as well as covert incursions in the Congo (The only place you can get it) to control the Cobalt for DNC financier Elon Musk’s lithium ion batteries.

The USAID promoted the Afghan, Bolivian and Congo “monetization”. Obama and The Clintons actively fund and promote USAID projects and share in USAID “Monetization Programs”. Obama and The Clintons are DNC deep-and-wide.

Gawker Media was a CIA operation that attacked Republicans.

Silicon Valley DNC financiers were promised “Cleantech” and spy contract kick-backs by Obama and Clinton in exchange for putting Obama and Clinton in office via “social engineering”.

The CIA co-financed Google and Facebook for “social engineering” and they all became jolly Democrats.

CIA operatives and their In-Q-Tel peers work for Google and Elon Musk.

Thus, the current version of the CIA is a Silicon Valley/DNC dirty tricks joint operation which loves a good Coup D’etat. The current version of the FBI is an old fashioned cop-shop full of gun carrying Republicans who hate the CIA. The stage is now set for some big fun!

See the Big Picture Now?

But wait… WIKILEAKS says: “WIKILEAKS is only just getting started…”

Yikes!

CIA CREATES SOFTWARE TO CRASH TESLA’S, AIRPLANES AND OTHER THINGS FOR ASSASSINATIONS

Wikileaks Unveils ‘Vault 7’: “The Largest Ever Publication Of Confidential CIA Documents”; Another Snowden Emerges

by Tyler Durden

Mar 7, 2017 7:56 AM

WikiLeaks has published what it claims is the largest ever release of confidential documents on the CIA. It includes more than 8,000 documents as part of ‘Vault 7’, a series of leaks on the agency, which have allegedly emerged from the CIA’s Center For Cyber Intelligence in Langley, and which can be seen on the org chart below, which Wikileaks also released:

A total of 8,761 documents have been published as part of ‘Year Zero’, the first in a series of leaks the whistleblower organization has dubbed ‘Vault 7.’ WikiLeaks said that ‘Year Zero’ revealed details of the CIA’s “global covert hacking program,” including “weaponized exploits” used against company products including “Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.”

WikiLeaks tweeted the leak, which it claims came from a network inside the CIA’s Center for Cyber Intelligence in Langley, Virginia.

Among the more notable disclosures which, if confirmed, “would rock the technology world“, the CIA had managed to bypass encryption on popular phone and messaging services such as Signal, WhatsApp and Telegram. According to the statement from WikiLeaks, government hackers can penetrate Android phones and collect “audio and message traffic before encryption is applied.”

Another profound revelation is that the CIA can engage in “false flag” cyberattacks which portray Russia as the assailant. Discussing the CIA’s Remote Devices Branch’s UMBRAGE group, Wikileaks’ source notes that it “collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.

“With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from. UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.”

As Kim Dotcom summarizes this finding, “CIA uses techniques to make cyber attacks look like they originated from enemy state. It turns DNC/Russia hack allegation by CIA into a JOKE

CIA uses techniques to make cyber attacks look like they originated from enemy state. It turns DNC/Russia hack allegation by CIA into a JOKE

— Kim Dotcom (@KimDotcom) March 7, 2017

But perhaps what is most notable is the purported emergence of another Snowden-type whistleblower: the source of the information told WikiLeaks in a statement that they wish to initiate a public debate about the “security, creation, use, proliferation and democratic control of cyberweapons.”  Policy questions that should be debated in public include “whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency,” WikiLeaks claims the source said.

The FAQ section of the release, shown below, provides further details on the extent of the leak, which was “obtained recently and covers through 2016”. The time period covered in the latest leak is between the years 2013 and 2016, according to the CIA timestamps on the documents themselves. Secondly, WikiLeaks has asserted that it has not mined the entire leak and has only verified it, asking that journalists and activists do the leg work.

Among the various techniques profiled by WikiLeaks is “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones. After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.

As Kim Dotcom chimed in on Twitter, “CIA turns Smart TVs, iPhones, gaming consoles and many other consumer gadgets into open microphones” and added ” CIA turned every Microsoft Windows PC in the world into spyware. Can activate backdoors on demand, including via Windows update”

BREAKING: CIA turns Smart TVs, iPhones, gaming consoles and many other consumer gadgets into open microphones. #Vault7

— Kim Dotcom (@KimDotcom) March 7, 2017

Dotcom also added that “Obama accused Russia of cyberattacks while his CIA turned all internet enabled consumer electronics in Russia into listening devices. Wow!”

Obama accused Russia of cyberattacks while his CIA turned all internet enabled consumer electronics in Russia into listening devices. Wow!

— Kim Dotcom (@KimDotcom) March 7, 2017

Julian Assange, WikiLeaks editor stated that “There is an extreme proliferation risk in the development of cyber ‘weapons’. Comparisons can be drawn between the uncontrolled proliferation of such ‘weapons’, which results from the inability to contain them combined with their high market value, and the global arms trade. But the significance of “Year Zero” goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective.”

Key Highlights from the Vault 7 release so far:

  • “Year Zero” introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.

  • Wikileaks claims that the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

  • By the end of 2016, the CIA’s hacking division, which formally falls under the agency’s Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other “weaponized” malware. Such is the scale of the CIA’s undertaking that by 2016, its hackers had utilized more code than that used to run Facebook.

  • The CIA had created, in effect, its “own NSA” with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.

  • Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.

Snowden 2.0?

  • In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.

CIA targets iPhones, Androids, smart TVs:

  • CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA’s DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details).

  • The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell’s 1984, but “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.

Also cars, suggesting that the CIA may have a role in the death of Michael Hastings:

  • As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks.

  • The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.

And computers:

  • The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized “zero days”, air gap jumping viruses such as “Hammer Drill” which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( “Brutal Kangaroo”) and to keep its malware infestations going.

Hoarding of Zero Day exploits:

  • In the wake of Edward Snowden’s leaks about the NSA, the U.S. technology industry secured a commitment from the Obama administration that the executive would disclose on an ongoing basis — rather than hoard — serious vulnerabilities, exploits, bugs or “zero days” to Apple, Google, Microsoft, and other US-based manufacturers.

  • Serious vulnerabilities not disclosed to the manufacturers places huge swathes of the population and critical infrastructure at risk to foreign intelligence or cyber criminals who independently discover or hear rumors of the vulnerability. If the CIA can discover such vulnerabilities so can others.

Proliferation of leaked/hacked Cyberwar programs:

  • While nuclear proliferation has been restrained by the enormous costs and visible infrastructure involved in assembling enough fissile material to produce a critical nuclear mass, cyber ‘weapons’, once developed, are very hard to retain. Cyber ‘weapons’ are in fact just computer programs which can be pirated like any other. Since they are entirely comprised of information they can be copied quickly with no marginal cost.

  • Over the last three years the United States intelligence sector, which consists of government agencies such as the CIA and NSA and their contractors, such as Booze Allan Hamilton, has been subject to unprecedented series of data exfiltrations by its own workers.

  • Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by peer states, cyber mafia and teenage hackers alike.

The U.S. Consulate in Frankfurt is a covert CIA hacker base

  • In addition to its operations in Langley, Virginia the CIA also uses the U.S. consulate in Frankfurt as a covert base for its hackers covering Europe, the Middle East and Africa. CIA hackers operating out of the Frankfurt consulate ( “Center for Cyber Intelligence Europe” or CCIE) are given diplomatic (“black”) passports and State Department cover.

  • The instructions for incoming CIA hackers make Germany’s counter-intelligence efforts appear inconsequential: “Breeze through German Customs because you have your cover-for-action story down pat, and all they did was stamp your passport”

Examples of CIA projects

  • The CIA’s Engineering Development Group (EDG) management system contains around 500 different projects (only some of which are documented by “Year Zero”) each with their own sub-projects, malware and hacker tools. The majority of these projects relate to tools that are used for penetration, infestation (“implanting”), control, and exfiltration.

  • Umbrage: The CIA’s Remote Devices Branch’s UMBRAGE group collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation. With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from.

  • Fine Dining:  Fine Dining comes with a standardized questionnaire i.e menu that CIA case officers fill out. The questionnaire is used by the agency’s OSB (Operational Support Branch) to transform the requests of case officers into technical requirements for hacking attacks (typically “exfiltrating” information from computer systems) for specific operations.  Among the list of possible targets of the collection are ‘Asset’, ‘Liason Asset’, ‘System Administrator’, ‘Foreign Information Operations’, ‘Foreign Intelligence Agencies’ and ‘Foreign Government Entities’. Notably absent is any reference to extremists or transnational criminals.

  • ‘Improvise’; a toolset for configuration, post-processing, payload setup and execution vector selection for survey/exfiltration tools supporting all major operating systems like Windows (Bartender), MacOS (JukeBox) and Linux (DanceFloor).

  • HIVE: HIVE is a multi-platform CIA malware suite and its associated control software. The project provides customizable implants for Windows, Solaris, MikroTik (used in internet routers) and Linux platforms and a Listening Post (LP)/Command and Control (C2) infrastructure to communicate with these implants. The implants are configured to communicate via HTTPS with the webserver of a cover domain; each operation utilizing these implants has a separate cover domain and the infrastructure can handle any number of cover domains.

And some key sections from the FAQ:

  • What time period is covered? The years 2013 to 2016. The sort order of the pages within each level is determined by date (oldest first). WikiLeaks has obtained the CIA’s creation/last modification date for each page but these do not yet appear for technical reasons. Usually the date can be discerned or approximated from the content and the page order. If it is critical to know the exact time/date contact WikiLeaks.

  • What is “Vault 7” “Vault 7” is a substantial collection of material about CIA activities obtained by WikiLeaks.

  • What is the total size of “Vault 7”? The series is the largest intelligence publication in history.

  • When was each part of “Vault 7” obtained?: Part one was obtained recently and covers through 2016. Details on the other parts will be available at the time of publication.

  • Is each part of “Vault 7” from a different source? Details on the other parts will be available at the time of publication.

  • How did WikiLeaks obtain each part of “Vault 7”? Sources trust WikiLeaks to not reveal information that might help identify them.

  • Isn’t WikiLeaks worried that the CIA will act against its staff to stop the series? No. That would be certainly counter-productive.

* * *

PREVIOUSLY

As a reminder, last night Wikileaks announced that it has released an encrypted torrent file which reportedly contains information on the mysterious “Vault 7”, and which we now know is the biggest “collection of material about CIA activities obtained by WikiLeaks.publication in history.” It can be downloaded now at the following URL, and accessed using the password “SplinterItIntoAThousandPiecesAndScatterItIntoTheWinds”

Wikileaks had previously announced that it would hold an 8am Eastern press conference, as part of the unveiling.

ANNOUNCE: WikiLeaks press conference in under five hours at 8am ET / 1pm UTC / 14:00 CET. Streamed live. #askWL

— WikiLeaks (@wikileaks) March 7, 2017

However, there appeared to have been some complications, with Wikileaks tweeting that “the press conference is under attack: Facebook+Periscope video used by WikiLeaks’ editor Julian Assange have been attacked. Activating contingency plans”

Press conf under attack: Facebook+Periscope video used by WikiLeaks’ editor Julian Assange have been attacked. Activating contingency (1/2)

— WikiLeaks (@wikileaks) March 7, 2017

Wikileaks then announced that “As Mr. Assange’s Perscipe+Facebook video stream links are under attack his video press conference will be rescheduled.”

NOTICE: As Mr. Assange’s Perscipe+Facebook video stream links are under attack his video press conference will be rescheduled.

— WikiLeaks (@wikileaks) March 7, 2017

In a separate tweet, Wikileaks has just released the passphrase to decrypt the torrent file: RELEASE: CIA Vault 7 Year Zero decryption passphrase:

SplinterItIntoAThousandPiecesAndScatterItIntoTheWinds

RELEASE: CIA Vault 7 Year Zero decryption passphrase:

SplinterItIntoAThousandPiecesAndScatterItIntoTheWinds

— WikiLeaks (@wikileaks) March 7, 2017

As a result, since Assange appears to have been unable to launch his previously scheduled press conference, he has gone ahead and issued the press release on Vault 7 Part 1 “Year Zero, which is titled: Inside the CIA’s global hacking force:

Press Release

Vault 7: CIA Hacking Tools Revealed

Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named “Vault 7” by WikiLeaks, it is the largest ever publication of confidential documents on the agency.

The first full part of the series, “Year Zero”, comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA’s Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election.

Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

“Year Zero” introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.

Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA). The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force — its own substantial fleet of hackers. The agency’s hacking division freed it from having to disclose its often controversial operations to the NSA (its primary bureaucratic rival) in order to draw on the NSA’s hacking capacities.

By the end of 2016, the CIA’s hacking division, which formally falls under the agency’s Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other “weaponized” malware. Such is the scale of the CIA’s undertaking that by 2016, its hackers had utilized more code than that used to run Facebook. The CIA had created, in effect, its “own NSA” with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.

In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.

Julian Assange, WikiLeaks editor stated that “There is an extreme proliferation risk in the development of cyber ‘weapons’. Comparisons can be drawn between the uncontrolled proliferation of such ‘weapons’, which results from the inability to contain them combined with their high market value, and the global arms trade. But the significance of “Year Zero” goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective.”

Wikileaks has carefully reviewed the “Year Zero” disclosure and published substantive CIA documentation while avoiding the distribution of ‘armed’ cyberweapons until a consensus emerges on the technical and political nature of the CIA’s program and how such ‘weapons’ should analyzed, disarmed and published.

Wikileaks has also decided to redact and anonymise some identifying information in “Year Zero” for in depth analysis. These redactions include ten of thousands of CIA targets and attack machines throughout Latin America, Europe and the United States. While we are aware of the imperfect results of any approach chosen, we remain committed to our publishing model and note that the quantity of published pages in “Vault 7” part one (“Year Zero”) already eclipses the total number of pages published over the first three years of the Edward Snowden NSA leaks.

