5 Major Revelations from Vault 7 the CIA & Media Do Not Want You to Know

1

Believed more significant than leaks from NSA contractor Edward Snowden, Wikileaks’ Vault 7 release of some 8,000 CIA documents detailing the extent of the agency’s hacking and surveillance toolbox has already dealt the planet a gut-check — making painfully clear no true privacy exists in 2017.

By:  Claire Bernish

This article first appeared at FreeThoughtProject

Officials have already launched an investigation in an attempt to determine who forked over such a sizable cache of markedly sensitive information — which, incidentally, represents merely 1 percent of the total number of documents, according to Wikileaks.

Beyond the near certain constitutional, legal, and ethical transgressions of the CIA evidenced in Vault 7, one thing became stunningly clear this week: whoever leaked the information — lone wolf or group, politically or morally motivated — is potentially even more damaging an Enemy Number One to the Central Intelligence Agency than Snowden has proven to be for the NSA.

“Mr. Snowden’s leaks revealed names of programs, companies that assist the NSA in surveillance and in some cases the targets of American spying. But the recent leak purports to contain highly technical details about how surveillance is carried out. That would make them far more revealing and useful to an adversary, one person said,” reported the Wall Street Journal this week.

“In one sense, Mr. Snowden provided a briefing book on U.S. surveillance, but the CIA leaks could provide the blueprints.”

Without transparency, government inevitably trims away privacy rights and other liberties. Greater than any need for adherence to authoritarian rule of law, blowing the whistle on corrupt, illegal, and unseemly practices of those in power constitutes an act of paramount importance — so integral to maintaining checks and balances, in fact, government propaganda to the contrary still has a large swath of the populace questioning Snowden instead of the National Security Agency and U.S. government.

Keep in mind that if you blame the messenger, you won’t focus attention on government wrongdoing. It’s unfortunately telling most Americans who could identify Edward Snowden — many, only vaguely as a ‘traitor’ — likely would not remember the names of any domestic surveillance programs he disclosed.

As the world waits with bated breath for the next dump from the pot-o-gold that is Vault 7, it’s imperative to examine five of the more insidious and dubious revelations this week — and how, if at all, they affect you.

We Got the Dankest Malware

In what seems to be a snide thumb of the nose at popular culture, the CIA named several of its collection and hacking tools after Hollywood movies — and agents aggrandized their exploits and electronic ‘weapons’ behind the scenes.

“The tools described in the documents carried bizarre names,” reports CBS News, “including Time Stomper, Fight Club, Jukebox, Bartender, Wild Turkey, Margarita and ‘RickyBobby,’ a racecar-driving character in the comedy film, ‘Talladega Nights’ — a tool to pillage and insert files on ‘newer versions of Microsoft Windows and Windows Server.’”

RickyBobby operated “as a lightweight implant for target computers” — introduced without triggering antivirus or security software — exploiting files included with Windows systems for over a decade.

But don’t think this goodie bag is withheld for use solely within the United States — or that the CIA doesn’t share the ‘wealth.’ According to CBS News, the “documents show broad exchanges of tools and information among the CIA, NSA and other U.S. intelligence agencies, as well as intelligence services of close allies Australia, Canada, New Zealand and the United Kingdom.”

Vault 7 included commentary from cocksure CIA agents — what would have to be considered a bit of comedic relief were it not for the underhanded topic-at-hand — including the telling:

“You know we got the dankest Trojans and collection tools.”

‘Reckless Beyond Words’

Documentation shows system vulnerabilities developed by the CIA — and shared with allied foreign governments — were then apparently left open for any hacker, anywhere in the world, to exploit for any purpose. Wikileaks stated,

“‘Year Zero’ introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of ‘zero day’ weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.”

Further, the intelligence agency paid to retain the holes for future use. Snowden tweeted,

“If you’re writing about the CIA/@Wikileaks story, here’s the big deal: first public evidence USG secretly paying to keep US software unsafe.”

