WikiLeaks’ Vault 7 Password Linked to JFK’s ANTI-CIA Quote:

Leave a comment

JFK in Limo - Dallas - 1963 150pcnt

On Tuesday (Mar. 8, 2017) WikiLeaks began releasing a series of encrypted documents dubbed “Vault 7,” detailing the surveillance activities of the CIA.

As part of the release, the organization posted to Twitter a password for “Vault 7” that read as follows:


That password was a subset of words spoken by President John F. Kennedy 54 years ago, only a month before he was assassinated:

“I will splinter the CIA into a thousand pieces and scatter it into the wind,” were his exact words, according to a Kennedy administration official who spoke with The New York Times for a report published three years after JFK’s death.

Speaking in a History Channel program several years ago, Samuel Halpern, author of “The Assassination of JFK,” claimed that the threat stemmed from Kennedy’s frustration with the CIA, which he believed was becoming a “state within a state.”

It also originated, in part, with the then president’s vehement opposition to Operation Northwoods, a CIA-bred plan that called for “the possible assassination of Cuban émigrés, sinking boats of Cuban refugees on the high seas, hijacking planes, blowing up a U.S. ship, and even orchestrating violent terrorism in U.S. cities” — all to manipulate the American people into supporting a war against Cuba.

Listen to Halpern below:
Samuel Halpern, author of “The Assassination of JFK”

How exactly does this all tie in with WikiLeaks? Conspiracy theorists have long believed that JFK’s assassination was orchestrated by the CIA as retaliation for him preventing Operation Northwoods from being carried out and out of a desire to stop him from clamping down on the agency’s growing power.

The theory is that CIA officials killed the president to protect the agency’s position.

This brings us back to WikiLeaks, which has begun releasing documents that purport to expose the CIA’s shady behavior — and at a time when it seems much of the intelligence community is hostile to President Donald Trump, trying to undermine him at every turn.

Coincidence or conspiracy? You tell me.


See the Conservative Tribune:


WikiLeaks Releases CIA’s CYBER Methods & Means:

Leave a comment

CIA_Headquarters_Seal - The Cracks Are Showing

By Robert Healy at America Speaks Ink

This week, the transparency organization, WikiLeaks, released an extraordinary number of documents that apparently came from the inner cyber sanctum of the Central Intelligence Agency.

Giving it the name Vault7, the trove of documents exposed to the world by WikiLeaks reveals a copious amount data relating to CIA hacking abilities, not just with regard to computers, but to the technological exploitation of various devices, including smartphones, iPads, smart TVs, and more.

The following statement was tweeted by WikiLeaks about the information:

Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, Trojans, weaponized “zero day” exploits, malware remote control systems, and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

There are a multitude of items for most people to be concerned about. Of these, the primary one is that the CIA seems to be lacking a serious security system to protect this kind of data from getting into the wrong hands. As WikiLeaks makes clear, whoever has the computer code has the power to inflict extraordinary damage across the globe, and no doubt could do so without having to leave the comfort of their own living room.

This is an extremely serious national security catastrophe representing a very clear and present danger to this nation no matter how anyone spins it, and it is monumentally bad news for the CIA, the U.S. government, and people everywhere because we have no way of knowing who else has this extraordinarily dangerous data or if it is already being set up and used by someone at this time.

The next prominent concern should make it clear that not every kind of technology should make its way into places it clearly does not belong. Using televisions as a means of spying on people is straight out of George Orwell’s novel, “Nineteen Eighty-Four”, and yet companies are installing their spy tech right into them.

A few years ago, Samsung made news because it was discovered that their “smart” televisions were spying on people who bought them. The Daily Beast published an article in which they noted the following sentence hidden within the company’s lengthy privacy policy regarding these new TVs and their voice-command feature: “Please be aware that if your spoken words include personal or other sensitive information, that information will be among the data captured and transmitted to a third party.”

Samsung’s “smart” televisions were specifically singled out in the CIA documents that were released, in which a program called “Weeping Angel” (a name apparently referencing the television show Doctor Who) can be used to compromise a Samsun F8000.

As reported in The Guardian:

The  document dealing with Samsung televisions carries the CIA logo and is described as secret. It adds “USA/UK”. It says: “Accomplishments during joint workshop with MI5/BTSS (British Security Service) (week of June 16, 2014).”