* * *

Analysis

CIA malware targets iPhone, Android, smart TVs

CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA’s DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details).

The EDG is responsible for the development, testing and operational support of all backdoors, exploits, malicious payloads, trojans, viruses and any other kind of malware used by the CIA in its covert operations world-wide.

The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell’s 1984, but “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.

The attack against Samsung smart TVs was developed in cooperation with the United Kingdom’s MI5/BTSS. After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.

As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.

The CIA’s Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones. Infected phones can be instructed to send the CIA the user’s geolocation, audio and text communications as well as covertly activate the phone’s camera and microphone.

Despite iPhone’s minority share (14.5%) of the global smart phone market in 2016, a specialized unit in the CIA’s Mobile Development Branch produces malware to infest, control and exfiltrate data from iPhones and other Apple products running iOS, such as iPads. CIA’s arsenal includes numerous local and remote “zero days” developed by CIA or obtained from GCHQ, NSA, FBI or purchased from cyber arms contractors such as Baitshop. The disproportionate focus on iOS may be explained by the popularity of the iPhone among social, political, diplomatic and business elites.

A similar unit targets Google’s Android which is used to run the majority of the world’s smart phones (~85%) including Samsung, HTC and Sony. 1.15 billion Android powered phones were sold last year. “Year Zero” shows that as of 2016 the CIA had 24 “weaponized” Android “zero days” which it has developed itself and obtained from GCHQ, NSA and cyber arms contractors.

These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the “smart” phones that they run on and collecting audio and message traffic before encryption is applied.

CIA malware targets Windows, OSx, Linux, routers

The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized “zero days”, air gap jumping viruses such as “Hammer Drill” which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( “Brutal Kangaroo”) and to keep its malware infestations going.

Many of these infection efforts are pulled together by the CIA’s Automated Implant Branch (AIB), which has developed several attack systems for automated infestation and control of CIA malware, such as “Assassin” and “Medusa”.

Attacks against Internet infrastructure and webservers are developed by the CIA’s Network Devices Branch (NDB).

The CIA has developed automated multi-platform malware attack and control systems covering Windows, Mac OS X, Solaris, Linux and more, such as EDB’s “HIVE” and the related “Cutthroat” and “Swindle” tools, which are described in the examples section below.

CIA ‘hoarded’ vulnerabilities (“zero days”)

In the wake of Edward Snowden’s leaks about the NSA, the U.S. technology industry secured a commitment from the Obama administration that the executive would disclose on an ongoing basis — rather than hoard — serious vulnerabilities, exploits, bugs or “zero days” to Apple, Google, Microsoft, and other US-based manufacturers.

Serious vulnerabilities not disclosed to the manufacturers places huge swathes of the population and critical infrastructure at risk to foreign intelligence or cyber criminals who independently discover or hear rumors of the vulnerability. If the CIA can discover such vulnerabilities so can others.

The U.S. government’s commitment to the Vulnerabilities Equities Process came after significant lobbying by US technology companies, who risk losing their share of the global market over real and perceived hidden vulnerabilities. The government stated that it would disclose all pervasive vulnerabilities discovered after 2010 on an ongoing basis.

“Year Zero” documents show that the CIA breached the Obama administration’s commitments. Many of the vulnerabilities used in the CIA’s cyber arsenal are pervasive and some may already have been found by rival intelligence agencies or cyber criminals.

As an example, specific CIA malware revealed in “Year Zero” is able to penetrate, infest and control both the Android phone and iPhone software that runs or has run presidential Twitter accounts. The CIA attacks this software by using undisclosed security vulnerabilities (“zero days”) possessed by the CIA but if the CIA can hack these phones then so can everyone else who has obtained or discovered the vulnerability. As long as the CIA keeps these vulnerabilities concealed from Apple and Google (who make the phones) they will not be fixed, and the phones will remain hackable.

The same vulnerabilities exist for the population at large, including the U.S. Cabinet, Congress, top CEOs, system administrators, security officers and engineers. By hiding these security flaws from manufacturers like Apple and Google the CIA ensures that it can hack everyone &mdsh; at the expense of leaving everyone hackable.

‘Cyberwar’ programs are a serious proliferation risk

Cyber ‘weapons’ are not possible to keep under effective control.

While nuclear proliferation has been restrained by the enormous costs and visible infrastructure involved in assembling enough fissile material to produce a critical nuclear mass, cyber ‘weapons’, once developed, are very hard to retain.

Cyber ‘weapons’ are in fact just computer programs which can be pirated like any other. Since they are entirely comprised of information they can be copied quickly with no marginal cost.

Securing such ‘weapons’ is particularly difficult since the same people who develop and use them have the skills to exfiltrate copies without leaving traces — sometimes by using the very same ‘weapons’ against the organizations that contain them. There are substantial price incentives for government hackers and consultants to obtain copies since there is a global “vulnerability market” that will pay hundreds of thousands to millions of dollars for copies of such ‘weapons’. Similarly, contractors and companies who obtain such ‘weapons’ sometimes use them for their own purposes, obtaining advantage over their competitors in selling ‘hacking’ services.

Over the last three years the United States intelligence sector, which consists of government agencies such as the CIA and NSA and their contractors, such as Booze Allan Hamilton, has been subject to unprecedented series of data exfiltrations by its own workers.

A number of intelligence community members not yet publicly named have been arrested or subject to federal criminal investigations in separate incidents.

Most visibly, on February 8, 2017 a U.S. federal grand jury indicted Harold T. Martin III with 20 counts of mishandling classified information. The Department of Justice alleged that it seized some 50,000 gigabytes of information from Harold T. Martin III that he had obtained from classified programs at NSA and CIA, including the source code for numerous hacking tools.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by peer states, cyber mafia and teenage hackers alike.

U.S. Consulate in Frankfurt is a covert CIA hacker base

In addition to its operations in Langley, Virginia the CIA also uses the U.S. consulate in Frankfurt as a covert base for its hackers covering Europe, the Middle East and Africa.

CIA hackers operating out of the Frankfurt consulate ( “Center for Cyber Intelligence Europe” or CCIE) are given diplomatic (“black”) passports and State Department cover. The instructions for incoming CIA hackers make Germany’s counter-intelligence efforts appear inconsequential: “Breeze through German Customs because you have your cover-for-action story down pat, and all they did was stamp your passport”

Your Cover Story (for this trip)
Q: Why are you here?
A: Supporting technical consultations at the Consulate.

Two earlier WikiLeaks publications give further detail on CIA approaches to customs and secondary screening procedures.

Once in Frankfurt CIA hackers can travel without further border checks to the 25 European countries that are part of the Shengen open border area — including France, Italy and Switzerland.