Essentially, the CIA put its covert forays into the systems of anyone it chooses to target — particularly journalists, human rights groups, and prominent activists — above privacy and security protections for the entire population.

Snowden affirmed in a series of tweets the authenticity of Vault 7 documents — and blasted the spy agency for inexcusable imprudence, stating,

“The CIA reports show the USG developing vulnerabilities in US products, then intentionally keeping the holes open. Reckless beyond words.”

“Why is this dangerous? Because until closed, any hacker can use the security hole the CIA left open to break into any iPhone in the world.”

“Evidence mounts showing CIA & FBI knew about catastrophic weaknesses in the most-used smartphones in America, but kept them open — to spy.”

Your Car Can Kill You — Particularly If the CIA Wants You Dead

That characterization in cable television shows and movies of the Central Intelligence Agency as the dark arm of the United States Government carrying out surreptitious operations — including targeted killings — isn’t, of course, a departure from the truth.

But how, exactly, the CIA executes such missions without being detected has been the subject of innumerable theories, but remained unsubstantiated conjecture — that is until Vault 7 revealed the agency can seize control of your vehicle remotely. In a lengthy press release, Wikileaks noted,

“As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.”

Upon this revelation, suspicion immediately trained on the odd circumstances surrounding the untimely death of government critic and award-winning journalist, Michael Hastings, in 2013.

Hastings garnered acclaim and won the George Polk award for his career-defining 2010 report for Rolling Stone, which portrayed General Stanley McChrystal, commander of NATO’s International Assistance Security Force in the Afghanistan War, in a negative light — ruffling feathers in the upper echelons of the government and ultimately costing the general his career in the process.

Shortly before his Mercedes inexplicably rocketed through a Los Angeles neighborhood and exploded into an intense fireball — (before or after directly striking a palm tree, according to authorities and witnesses, respectively) — Hastings disclosed he’d grown leery of being followed and surveilled by government actors, and appeared to fear for his life.

In fact, the 33-year-old journalist told a friend and neighbor he believed his car had been tampered with — just before it careened down the road, headlong into a tree, burning his body so badly, the coroner only secured identification through a match in the FBI’s database.

Hastings’ fatal crash — officially deemed accidental despite lingering questions — occurred on June 18, 2013. CIA documentation proves the agency sought improvements to technology allowing it to seize control of vehicle systems just one year later — putting a remotely-affected assassination within the realm of the plausible.

“There is reason to believe that intelligence agencies for major powers — including the United States — know how to remotely seize control of a car,” former U.S. National Coordinator for Security, Infrastructure Protection, and Counter-terrorism, Richard Clarke, told Huffington Post shortly after Hastings’ death.

“What has been revealed as a result of some research at universities is that it’s relatively easy to hack your way into the control system of a car, and to do such things as cause acceleration when the driver doesn’t want acceleration, to throw on the brakes when the driver doesn’t want the brakes on, to launch an air bag.

“You can do some really highly destructive things now, through hacking a car, and it’s not that hard.”

Smart Devices — Too Smart for Comfort

For years, cybersecurity and technology experts, as well as privacy and rights advocates, have admonished the public to beware the convenience proffered by devices linked to the Internet of Things — described by Jacob Morgan in Fortune as “the concept of basically connecting any device with an on and off switch to the Internet (and/or to each other). This includes everything from cellphones, coffee makers, washing machines, headphones, lamps, wearable devices and almost anything else you can think of.  This also applies to components of machines, for example a jet engine of an airplane or the drill of an oil rig.”

Connecting devices — such as a cell phone, washing machine, smart TV, or home management system — might save time, but CIA documents reveal the same hardware of convenience offers ease of access for agents to install malware and use built-in microphones and cameras to spy whenever they see fit — even if the device is powered off. Wikileaks notes,

“The attack against Samsung smart TVs was developed in cooperation with the United Kingdom’s MI5/BTSS. After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server […]

“The CIA’s Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones. Infected phones can be instructed to send the CIA the user’s geolocation, audio and text communications as well as covertly activate the phone’s camera and microphone.”