It details how to fake it so that the television appears to be off but in reality can be used to monitor targets. It describes the television as being in “Fake Off” mode. Referring to UK involvement, it says: “Received sanitized source code from UK with comms and encryption removed.”

Though not specifically mentioned, it should be noted that earlier this year, television manufacturer Vizio was fined over $2 Million by the FTC for spying on 11 million customers. In an article about the infraction, The Washington Post stated:

According to the lawsuit, Vizio was literally watching its watchers — capturing “second-by-second information” about what people viewed on its smart TVs. That included data from cable, broadband, set-top boxes, over-the-air broadcasts, DVDs and streaming devices. Vizio also is accused of linking demographic information to the data and selling the data — including users’ sex, age and income — to companies that do targeted advertising.

These revelations should prove to be a lesson to everyone. If any of you have a “smart” TV in your home at this time, you might want to consider replacing it with a standard TV without all those technological bells and whistles. Well, if you value your (and your family’s) privacy in any way, that is.

The final concern should truly scare the hell out of everyone in the U.S. and throughout the world, because mentioned among the various aspects of hacking the CIA has developed for all of those various electronic devices like phones and TVs, this one stands out like a red flashing light: the ability to hack our cars and trucks.

In a CBS report on the WikiLeaks documents, they noted, “One document discusses hacking vehicle systems, indicating the CIA’s interest in hacking modern cars with sophisticated on-board computers.” In an additional report, they added, “Although WikiLeaks didn’t have details on how that might be used, it said the capability might allow the CIA to “engage in nearly undetectable assassinations.”

This revelation immediately reminded me of a Wired article from 2015, in which two people, Charlie Miller and Chris Valasek, engaged in a successful experiment using a “zero-day exploit” (just one method mentioned in WikiLeaks’ statement above) to take control of a Jeep Cherokee driven by Andy Greenberg, author of the article, using a laptop computer. The article and their experiment made national headlines and Chrysler conducted a recall of 1.4 million vehicles as a result of their demonstration that the vehicle could be remotely hacked and controlled.

It also reminded me of the controversy that surfaced two years previous to the Jeep Cherokee experiment, surrounding the untimely death of Rolling Stone writer Michael Hastings, whose article, “The Runaway General”, led to the downfall of General Stanley McChrystal.

Hastings’ Mercedes crashed in what authorities concluded was an accident resulting from traveling at high speed, but for others, it remains a mystery with numerous unanswered questions attached to it. Surveillance video posted by LA Weekly shows the vehicle passing by a pizzeria in its final moments before the fatal crash.

One of the first questions to be brought up concerning Michael Hastings’ death was whether it was possible that his car had been tampered with or if it could have been hijacked remotely. The matter had been put to rest as far as the official record is concerned, with any such thoughts dismissed as being in the realm of conspiracy theory.

But we are reminded by the former head of U.S. counterterrorism during President George W. Bush’s administration, Richard Clarke, that the idea cannot be so quickly discarded as officials would have us believe. As he stated to Huffington Post, “in the case of Michael Hastings, what evidence is available publicly is consistent with a car cyber-attack. And the problem with that is you can’t prove it,” and added that “I think you’d probably need the very best of the U.S. government intelligence or law enforcement officials to discover it.”

And now we have definitive proof, courtesy of WikiLeaks, that the CIA is actively developing that exact kind of capability, to hack vehicles for the purpose of undetectable assassinations. Who is to say it didn’t already exist at the time that Hastings’ car had crashed, but that it is actively being improved as newer, more sophisticated technologies are introduced into newer models of cars and trucks? How far-fetched can this be now that we actually know about it?

No doubt there will be more revelations to come from these documents as they are vetted and written about and discussed by various outlets in the future, but from what we already know, it’s quite enough to shake the Earth under our feet and rattle us out of our complacency when it comes to the intrusive nature of the various technologies we are using in our lives.

This has been a massively loud wake-up call for everyone. Do not let this fall into the media’s well-honed memory-hole. We need action regarding these revelations from our elected officials, and we need it now.


By Robert Healy at America Speaks Ink –