A number of the CIA’s electronic attack methods are designed for physical proximity. These attack methods are able to penetrate high security networks that are disconnected from the internet, such as police record database. In these cases, a CIA officer, agent or allied intelligence officer acting under instructions, physically infiltrates the targeted workplace. The attacker is provided with a USB containing malware developed for the CIA for this purpose, which is inserted into the targeted computer. The attacker then infects and exfiltrates data to removable media. For example, the CIA attack system Fine Dining, provides 24 decoy applications for CIA spies to use. To witnesses, the spy appears to be running a program showing videos (e.g VLC), presenting slides (Prezi), playing a computer game (Breakout2, 2048) or even running a fake virus scanner (Kaspersky, McAfee, Sophos). But while the decoy application is on the screen, the underlaying system is automatically infected and ransacked.

How the CIA dramatically increased proliferation risks

In what is surely one of the most astounding intelligence own goals in living memory, the CIA structured its classification regime such that for the most market valuable part of “Vault 7” — the CIA’s weaponized malware (implants + zero days), Listening Posts (LP), and Command and Control (C2) systems — the agency has little legal recourse.

The CIA made these systems unclassified.

Why the CIA chose to make its cyberarsenal unclassified reveals how concepts developed for military use do not easily crossover to the ‘battlefield’ of cyber ‘war’.

To attack its targets, the CIA usually requires that its implants communicate with their control programs over the internet. If CIA implants, Command & Control and Listening Post software were classified, then CIA officers could be prosecuted or dismissed for violating rules that prohibit placing classified information onto the Internet. Consequently the CIA has secretly made most of its cyber spying/war code unclassified. The U.S. government is not able to assert copyright either, due to restrictions in the U.S. Constitution. This means that cyber ‘arms’ manufactures and computer hackers can freely “pirate” these ‘weapons’ if they are obtained. The CIA has primarily had to rely on obfuscation to protect its malware secrets.

Conventional weapons such as missiles may be fired at the enemy (i.e into an unsecured area). Proximity to or impact with the target detonates the ordnance including its classified parts. Hence military personnel do not violate classification rules by firing ordnance with classified parts. Ordnance will likely explode. If it does not, that is not the operator’s intent.

Over the last decade U.S. hacking operations have been increasingly dressed up in military jargon to tap into Department of Defense funding streams. For instance, attempted “malware injections” (commercial jargon) or “implant drops” (NSA jargon) are being called “fires” as if a weapon was being fired. However the analogy is questionable.

Unlike bullets, bombs or missiles, most CIA malware is designed to live for days or even years after it has reached its ‘target’. CIA malware does not “explode on impact” but rather permanently infests its target. In order to infect target’s device, copies of the malware must be placed on the target’s devices, giving physical possession of the malware to the target. To exfiltrate data back to the CIA or to await further instructions the malware must communicate with CIA Command & Control (C2) systems placed on internet connected servers. But such servers are typically not approved to hold classified information, so CIA command and control systems are also made unclassified.

A successful ‘attack’ on a target’s computer system is more like a series of complex stock maneuvers in a hostile take-over bid or the careful planting of rumors in order to gain control over an organization’s leadership rather than the firing of a weapons system. If there is a military analogy to be made, the infestation of a target is perhaps akin to the execution of a whole series of military maneuvers against the target’s territory including observation, infiltration, occupation and exploitation.

Evading forensics and anti-virus

A series of standards lay out CIA malware infestation patterns which are likely to assist forensic crime scene investigators as well as Apple, Microsoft, Google, Samsung, Nokia, Blackberry, Siemens and anti-virus companies attribute and defend against attacks.

“Tradecraft DO’s and DON’Ts” contains CIA rules on how its malware should be written to avoid fingerprints implicating the “CIA, US government, or its witting partner companies” in “forensic review”. Similar secret standards cover the use of encryption to hide CIA hacker and malware communication (pdf), describing targets & exfiltrated data (pdf) as well as executing payloads (pdf) and persisting (pdf) in the target’s machines over time.

CIA hackers developed successful attacks against most well known anti-virus programs. These are documented in AV defeats, Personal Security Products, Detecting and defeating PSPs and PSP/Debugger/RE Avoidance. For example, Comodo was defeated by CIA malware placing itself in the Window’s “Recycle Bin”. While Comodo 6.x has a “Gaping Hole of DOOM”.

CIA hackers discussed what the NSA’s “Equation Group” hackers did wrong and how the CIA’s malware makers could avoid similar exposure.

Examples

The CIA’s Engineering Development Group (EDG) management system contains around 500 different projects (only some of which are documented by “Year Zero”) each with their own sub-projects, malware and hacker tools.

The majority of these projects relate to tools that are used for penetration, infestation (“implanting”), control, and exfiltration.

Another branch of development focuses on the development and operation of Listening Posts (LP) and Command and Control (C2) systems used to communicate with and control CIA implants; special projects are used to target specific hardware from routers to smart TVs.

Some example projects are described below, but see the table of contents for the full list of projects described by WikiLeaks’ “Year Zero”.

UMBRAGE

The CIA’s hand crafted hacking techniques pose a problem for the agency. Each technique it has created forms a “fingerprint” that can be used by forensic investigators to attribute multiple different attacks to the same entity.

This is analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible. As soon one murder in the set is solved then the other murders also find likely attribution.

The CIA’s Remote Devices Branch‘s UMBRAGE group collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.

With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from.

UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.

Fine Dining

Fine Dining comes with a standardized questionnaire i.e menu that CIA case officers fill out. The questionnaire is used by the agency’s OSB (Operational Support Branch) to transform the requests of case officers into technical requirements for hacking attacks (typically “exfiltrating” information from computer systems) for specific operations. The questionnaire allows the OSB to identify how to adapt existing tools for the operation, and communicate this to CIA malware configuration staff. The OSB functions as the interface between CIA operational staff and the relevant technical support staff.

Among the list of possible targets of the collection are ‘Asset’, ‘Liason Asset’, ‘System Administrator’, ‘Foreign Information Operations’, ‘Foreign Intelligence Agencies’ and ‘Foreign Government Entities’. Notably absent is any reference to extremists or transnational criminals. The ‘Case Officer’ is also asked to specify the environment of the target like the type of computer, operating system used, Internet connectivity and installed anti-virus utilities (PSPs) as well as a list of file types to be exfiltrated like Office documents, audio, video, images or custom file types. The ‘menu’ also asks for information if recurring access to the target is possible and how long unobserved access to the computer can be maintained. This information is used by the CIA’s ‘JQJIMPROVISE’ software (see below) to configure a set of CIA malware suited to the specific needs of an operation.

Improvise (JQJIMPROVISE)

‘Improvise’ is a toolset for configuration, post-processing, payload setup and execution vector selection for survey/exfiltration tools supporting all major operating systems like Windows (Bartender), MacOS (JukeBox) and Linux (DanceFloor). Its configuration utilities like Margarita allows the NOC (Network Operation Center) to customize tools based on requirements from ‘Fine Dining’ questionairies.