Wired’s Matt Burgess elaborates that Weeping Angel “targeted the Samsung F8000 Smart TV. They say the TV could be turned into ‘covert listening devices’ by putting the TV into ‘fake-off’ mode. When the televisions appeared to be off, it was possible for conversations to be recorded. The CIA documents, which are from 2014, state ‘future work’ on the vulnerability could include capturing video from the televisions and being able to leave Wi-Fi turned on while ‘fake-off’ mode was enabled.”

While this is indeed ominous for obvious reasons, AsTech president Andrew McDonnell and other experts argue there’s no reason for panic, as he told Fortune,

“Many of the vulnerabilities cited in this tool set are well-known. ‘Smart’ TVs, old Android phones (like the President’s), unpatched routers, and a host of other devices have known vulnerabilities that are not exclusive to the CIA. These implementations may have been exclusive, but that doesn’t mean only the CIA had exploits. If genuine, there are likely some proprietary vulnerabilities or zero-days in there. Ultimately, secret backdoors in software — whether intentional or based on an exploit — make everyone less safe: there’s no way to control who uses them.”

Who Actually Hacked Who?

Perhaps the most debated and disputatious disclosure in the first batch of Vault 7 documents is the epiphany the CIA has collected a voluminous library of hacking techniques and code it can employ and customize as needed for certain exploits.

“The CIA’s Remote Devices Branch’s UMBRAGE group collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation,” Wikileaks reports.

“With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the ‘fingerprints’ of the groups that the attack techniques were stolen from.”

At first blush, such an operation seems to aptly explain limited evidence wrangled by U.S. officials from ostensive hacks of assorted government systems by supposed Russian state actors — Wikileaks even intimates as much.

However, upon review of the content of Vault 7 documents, some information technology experts disagree this tidbit evinces CIA complicity in framing Russia for hacking.

According to SearchSecurity, “There is no evidence these false flag attacks were planned or took place, and there appears to be no references in the CIA documents that indicate the agency planned to use these stolen attack techniques in such a manner.”

Indeed, pinning an attack on Russia this way, though feasible, would not necessarily be efficacious or guaranteed success — and while Wikileaks specifically mentions the Russian Federation in its Vault 7 statement, The Intercept points out nothing in the actual CIA documentation suggests these tools would or had been used in this manner. To wit, Russia isn’t mentioned at all, in conjunction with UMBRAGE or digital footprints.

But this is the CIA, after all, and considering its intricately-woven operations and intense cloak of secrecy, to say adamantly whether or not agents purposefully left Russian ‘fingerprints’ to lay blame on propaganda’s currently highlighted State enemy cannot be known with certainty.

****

A final point worth noting, although these hacking tools and exploits show the CIA perfectly proficient in carrying out a massive surveillance effort, analysts claim the agency focuses on specific individuals for specific reasons — contrary to the NSA’s spying dragnet and collection practices — so the worst of the revelations don’t pertain to the average person.

But that doesn’t mean it hasn’t happened, either, as Wikileaks explained, documents show agents coordinate with technology staff to render customized exploits and data collection when necessary, and “the list of possible targets of the collection are ‘Asset’, ‘Liason Asset’, ‘System Administrator’, ‘Foreign Information Operations’, ‘Foreign Intelligence Agencies’ and ‘Foreign Government Entities’. Notably absent is any reference to extremists or transnational criminals.”

Poised to release the next treasure from Vault 7, Wikileaks continues to set Washington ablaze by forcing the government’s corrupt, unethical, greedy, and power-drunk officials to center stage under white-hot spotlights — where they must come to terms with the fact the American public stopped swallowing the excuse of security to give up liberty and privacy some time ago.

