This “Kraken,” which Sidney Powell has released as promised, isn’t a gigantic sea monster. It’s a program the CIA and Defense Department use to get information about the nation’s enemies by hacking computers and cellphones. It’s also going to provide much of the evidence for Powell’s assertions of “absolutely frightening” vote fraud in the Presidential election.
A Tech Monster We Made
“Kraken” operates various kinds of malware, and even was used against another member of NATO. In 2017, WikiLeaks released numerous CIA documents detailing “Kraken.”
They included orders to spy on all major candidates in France’s 2012 presidential election, including the incumbent that year, Nicholas Sarkozy. “Kraken” provided information on each party’s election strategy and each candidate’s private conferences and ability to influence political decisions.
The CIA uses another program in conjunction with “Kraken,” called “Hammer” (or “Hamr” in the files WikiLeaks released), which Powell referenced. “Hamr” spies on protected networks without being detected. Numerous plugins accompany “Hamr” to enhance its effectiveness. One, “AngerManagement,” targets Android devices. Another, “WildTurkey,” tests and refines its capabilities.
One Wikileaks release’s description of “WildTurkey” is humorously powerful: ‘WildTurkey (n.) A animal of the avian variety that has not been domesticated. Also a type of alcohol with a high proof (151). It get’s you HAMR’D’ If WikiLeaks made CIA documents available to the public, Powell certainly could access them and use specialists to translate the code and jargon.
Capturing the Creature After Powell made her promise, reports circulated about an American military force seizing servers in Germany.
Many thought the servers belonged to two election technology firms, Dominion and Scytl. Dominion manufactured the questionable voting machines used in the recent general election.
But those servers apparently belong to the CIA, which has a field office in Frankfurt. The State Department also operates a consulate in that city.
Trump Going Around the Deep State
“The U.S. military has full authority to do this because any CIA activity in the European theater is being conducted using military cover,” Larry Johnson told The Gateway Pundit. Johnson is a counter-terrorism specialist who spent four years in the State Department and 22 years devising anti-terrorism exercises for military special operations.
“In other words, CIA officers would be identified to the German government (and anyone else asking) as military employees or consultants,” Johnson continued.
“Such an operation would have been carried out with U.S. law enforcement present to take custody of the evidence,” he said. “That means that the evidence will be under the control of the Department of Justice through U.S. Attorneys and can be used in court or other judicial proceedings.”
Neither CIA Director Gina Haspel nor FBI Director Christopher Wray knew about the operation, Johnson added.
1 comment:
We have come a long way from an early information net, "Carnivore". Of course agents abroad also work under diplomatic cover and as... journalists... etc.
Post a Comment