tag:blogger.com,1999:blog-19209018.post5618485365180229819..comments2024-03-27T14:07:52.573+00:00Comments on Who Would Have Believed The Singularity Would Be So Stupid?: WikiLeaks Reveals "Marble": Proof CIA Disguises Their Hacks As Russian, Chinese, ArabicPastoriushttp://www.blogger.com/profile/03169561459129778670noreply@blogger.comBlogger3125tag:blogger.com,1999:blog-19209018.post-19740341801783890252017-03-31T19:39:59.112+01:002017-03-31T19:39:59.112+01:00I have to admit, I am not following the thread of...I have to admit, I am not following the thread of what you are trying to show me.<br /><br />I'm guessing it is very important. But I am not much of a strategist, nor am I very cunning. My brain does not think in that way. <br /><br />So I must admit, I am not able to connect the dots on this.<br /><br />Could you help me understand?Pastoriushttps://www.blogger.com/profile/03169561459129778670noreply@blogger.comtag:blogger.com,1999:blog-19209018.post-37935511426323901452017-03-31T16:58:49.971+01:002017-03-31T16:58:49.971+01:00Recall...UKGuardian 9/2016: 'A constitutional ...Recall...<a href="https://www.theguardian.com/us-news/2016/sep/10/cia-senate-investigation-constitutional-crisis-daniel-jones" rel="nofollow">UKGuardian 9/2016: 'A constitutional crisis': the CIA turns on the Senate </a><br /><br />Unbeknownst to Jones, Udall or Feinstein, the public reference to the Panetta Review so alarmed the CIA as to prompt a milestone event in its history. Since 2009, the CIA had maintained a firewalled network on which the Senate could view internal documents relevant to its torture inquiry. It was known as RDINet, for “rendition, detention and interrogation.” By mutual agreement, the CIA was not supposed to access the Senate’s side of the network for any reason aside from picayune IT help. But at least five agency officials would surreptitiously transgress the network firewalls, view the Senate investigators’ work, and reconstruct Jones’s emails.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-19209018.post-27789329131135386992017-03-31T16:55:53.284+01:002017-03-31T16:55:53.284+01:00https://twitter.com/wikileaks/status/8477594705622...https://twitter.com/wikileaks/status/847759470562246656<br /><br />RELEASE: CIA Vault 7 Part 3 "Marble" -- <b>thousands of CIA viruses and hacking attacks could now be attributed </b>https://wikileaks.org/vault7/?marble9#Marble%20Framework … #Vault7<br /><br />Marble is used to hamper forensic investigators and anti-virus companies from attributing viruses, trojans and hacking attacks to the CIA<br /><br /><br /><br />https://twitter.com/wikileaks/status/847773877954543616<br />CIA's "Marble Framework" shows its hackers use potential decoy languages<br />(image: https://pbs.twimg.com/media/C8PlNADXUAE4mZd.jpg )<br />Anonymousnoreply@blogger.com