This article first appeared at FreeThoughtProject

  • JOHN MAYOR

    In early February, a U.S. Official stated that a months-long inquiry into alleged contacts between Russian Government Officials, “business interests” and “Associates” of Trump’s Campaign, was continuing D-E-S-P-I-T-E THE “FIRING” OF NATIONAL SECURITY ADVISER MICHAEL FLYNN (though, other Media reports have suggested a Michael Flynn “Resignation”!) for “misleading” White House Officials about his personal communications with Russian Officials (see, Kevin Johnson’s USA TODAY Report, Thursday, February 23rd, 2017)! (“Misleading” White House Officials about his personal communications with Russian Officials? What about the GREATER CONCERN re Trump’s “misleading” of Americans regarding T-H-E E-S-S-E-N-C-E O-F M-I-C-H-A-E-L F-L-Y-N-N-‘-S C-O-M-M-U-N-I-C-A-T-I-O-N-S!)
    .
    The White House confirmed Thursday, February 23rd, 2017, that a conversation between Reinhold Richard “Reince” Priebus, Trump’s White House “Lead” of Staff (whom I’ve dubbed, “Prince Priebus”!) and FBI Deputy Director Andrew McCabe, occurred on Wednesday, February 15, 2017, at which “Faux Media Interests” have reported that “Prince Priebus” had attempted to convince McCabe to refute claims of a connection between Russia, Flynn, and Trump (and thereby… folks!… removing any further– and I’ll suggest, LEGITIMATE!– HEAT, on Trump’s past “COLLUSIVE ARRANGEMENTS” with Putin/ Russia!… and, on his current “Presidency”!)! And further, yet another White House Official is also reported to have stated that “Other Intelligence Agencies” were also contacted by “Prince Priebus”, in an effort to SHUT DOWN “claims” of a Russian/ Putin Flynn/ Trump link (THE CLAIMS OF WHICH, CAN EASILY BE CONFIRMED BY THE DNI, AND HOMELAND SECURITY!)!
    .
    Pursuant to the abovenoted debate, we have a Trump appointed U.S. Attorney General, Jeff Sessions… who was to have been– up until very recently!– instrumental in the continuing Investigation into Russian hacking, and alleged COLLUSIVE ACTIVITIES by way of “Conservative Campaign interests”!… who believes, that “Recusing” himself is a “SUFFICIENT RECOURSE” for actions he is reported to have undertaken, involving the very same genre of allegations that led to the very firing/ resignation of the outgoing N-A-T-I-O-N-A-L S-E-C-U-R-I-T-Y A-D-V-I-S-O-R! (Can somebody say, YIKES!)
    .
    This evolution of events has given the Members of the Senate Judiciary Committee the impetus to demand a Special Prosecutor!… and, has left an Investigation by the Justice Department into potential Russian (and… Conservative American!) interference in the 2016 Presidential Election, in the hands of the Deputy Attorney General!
    .
    The problem, however, is that there is– presently!– no permanent Deputy Attorney General!… just an Acting Attorney General, Dana Boente, a former U.S. Attorney who stepped in after Sally Yates was fired! (Again, can somebody say, YIKES!) However!… and lest we be worried!… Donald Trump’s nominee, U.S. Attorney for Maryland, Rod Rosenstein, is to undergo Confirmation Hearings with the abovenoted Senate Judiciary Committee, this month!
    .
    Nevertheless!… on March 15, 2017, Iowan Republican Senator and Chairreignor of the Senate Judiciary Committee, Charles Grassley, said that he will continue to delay the Confirmation Hearing of the Assistant AG, until FBI Director James Comey briefs “certain Senators” on the ongoing Investigation into Russia’s hacking (but etc.!) of the 2016 U.S. Presidential Election! But!… and incidentally!… a plea being made to the Head of an “Intelligence Agency”, which– itself!– has recently been “outed” by a series of WikiLeaks, revealing U-N-P-R-E-C-E-D-E-N-T-E-D B-R-E-A-C-H-E-S of ICT Human Rights that/ which make the subject/ object of Grassley’s concerns P-A-L-E I-N C-O-M-P-A-R-I-S-O-N! Afterupon an examination of documents recently released by WikiLeaks on CIA hacking (see, h-t-t-p-s://en(dot)wikipedia(dot)org/wiki/Vault_7), CBS News asserts… quote:…“The documents show broad exchanges of tools and information among the CIA, NSA, A-N-D O-T-H-E-R U.S. I-N-T-E-L-L-I-G-E-N-C-E A-G-E-N-C-I-E-S, as well as Intelligence Services of close allies Australia, Canada, New Zealand and the United Kingdom.” And the comments of Edward Snowden are equally alarming!… quote:… “Evidence mounts, showing CIA and FBI knew about catastrophic weaknesses in the most-used smartphones in America, but kept them open– to spy (see, h-t-t-p-s://t(dot)co/mDyVred3H8… and, h-t-t-p://www(dot)thedailyliberator(dot)com/5-major-revelations-vault-7-cia-media-not-want-know/).” (Can someone say… yet again!… YIKES!)