HIVE

HIVE is a multi-platform CIA malware suite and its associated control software. The project provides customizable implants for Windows, Solaris, MikroTik (used in internet routers) and Linux platforms and a Listening Post (LP)/Command and Control (C2) infrastructure to communicate with these implants.

The implants are configured to communicate via HTTPS with the webserver of a cover domain; each operation utilizing these implants has a separate cover domain and the infrastructure can handle any number of cover domains.

Each cover domain resolves to an IP address that is located at a commercial VPS (Virtual Private Server) provider. The public-facing server forwards all incoming traffic via a VPN to a ‘Blot’ server that handles actual connection requests from clients. It is setup for optional SSL client authentication: if a client sends a valid client certificate (only implants can do that), the connection is forwarded to the ‘Honeycomb’ toolserver that communicates with the implant; if a valid certificate is missing (which is the case if someone tries to open the cover domain website by accident), the traffic is forwarded to a cover server that delivers an unsuspicious looking website.

The Honeycomb toolserver receives exfiltrated information from the implant; an operator can also task the implant to execute jobs on the target computer, so the toolserver acts as a C2 (command and control) server for the implant.

Similar functionality (though limited to Windows) is provided by the RickBobby project.

See the classified user and developer guides for HIVE.

* * *

FREQUENTLY ASKED QUESTIONS

Why now?

WikiLeaks published as soon as its verification and analysis were ready.

In Febuary the Trump administration has issued an Executive Order calling for a “Cyberwar” review to be prepared within 30 days.

While the review increases the timeliness and relevance of the publication it did not play a role in setting the publication date.

Redactions

Names, email addresses and external IP addresses have been redacted in the released pages (70,875 redactions in total) until further analysis is complete.

  1. Over-redaction: Some items may have been redacted that are not employees, contractors, targets or otherwise related to the agency, but are, for example, authors of documentation for otherwise public projects that are used by the agency.

  2. Identity vs. person: the redacted names are replaced by user IDs (numbers) to allow readers to assign multiple pages to a single author. Given the redaction process used a single person may be represented by more than one assigned identifier but no identifier refers to more than one real person.

  3. Archive attachments (zip, tar.gz, …) are replaced with a PDF listing all the file names in the archive. As the archive content is assessed it may be made available; until then the archive is redacted.

  4. Attachments with other binary content are replaced by a hex dump of the content to prevent accidental invocation of binaries that may have been infected with weaponized CIA malware. As the content is assessed it may be made available; until then the content is redacted.

  5. The tens of thousands of routable IP addresses references (including more than 22 thousand within the United States) that correspond to possible targets, CIA covert listening post servers, intermediary and test systems, are redacted for further exclusive investigation.

  6. Binary files of non-public origin are only available as dumps to prevent accidental invocation of CIA malware infected binaries.

Organizational Chart

The organizational chart corresponds to the material published by WikiLeaks so far.

Since the organizational structure of the CIA below the level of Directorates is not public, the placement of the EDG and its branches within the org chart of the agency is reconstructed from information contained in the documents released so far. It is intended to be used as a rough outline of the internal organization; please be aware that the reconstructed org chart is incomplete and that internal reorganizations occur frequently.

Wiki pages

“Year Zero” contains 7818 web pages with 943 attachments from the internal development groupware. The software used for this purpose is called Confluence, a proprietary software from Atlassian. Webpages in this system (like in Wikipedia) have a version history that can provide interesting insights on how a document evolved over time; the 7818 documents include these page histories for 1136 latest versions.

The order of named pages within each level is determined by date (oldest first). Page content is not present if it was originally dynamically created by the Confluence software (as indicated on the re-constructed page).

What time period is covered?

The years 2013 to 2016. The sort order of the pages within each level is determined by date (oldest first).

WikiLeaks has obtained the CIA’s creation/last modification date for each page but these do not yet appear for technical reasons. Usually the date can be discerned or approximated from the content and the page order. If it is critical to know the exact time/date contact WikiLeaks.

What is “Vault 7”

“Vault 7” is a substantial collection of material about CIA activities obtained by WikiLeaks.

When was each part of “Vault 7” obtained?

Part one was obtained recently and covers through 2016. Details on the other parts will be available at the time of publication.

Is each part of “Vault 7” from a different source?

Details on the other parts will be available at the time of publication.

What is the total size of “Vault 7”?

The series is the largest intelligence publication in history.

How did WikiLeaks obtain each part of “Vault 7”?

Sources trust WikiLeaks to not reveal information that might help identify them.

Isn’t WikiLeaks worried that the CIA will act against its staff to stop the series?

No. That would be certainly counter-productive.

Has WikiLeaks already ‘mined’ all the best stories?

No. WikiLeaks has intentionally not written up hundreds of impactful stories to encourage others to find them and so create expertise in the area for subsequent parts in the series. They’re there. Look. Those who demonstrate journalistic excellence may be considered for early access to future parts.

Won’t other journalists find all the best stories before me?

Unlikely. There are very considerably more stories than there are journalists or academics who are in a position to write them.

The Cleantech Crash

THE BIGGEST CORRUPTION CASE IN MODERN HISTORY IS STILL HAPPENING IN WASHINGTON, DC!

From the new book: “THE SILICON VALLEY MAFIA: From Computer Chips to Gun Clips”

“…Silicon Valley campaign finance oligarchs ( John Doerr, Eric Schmidt, Steve Westly, Richard Blum, Larry Page, Elon Musk, Reid Hoffman, Vinod Khosla and the “PayPal Mafia” Cartel) made a deal with corrupt White House insiders (Rahm Emanual, Steven Rattner, Steven Chu, Matt Rogers, Jonathan Silver, David Plouffe, Robert Gibbs, David Axelrod, Bill Daley, Eric Holder, John Podesta,Valarie Jarrett and their staff) to exchange taxpayer cash for stock market valuation rigging, search engine and news visibility rigging, terminations of the PayPal Mafia’s competitors, election rigging and exclusive Department of Energy crony cash and contracts.

The oligarch billionaires received the largest hand-outs of taxpayer cash ever given to the smallest group of personally connected rich men in U.S. history.

When part of this scheme was uncovered, the oligarchs suddenly had the largest number of failures, bankruptcies and corruption charges, relative to their investments, in U.S. history. Did the GOP sabotage the companies from the “Cleantech Crash” as a punishment to the oligarchs for engaging in such audacious crimes? Did the oligarchs let their companies burn because they only wanted them in order to get the initial “stock pumps”and “management fee skims” in the beginning and the tax write-offs in the end? Were the oligarchs ‘green-washing” and lying about caring about green energy? Were they really just using feel-good PR terms to scam taxpayers out of hundreds of billions of dollars and put a President, that they controlled, in office?

It has been proven that over 680 people, who work for the oligarchs, now work in the White House and run State and Federal agencies and have a financial beneficiary relationship with the oligarchs. In this epic scam, corrupt mining deals, arranged by Goldman Sachs and Frank Giustra, played a large part. USAID resources were used as favors in order to gain lithium mines for Elon Musk and indium mines of FBI-raided Solyndra in Afghanistan. U.S. uranium mines, for John Doerr’s Russian business partners, and copper mines in various foreign nations, were also manipulated to pad the oligarchs over-all commodities portfolios via special flash boy schemes with Goldman Sachs.

