The so-called Deep State and Democratic Party campaign to demonize Russia for allegedly “hacking the US election,” and delivering the country into the hands of Donald Trump suffered a huge and probably mortal blow this week with the release by WikiLeaks of over 7000 secret CIA documents disclosing secret CIA hacking technologies.
The case being made against Russia as being the source of leaked emails of the Democratic National Committee and of Clinton Campaign Chair John Podesta — documents that proved that the DNC had been corrupting the primary process in favor of corporatist candidate Hillary Clinton and undermining the campaign of Vermont Senator Bernie Sanders, and that also revealed the embarrassing contents of Clinton's highly paid secret speeches to a number of giant Wall Street banks — had always been tenuous, with no hard evidence ever presented. All the intelligence agencies would say was that they had a “high degree of certainty,” or “strong reason to believe” that the Russians were the source of the deeply damaging documents late in the campaign season.
Adding to doubts that Russia had actually hacked the DNC was WikiLeaks itself, which insisted that it had obtained the DNC and Podesta emails not from a hack of computers, but from an internal DNC staffer who actually pulled them off computers with a thumb drive and provided them to the organization — a person later identified as Seth Rich, who was mysteriously murdered on his way home from DNC headquarters in Washington, shot in the back at night in an unsolved case that the local police quickly labeled a “botched burglary,” although nothing was taken from his body by his assailant — not his wallet or watch even. (Wikileaks has offered a $20,000 reward for information that helps solve that uninvestigated case.)
But one thing the blame-Russia conspiracy theorists did have going for them was their assertion that the leaked DNC documents contained routing information and ISPs that pointed to Russia as the source of the hacks.
Now, however, the new CIA documents released by WikiLeaks — the first of a much larger trove of such documents that are reportedly going to be released as WikiLeaks goes through them to remove information that might jeopardize agents or national security — show that among the technologies and hacking tools that the CIA has been using to attack targeted computers, internet servers and even so-called “smart” appliances in people's homes, like Samsung TV sets, are a number of Russian-developed hacking programs.
As the New York Times wrote in its article on the latest Wikileaks document release, which it is calling “Vault 7″:
Another program described in the documents, named Umbrage, is a voluminous library of cyber-attack techniques that the CIA has collected from malware produced by other countries, including Russia. According to the WikiLeaks release, the large number of techniques allows the CIA to mask the origin of some of its attack and confuse forensic investigators.
The WikiLeaks material includes lists of softwarde tools that the CIA uses to create exploits and malware to carry out hacking. Many of the tools are those used by developers around the world: coding languages, such as Python, and tools like Sublime Text, a program used to write code, and Git, a tool that helps developers collaborate.”
A news collective, founded as a blog in 2004, covering war, politics, environment, economy, culture and all the madness