    Grassley told Iowan reporters on a conference call, that the request for a Briefing began in February of this year, when he and Californian Democratic Senator Dianne Feinstein co-signed a letter asking Comey for information from the Intelligence Community, about former Michael Flynn’s conversation with a Russian Ambassador, which lead to Flynn’s resignation as the National Security Adviser! But regardless of the dearth of “Intelligence Info”… A-N-D T-H-E U-N-C-O-N-F-I-R-M-E-D S-T-A-T-U-S O-F W-O-U-L-D_B-E D-E-P-U-T-Y A-G R-O-D R-O-S-E-N-S-T-E-I-N!… this very same Judiciary Committee which has asked for a Special Prosecutor to be put into place, has been called upon by “Conservative Senate and Investigative interests” to “entertain” the receipt/ receiving of Rod Rosenstein’s position on whether, and/ or who will be selected as a Special Prosecutor, B-E-F-O-R-E T-H-E J-U-D-I-C-I-A-L C-O-M-M-I-T-T-E-E V-O-T-E-S O-N W-H-E-T-H-E-R T-O S-E-N-D R-O-S-E-N-S-T-E-I-N-‘-S “N-O-M-I-N-A-T-I-O-N” T-O T-H-E F-U-L-L S-E-N-A-T-E F-O-R C-O-N-F-I-R-M-A-T-I-O-N! (Can I get another, YIKES!)
    .
    At least SEVEN of the nine Democrats on the Judiciary Committee… including RANKING MEMBER Dianne Feinstein of California!… have PUBLICLY CALLED for a Special Prosecutor to investigate potential criminal actions by Russian Officials!… and including, any criminal actions of any of Trump’s “Associates”! But yea!… and hopefully– and wisely!… any criminal actions of Trump! And!… South Carolina Senator Lindsay Graham (one of the 11 Republicans on the Committee!) has stated, that:… “if there is something there that the FBI believes is criminal in nature, then… for sure!… you need a Special Prosecutor.”
    .
    And then… and in an effort– I suggest!– to “hoodwink” weary citizens who have been attempting to follow the Russian/ Trump “bouncing ball”!… we have this recent “Trump sideshow”, wherein Trump DARED TO PROFFER that Obama was involved in tapping his “Tower”! To which, countless Intelligence Agencies (and Obama!) have said, N-O!… W-A-Y! But moreover!… Trump has since gone beyond even this, by claiming that the UK Government was up to similar “shenanigans”, and that his “proof” was by way of a Fox News report alluding to same! To which, both the UK Government and Fox News have said, N-O!… W-A-Y!