Never in the history of America was so much of the voters own money given to such a small group of men who already had so much extra money. Never in the history of America was so much of the voters money given out to produce so many sudden business failures, in such a short period of time, all connected to the same group of oligarchs.

This is the story of those ongoing crimes as told by the witnesses, victims, ex-employees, journalists and federal investigators who saw these events take place. From the dirty deals at Wilson Sonsini to the FBI raids to the sex penthouses and deadly “sex yachts” of Google’s executives; readers are given a rare view inside the seedy and misogynistic under-belly of the hubris-ridden frat boys that seek to control anything they can get their hands on.

This Silicon Valley Cartel uses a swiss army knife of bribes to try to get their way. They pay politicians and operatives with cash, stock warrants, hookers and gay sex cabin boys, revolving door jobs, Tesla’s, pre-existing mansions held under trust funds, drugs, Google and Facebook search results rigging, election funding and other novel means of payola.

The book is an incredible read that bursts from the headlines you are reading this week. In many detailed pages it tells the story of a huge abuse of public policy and political power. You can find a copy online in many repositories.

The author team of writers and researchers have posted companion research data in peer-to-peer archives around the world:

The following is only a small sample of one of those evidence archives:

MIRROR ONE LINK

MIRROR TWO LINK

MIRROR THREE LINK

MIRROR LINK FOUR

Wondering What Happened?

To Our Readers:

WordPress took this news site down because it posted the same news stories as other news sites, like all other news sites do, in the network and WordPress informed us that they do not allow the news to be posted on multiple sites because…well, they would not say why, but we guess it makes information and news get all “out of control” if people are just openly disclosing facts willy nilly and not properly censoring things. We are trying to get Congressional, ACLU, etc. feedback about this and will back to all of our loyal readers once we understand why they did this.

This site used syndicated news like RSS and news feeds as all news-casters do along with citizen journalism postings by the public.

This site always followed the Public Commons Standard Notices, ie: “This WIKI News & Public Information Site is compliant with, and protected by,: EU Privacy Rules, SLAPP/ANTI-SLAPP, Creative Commons, Fair Use Doctrine, U.N. Press Freedom Statutes, U.S. First Amendment, Freedom-of-the-Press, International Free Speech Standards, ACLU precedents, EFF precedents, Privacy Rights Rules of Spain, National Journalism Standards and related standards. This policy is free-to-use for any public citizen journalism, news aggregation, WIKI, collaborative information space or social network site. Many users share the same login and password as well as relays for security.”

We will let you know what is going on once we find out. Thanks to all of our readers and contributors you for your massive numbers of phone calls, emails, etc.


READ THIS OVERVIEW OF THE NEW FEATURE FILM. THIS EXPLAINS WHY CERTAIN CAMPAIGN FINANCIERS WOULD ORDER WEBSITES BE DELETED OR TAKEN DOWN: thecarandthesenatorf1

SEE THESE REPORTS ON THE CASE:

07-30-2008-track-c-0400-0450-special-investigative-techniques-in-public-corruption-investigations

aafinal-doe-loan-guarantees-report

an-investigation-of-solyndra-and-the-department-of-energy-disasters-1-5

anti-corruption-books-and-research-2-1

big-how-google-malicious-attacks-its-political-enemies

chemical-analysis-of-tesla-motors-battery-dangers

day-traders-charge-tesla-and-solyndra-with-being-an-enron

doc-1-privco_on_426_13fisker

do-it-yourself-anti_corruption-tactics-2-5

feinstein-corruption-1-2

how-google-bribed-its-way-to-the-top

report-to-congress-on-gawker-media-c-doc

tesla-failures

the-big-deal-1-0

thecarandthesenatorf1

the-disclosure-part-1_8

the-silicon-valley-mafia-3-7

thesolyndraappendixpt1high

the-solyndraappendixpt1low

the-unofficial-history-of-tesla-motors-2-3

venture-capitol-collusion-and-blacklisting

when-the-west-wing-attacks-taxpayers

who-was-jonathan-silver

google-rigs-attacks-on-the-web

hillary-clinton-sponsored-secretive-arab-spring-program-with-google-in-q-tel-and-new-america-foundation-to-destabilize-middle-east

the-obama-west-wing-has-an-attack-team-it-uses-against-taxpayers-it-does-not-like

gawker-lawsuit-reveals-fraud

fortune-magazine-explains-why-the-obama-department-of-energy-sabotaged-h2

is-elon-musk-a-fraud

google-lawsuit-google-exposed-as-corruption-center

silicon-valley-buys-another-white-house

silicon-valleys-coup-detat-against-america-7

darkened-corridors-the-darkest-story-of-silicon-valley-corruption

the-afghan-spy-papers-on-afghanistan-electric-car-lithium

an-investigation-of-solyndra-and-the-department-of-energy-disasters-part-one

an-investigation-of-solyndra-and-the-department-of-energy-disasters-part-two

shadow-government-inside-doe

the-interdiction-part-one

why-you-should-never-buy-a-tesla-or-anything-that-elon-musk-makes

Why you should NEVER buy a Tesla, or anything that Elon Musk Makes!

  • If you have an ounce of morality, then you will not want to help Musk & Tesla profit from the crony political corruption that created them. Musk exists because he bribes politicians & acts as an illegal campaign financing conduit.

  • If you believe in God, or are in any way religious, Musk & Tesla are pure evil & exist because of hyper-corruption. You don’t want to contribute to their evil or be part of it in any way. You are funding evil & supporting criminal corruption by buying a Tesla or any Elon Musk owned product like Solar City, Tesla, Space X, Hyperloop, etc.!

  • If you read about the dirty deeds and cocaine dealings with the In-Q-Tel airplanes called “Cocaine 1” & “Cocaine 2”, & the corruption behind the company called In-Q-Tel & Musk’s software programmer who ran “The Silk Road” drug & murder service then you must be concerned that many In-Q-Tel people work for Musk. Why does Musk need dirty druggies & spies on his payroll unless he is running covert drug and business spying activities?

  • If you are a Democrat then know that Elon Musk cost you the Hillary Clinton campaign because of his payola schemes. If you are a Republican, know that Elon Musk is the epitome of the worst form of DNC crony corruption you ever saw!

  • Musk bribed California politicians to give him hundreds of millions of dollars of taxpayer dollars & resources he never earned or worked for. He only got those crony payola perks handed to him because he operated as an illicit front for corrupt campaign financing for Dianne Feinstein, Jerry Brown, Harry Reid, Barack Obama and Hillary Clinton.

  • Multiple parties have filed “Demands For The Arrest of Elon Musk” with the FBI, DOJ, AG, FTC, SEC and other law enforcement agencies. It is not likely that Musk, or his companies will survive a full investigation.