    And so!… in the light of the compromise already evidenced by the actions of the now “Recused” AG!… in the light of the “INSANITY” of permitting a Y-E-T T-O B-E C-O-N-F-I-R-M-E-D N-O-M-I-N-E-E for Deputy AG FEIGN IMPARTIALITY in the acceptance or rejection of a call for– let alone, A SELECTION OF!– a Special Prosecutor!… in the light of the truths revealed in this round of WikiLeaks!…and, in the face of Trump’s U-N-F-O-U-N-D-E-D A-L-L-E-G-A-T-I-O-N-S of the wiretapping by Obama of Trump’s “Tower”!… THE ALLOWANCE OF TRUMP’S NOMINEE TO EFFECT A VOTE ON A CALL FOR, AND/ OR ON THE SELECTION OF, A SPECIAL PROSECUTOR, IS A CLEAR CASE IN POINT OF THE NEED TO REJECT BOTH TRUMP’S DEPUTY AG NOMINEE– AND INDEED!– THE REJECTION OF THE “POTUS ELECT”, HIMSELF! And!… if the nine Democrats and Lindsay Graham (at least!) decide to act as a block– NOW!– they would have the power to PREVENT Rosenstein’s (and Trump’s!) S-U-B-V-E-R-S-I-O-N O-F J-U-S-T-I-C-E! And!… coupled with the recent decision by the House “Intelligence Committee” Members to hold Trump “morally accountable” for his U-N-W-A-R-R-A-N-T-E-D A-T-T-A-C-K against Obama, the addition of the voices of the Members of the Judiciary Committee to ratify the call for the institution of a Special Prosecutor to sort out the mess that/ which is this just past U.S. Federal Election, would go a L-O-N-G W-A-Y toward bringing America back on track!… and, toward bringing some “sense” of R-A-T-I-O-N-A-L P-U-B-L-I-C D-I-S-C-O-U-R-S-E back into American public debates! And!… need we mention the decisions of two separate courts to pull the plug on Trump’s recent attempt to institute I-N-D-E-F-E-N-S-I-B-L-E I-M-M-I-G-R-A-T-I-O-N B-A-N-D-S against a half dozen Islamic countries!… which– in Trump’s view!– are a potential threat to America, and to the FREE “WESTERN WORLD”! And!… poor Angela Merkel! (YIKES!)
    .
    Folks!… What’s wrong with this picture? YEA!… What’s wrong with this F-U-L-L B-L-O-W-N A-N-I-M-A-T-I-O-N?
    _______________
    .
    Oh Trumpeter against “Faux News”!… me thinks thou protesteth too mucheth! And!… as the reason for your weeks-old White House buffoonish “Faux News protestation” revolves around the “Faux Media’s” recent “Russian COLLUSION REVELATIONS” involving Michael Flynn (and, which sparked Flynn’s “Firing”/ “Resignation”!), I thought it appropriate to offer up what you– OBVIOUSLY!– don’t want others to know about…
    .
    .
    Inasmuch as FORMER National Security Adviser Michael Flynn was “Fired”/ “Resigned” after media PROOFS emerged of his COLLUSIVE COMMUNICATIONS with Russian Officials DURING this just past U.S. Federal Election (the which… and along with Jeff Sessions’ “Recusing”!… you are now FEIGNING INDIGNATION!)!… or Flynn could have– and can presently!– legally challenge this “TORTIOUS LEAK”!… this NOW P-R-O-V-E-S that the claims of YOUR INVOLVEMENT in C-O-L-L-U-D-I-N-G WITH RUSSIA/ PUTIN TO UNDERMINE HILLARY CLINTON (AND, THE DNC!), A-R-E R-E-A-L (as YOU… O-B-V-I-O-U-S-L-Y!… had close ties with Flynn– and knew what Flynn was up to!)! And so, this then makes YOU, Trumpeter, A TRAITOR (as TECHNICALLY REVEALED in, “So what are we supposed to do now?”, by Keith Olbermann!)! And so!… FINALLY!… we can now arrest your sorry *ss! Unless!… and of course!… YOU, “Prince Priebus”, Flynn, and Jeff Sessions can P-R-O-V-E that the information released on your now former National Security Adviser is “FAKE NEWS”!… and– on other grounds!– is T-O-R-T-I-O-U-S!