  • Tesla and Solyndra sit on the same land in Fremont, CA. Solyndra was raided by the FBI for corruption. Tesla SHOULD be raided by the FBI for corruption. Both companies had kick-back crony payola schemes with Senator Dianne Feinstein. She owned the land, lease, HR, construction company and supplier interests and stock for both companies in one of the most massive conflict-of-interest crony financing schemes in U.S. history. Elon Musk and the Feinsteins are corruption partners.

  • People who see you in a Tesla think of you as a “Tone Deaf Douchebag”, “Tesla Tool!”, “Arrogant Prick”, “Ostentatious Obama Oaf”, “Sheep”, “Mindless Yuppie Scum”, “Misogynistic Silicon Valley Clone”, “Self-promoting Elitist Douche”, “Fake News Reading Main Stream Boob”, “Naive Idiot” or other bad things.

  • Elon Musk is one of the main financiers behind Barack Obama & Hillary Clinton, both of whom have been charged with corruption. Musk endlessly tweets lies & “…No I didn’t do those bad things” BS but nobody else supports him.

  • Tesla financial records are “cooked” in a fraudulent manner to make the stock market valuation of Tesla a falsely manipulated factor. Musk uses “pre-orders”, by his own investors, to fake sales and wrote emails to customers asking them to put small deposits down so he could book them as fully paid sales in one of a large number of stock and loan valuation frauds. Musk and his investors practice stock market skims, pump-and-dumps and Flash Boy manipulations.

  • Lithium ion batteries are blowing up, starting fires &, generally, destroying people’s homes, cars, electronics & physical health. Boeing was ordered to stop flying the 787 Dreamliner because it’s Lithium ion batteries are catching fire spontaneously. A group of silicon valley venture capitalists forced/leveraged the government to buy & pay for these specific batteries, that they have stock in, in order to benefit their profit margins. Other batteries don’t have these problems. They knew about the dangers from day one, but put greed ahead of safety. There are thousands & thousands of reports of spontaneous lithium ion fires but the VC’s who back lithium ion pay to keep this information hushed up. Millions of these batteries have been recalled for fire risk. The VC’s tried to push as many as they could before they got caught. Now they are caught. These VC’s & the Senators they bribed own stock in lithium mining companies too.

  • Tesla Motors has filed a patent which states the following , THESE ARE TESLA MOTORS WORDS warning about a crisis, the level of which they never disclosed to the consumer: “Thermal runaway is of major concern since a single incident can lead to significant property damage &, in some circumstances, bodily harm or loss of life. When a battery undergoes thermal runaway, it typically emits a large quantity of smoke, jets of flaming liquid electrolyte, & sufficient heat to lead to the combustion & destruction of materials in close proximity to the cell. If the cell undergoing thermal runaway is surrounded by one or more additional cells as is typical in a battery pack, then a single thermal runaway event can quickly lead to the thermal runaway of multiple cells which, in turn, can lead to much more extensive collateral damage. Regardless of whether a single cell or multiple cells are undergoing this phenomenon, if the initial fire is not extinguished immediately, subsequent fires may be caused that dramatically expand the degree of property damage. For example, the thermal runaway of a battery within an unattended laptop will likely result in not only the destruction of the laptop, but also at least partial destruction of its surroundings, e.g., home, office, car, laboratory, etc. If the laptop is on-board an aircraft, for example within the cargo hold or a luggage compartment, the ensuing smoke & fire may lead to an emergency landing or, under more dire conditions, a crash landing. Similarly, the thermal runaway of one or more batteries within the battery pack of a hybrid or electric vehicle may destroy not only the car, but may lead to a car wreck if the car is being driven or the destruction of its surroundings if the car is parked”.

  • Tesla’s own staff, & every fire department, have now admitted that once a lithium ion fire gets started in a Tesla, that it is impossible to extinguish burning lithium ion material. This is Telsa’s own words in THEIR patent filing, (You can look it up online) saying that the risk is monumental. Tesla has 6800 lithium ion batteries, any one of which can “go thermal”, start a chain reaction and blow up all of the rest of the 6800+ deadly batteries! Tesla drivers have been burned alive in thermal globs of flaming lithium ion, plastics & metal. Bystanders have heard their horrific screams of unutterable pain & terror as they were burned alive! Tesla fires can’t be extinguished & the bodies are burned into “unrecognizable lumps of charred flesh”, according to fireman.

  • Lithium Ion batteries “go thermal” in peoples pockets, in your notebook, especially in a Tesla & Fisker car. There are tens of thousands of articles documenting this & there is a cover-up by the VC’s that fund these things to keep this fact out-of-sight. Making Lithium Ion batteries poisons the workers who make them. It is a dangerous product that is covered-up by the Obama Administration. Panasonic knows that these batteries are deadly.

  • Tesla only exists to exploit Elon Musk’s briberies. The lithium ion batteries blow up when they get: wet, hot, bumped, over-charged, struck by energy fields, exposed to air or squashed. Lithium ion batteries poison the Earth & that they poison & kill the workers that make them. Lithium ion batteries come from war profiteering in Afghan & Bolivian corruption.

  • Panasonic is Elon Musk’s partner. Panasonic is one of the most corrupt companies in the world. Panasonic has been charged, on multiple continents with: Product dumping, bribery, collusion, price fixing, anti-trust law violations, racketeering, worker abuse, toxic poisoning of workers, & other crimes. It is no wonder that Elon Musk & Panasonic are partners. Tata Motors executive Karl Slym was killed for exposing this fact.

  • Your tax dollars were stolen in order to make Tesla Motors, as part of a political financing kick-back scam. In other words, part of your paycheck was taken away from you in order to buy hookers, rent-boys & private jets for Musk & company.

  • Tesla are forged in criminal corruption, so anybody who drives a Tesla must be either ignorant, a weasel or one of the corrupt. The whole world now knows all of the facts in this list so you can never plead ignorance to these crimes.

  • Telsa’s have a huge amount of highly documented defects. The defects are so extensive that Tesla made buyers sign confidentiality agreements to try to hide how messed up their cars are.

  • Tesla’s have killed more people than the main-stream news has reported. The full Tesla death-list is covered up.

  • Musk lied about why he wanted to make electric cars, when, in fact, he actually poisons the environment because Tesla investors wanted to exploit toxic minerals & materials which can’t be recycled in a clean manner

  • No other electric car has been so mundane, & yet had so many problems with it, since the electric car was first sold in the 1800’s. There is nothing “novel” or “amazing” about the Tesla aside from dime store parlor tricks for PR hype.

  • More drunks have crashed Tesla’s, than any other per capita car in the world, per volume of cars made

  • Elon Musk’s co-founders, investors, partners, wives, investors, suppliers & employees have sued him for being a fraud &, essentially, called him an “asshole” in court records.

  • Elon Musk lied on this Department of Energy funding application and the Obama Administration refuses to allow any federal employees or witnesses to testify to these facts in public due to the devastating potential results of these facts.