    .
    In other words!… FAUX NEWS WHINER!… get your BIG MOUTH into a Civil Courtroom, and put your FAUX NEWS ALLEGATIONS DOLLARS where your “BLOWHOLE” is!… I-F Y-O-U D-A-R-E!
    .
    And folks!… failing to arrest Trump on grounds of RUSSIAN COLLUSION, places the ENTIRE American Intelligence Machinery under suspicion of either UTTER INCOMPETENCE, or TRAITOROUS INDIFFERENCE to the safety and security of the American people!… AND!… to the safety and security of the GLOBAL COMMUNITY! And moreover!… if the new NSA, Lt. Gen. H.R. McMaster, is unwilling– OR IS “U-N-A-B-L-E”!– to place as P-A-R-A-M-O-U-N-T the evidence linking Flynn and Trump (let alone, Jeff Sessions!) to TRAITOROUS COLLUSION with Putin and with Russia, then McMaster needn’t bother unpacking!… and, he should seek out his political pipedreams and political fortunes somewhere else! And, the same applies to the returning “new Director” for the FBI, James Comey!
    .
    And thus, and so!… the FURTHER recent sociopsychopathic circumlocutory obfuscation emanating from the lips of “Prince Priebus” AND Rep. Devin NUNSENSE, Chairreignor of the House “Intelligence Committee”, is M-O-S-T G-A-L-L-I-N-G (and despite NUNSENSE’s recent attempt to make Trump accountable, re Trump’s allegations of Obama wiretapping!)!
    .
    And the latter’s “AUTHORITATIVE INTIMATION” to us re Michael Flynn’s crimes, smacks of the same BULLSH*T EXCUSES offered up by critics of Julian Assange, afterupon Assange’s revelation years ago, that innocent citizens were killed in U.S. Military efforts to capture the “bad guys”!
    .
    Rather than admit to the TRAITOROUS ACTIONS of Michael Flynn… and thereby, Donald Trump!… NUNSENSE would prefer to C-L-O-A-K these actions under the “slight-of-hand” of FAKE NEWS and CRIMINAL SPYING against Michael Flynn and POTUS! And!… of course!… backed up by the PSYCHOBABBLE of both “Prince Priebus”, and POTUS! And, in the same manner that sundry have attempted to CLOAK the MURDEROUS ACTIONS of sundry members of the U.S. Military during the outset of Assange’s famous WikiLeak of AMERICAN MILITARY MURDERS! And it remains to be seen whether a Lt. Gen. H.R. McMaster will be following in the same footsteps as those of Rep. Devin NUNSENSE, “Prince Priebus”, and Trump!… or, whether he will AWAKEN TO THE REALIZATION that his WOULD-BE POTUS BOSS is “forensically predisposed”, a cad, and, is deserving of JAIL TIME!
    .
    The involvement of Devin NUNSENSE and “Prince Priebus” notwithstanding, we’ll soon learn of the full nature of Flynn’s Russian communications!… and, of the “POTUS TRUMPETER’s” complicity!… with, or without the assistance of Trump’s new PET Security Advisor! The TRUTH W-I-L-L “win out”!
    .
    And!… Flynn didn’t “resign” over N-O-T-H-I-N-G! If it was N-O-T-H-I-N-G, he would have had– should have had!– the sense and gumption to “do battle”! But!… because the “INTRApersonal heat”– at least!– was on, he decided to “cut and run”! And which brings to mind the words within Proverbs 28: 1… and which reads:… “The wicked flee though no one pursues, but the righteous are as bold as a lion.” [NIV] (Incidentally… “What’s with the ‘Recusal’… Jeff Sessions?”)
    .
    And so… Why did Michael Flynn flee?… Why was he unsettled by mere “FAKE NEWS”? Well!… the answer rests– in part!– between his ears!… within his CONSCIENCE! And simply put, he didn’t like what he had allowed (and thus, sought to mitigate/ end the “INTERNAL CONFLICT”!)!… and/ or!… he was so overwhelmed by the Media PROOFS offered up, that he had BUT ONE CHOICE to mitigate/ to end the STEADFAST PRESSURE of Media, and public scrutiny! (And, once again, I ask:… “What’s with the ‘Recusal’… Jeff Sessions?”)
    .
    And!… please note!… for Michael Flynn to be “Officially FIRED”, Trump would have to have had LEGITIMATE PROOFS that Michael Flynn had– VIRTUALLY!– COMPROMISED NATIONAL SECURITY in Flynn’s dealings with sundry Russian interests!… or, Flynn could have legally challenged his “firing”, as ILLEGITIMATE! And thus, and so, this begs the question:… Why would Trump have “FIRED” his NSA, if– in Trump’s view!– the “leaked info” on Michael Flynn was, BUT, MERE “FAUX NEWS”?
    .
    As I’ve indicated above, Michael had– and has!– every opportunity to challenge any TORTIOUS IMPUGNING of his character (and ditto, for the POTUS TRUMPETER, and Jeff Sessions!)!… of his “defense” of his past dealings with Russia, and with Hillary’s Campaign and the DNC! But since he has chosen to reject challenging any “TORTIOUS MEDIA ASCRIPTION”/ “Media claims” re his past dealings with Russia, and with Hillary’s Campaign and the DNC!… and thereby, has rejected standing up for his “vision” of a “SECURE AMERICA”!… we can be safe in assuming, that he was– and is!– WRONG for the job of SECURITY ADVISOR! (And ditto, for the selection of Jeff Sessions as U.S. AG!) And with that rejection, he has cast a BLACK CLOUD on his WOULD-BE boss!… and on the role his WOULD-BE boss has played, in the matters now under CONSCIONABLE INVESTIGATION elsewhere! And hence the reason, for the quickly mounted February solo White House Press Office “MAGIC SHOW”, T-O D-U-P-E T-H-E D-U-P-A-B-L-E, re the “REAL REASONS” why Michael Flynn was “Fired”/ obliged to “Resign”! And!… and of course!… in publicly “defending Flynn”, Trump– IN FACT!– was attempting to stave off any IMMEDIATE MEDIA FOLLOW UP, re a Putin/ Russian link to himself!
    .
    The more “BLUFFEROUS” the bluff… and the quicker the bluff!… the less the public will notice that their “political pockets”, minds, and souls, have been “groped”!
    .
    Nevertheless!… most Americans– I suggest!– have seen (or at least, have heard about!) the Wizard of Oz!… and, are– somehow!– familiar with the FAKE WIZARD behind the curtain! And despite the thunder, the lightening, and the smoke, Americans are just not buying what Trump is selling!… AND, HAVE CONVERGED (AND ARE CONVERGING!) ON HIS “MENTAL LARE”!… AND– INDEED!– ON HIS “POLITICAL HANGOUTS”!
    .
    AND SO… OH TRUMPETER!… IT’S TIME TO BOARD THE BALLOON!
    .
    Lastly, on the matter of the WikiLeaks of Julian Assange… Julian Assange will be vindicated for his uncovering of the truth re sundry U.S. Military Strategic “Tactical Operations” that saw the wrongful deaths of innocent civilians, in the same manner that sundry were vindicated in the uncovering of the truth about the My Lai Massacre (see, My Lai Massacre – Wikipedia!)! And!… DARE A-N-Y-O-N-E suggest today, that revealing the truth about what happened at My Lai, was a BETRAYAL of the interests of America, and of American Security!
    .
    Simply put!… as a consequence of Trump’s constant attempts to evade accountability through a series of “Wizardian tactics”, the once assumed disappearing “Trump elephant” in the Oval Office, has– unfortunately (for Trump!)!– M-A-G-I-C-A-L-L-Y REAPPEARED!
    .
    Please!… no emails!