  • More owners of Tesla’s have been found to cheat on their taxes, & be involved in abuse-based divorces, than almost any other car brand owner. Tesla owners are bad people who rationalize their poor life choices.

  • Elon Musk will lie, cheat & steal in order to self-aggrandize & glorify his egotistical mania. Musk has been documented engaging in over 100 lies which were later proven to be false. He has spent tens of millions of dollars to but fake news about himself on Twitter, Facebook & Google because he is such a mentally disturbed ego-maniac.

  • None of Elon Musk’s companies would exist if not for taxpayer funded handouts given to him by corrupt politicians in exchange for illegal campaign finance deals with him & his investors.

  • Google, & Tesla, who are financial & political partners, have both been caught spying on consumers & manipulating Internet data in order to cover-up their complicity in huge political corruption & kick-back deals

  • Musk took U.S. taxpayer dollars from the government & then hired cheap off-shore labor & fired U.S. Union workers & domestic workers. He lied to & screwed the NUMMI workers that were working at the Fremont plant.

  • Musk has put over 18 surveillance devices in the Tesla. Anybody can hack those devices & monitor you. WORSE YET, foreign agents have hacked the Tesla & taken over the controls & driven Tesla’s into bystanders & over cliffs.

  • When Erick Strickland was head of the NHTSA he was confronted about DOT safety cover-ups of the Tesla to protect Obama. He quit 48 hours later. The DOT safety cover-ups to protect the Obama campaign finance payola scheme continue to this day. Obama’s Gibbs, Emanual, Plouffe, Axelrod and Carney quit within a week of being threatened with exposure.

  • Tesla’s have had a large number of recalls but Elon Musk refuses to call them “recalls”. Tesla’s have had multiple recalls for SEVERE safety dangers. DOT has been told this, in writing, for years, but wont take action in order to protect Obama.

  • Elon Musk is a bullshit artist who has no original ideas & wears black-turtle neck shirts (like Elizabeth Homes) to try to create a “cult” around himself & convince the world that he is a “Jesus-like” figure when, in fact, he is a clinical sociopath.

  • Tesla is a severe public safety hazard that has been systematically covered up by corrupt politicians.

  • Tesla Motors batteries were promoted by those who wished to exploit the Afghanistan War for personal profit by controlling the Afghan lithium mining fields. Kleiner Perkins and Draper Fisher hyped the “…trillions of $ of lithium in Afganistan.

  • Tesla Motors batteries blow up on their own.

  • Tesla Motors batteries blow up when they get wet.

  • Tesla Motors batteries fires cannot be put out by any common fire-fighting resources.

  • Tesla Motors batteries set themselves on fire.

  • Per MSDS documents, Tesla Motors batteries emit cancer-causing vapors when they burn.

  • Tesla Motors Vehicles toxicity poison bystanders, nearby vehicular passengers, airline passengers in planes carrying said batteries in their holds, & environments where such incidents occur.

  • Tesla Motors batteries blow up when bumped by the same level of car incident that would, otherwise, only dent a normal car bumper.

  • In an accident, when a Tesla rolls over, molten metal & plastic can drip on & burn the occupants alive.

  • Per MSDS documents, Tesla Motors batteries emit brain damaging chemicals when they burn.

  • Per MSDS documents, Tesla Motors batteries emit chemicals, burning, or not, that can damage an unborn fetus.

  • Per MSDS documents, Tesla Motors batteries emit chemicals that can cause lung damage.

  • Per MSDS documents, Tesla Motors batteries emit chemicals that can cause liver damage.

  • Per published lawsuits & news reports, the factories that make Tesla Motors batteries have been charged with the deaths, & potentially fatal illness, of over 1000 workers & the poisoning of nearby towns.

  • Tesla Motors batteries become even more dangerous over time, particularly when tasked by electric transportation systems like Hover-boards & Tesla’s. The chemistry in a lithium ion battery changes to become more unstable over time.

  • Tesla Motors batteries were never designed to be used in automobiles. Tesla used non-automotive batteries in one of the most dangerous configurations possible.

  • Tesla Motors occupants experience higher EMF radiation exposure than gasoline vehicle occupants.

  • Elon Musk’s Space X vehicles & Tesla Motors vehicles have both had a higher-than-average number of explosions. This has caused outside experts to doubt Musk’s ability to place safety considerations over his need for hyped-up PR.

  • Leaked Sandia National Labs & FAA research videos dramatically demonstrate the unstoppable, horrific, “re-percussive accelerating domino-effect” explosive fire effect of the Tesla Motors batteries.

  • Tesla’s own “Superchargers” & home 3-prong chargers have set Tesla’s, homes & businesses on fire.

  • Consumer rights groups contacted Erick Strickland, the head of the NHTSA, & charged him with a cover-up. He quit days later. The NHTSA then issued a safety investigation request to Tesla Motors, which would have more publicly exposed these dangers, but the safety investigation was never under-taken due to White House requests & lobbyist bribes, from Tesla, which got the investigation shut down.

  • NEPA regulations for the Tesla NUMMI factory in California & the Nevada Tesla “Gigafactory” have been violated relative to environmental safety standards.

  • Tesla Motors vehicles are not “Factory Built” “like Ford” builds cars, as Tesla professes. They are hand built in small volumes & subjected to numerous defects. Blogs have documented hundreds of defects, as listed by Tesla owners. Tesla has lost at least one LEMON CAR LAWSUIT for defective manufacturing.

  • Tesla’s “showrooms” are often “pop-up” retail storefronts that are in tight-proximity retail centers, putting it’s neighbors at risk of total loss from fire damage.

  • Tesla Motors vehicles have been hacked & taken over. Their doors, steering, listening devices & navigation have been taken over by outside parties. Multiple Tesla have suddenly swerved off the road, over cliffs & into other vehicles, killing bystanders & Tesla drivers.

  • Three Tesla top engineers & two competing senior executives, all of whom had whistle-blown on Tesla, who were in perfect health one day, suddenly died mysteriously the next day.

  • Multiple employees, founders, investors, marital partners, suppliers & others have sued Tesla Motors, &/or it’s senior executives for fraud. Musk had nothing to do with creating Tesla. He ran a hostile take-over of Tesla from the founders.

  • In addition to suing him, many of his former staff & partners have described Musk as an “Arrogant Prick”.

  • If you think the above bullet-points are bad there are over a 1000 more. Find the book “Is Elon Musk A Fraud” online or visit https://stopelonfromfailingagain.com/ or thousands of other sites that expose the truth about Musk & Tesla!

Print this out & freely re-post it on blogs & social media. Post this on bulletin boards. Put this on the windshield of every Tesla you find. Print this out & hand these out in front of every Tesla dealership: Nobody can stop you from handing these out, it is your U.S. Constitutional First Amendment Right! Pass the word! This report is also being used to globally track, metricize, quantify and forensically document Google’s, Twitter’s and Facebook’s manipulation of internet information for a pending RICO lawsuit. Revision 2.5