Trading Elections and Political Outcomes - DayTrading.com

GE2020: The Roar of the Swing Voter

Hi everyone, this is my first ever post here.
I run a little website called The Thought Experiment where I talk about various issues, some of them Singapore related. And one of my main interests is Singaporean politics. With the GE2020 election results, I thought I should pen down my take on what us as the electorate were trying to say.
If you like what I wrote, I also wrote another article on the state of play for GE2020 during the campaigning period, as well as 2 other articles related to GE2015 back when it was taking place.
If you don't like what I wrote, that's ok! I think the beauty of freedom of expression is that everyone is entitled to their opinion. I'm always happy to get feedback, because I do think that more public discourse about our local politics helps us to be more politically aware as a whole.
Just thought I'll share my article here to see what you guys make of it :D
Article Starts Here:
During the campaigning period, both sides sought to portray an extreme scenario of what would happen if voters did not vote for them. The Peoples’ Action Party (PAP) warned that Singaporeans that their political opponents “might eventually replace the government after July 10”. Meanwhile, the Worker’s Party (WP) stated that “there was a real risk of a wipeout of elected opposition MPs at the July 10 polls”.
Today is July 11th. As we all know, neither of these scenarios came to pass. The PAP comfortably retained its super-majority in Parliament, winning 83 out of 93 elected MP seats. But just as in GE2011, another Group Representation Constituency (GRC) has fallen to the WP. In addition, the PAP saw its vote share drop drastically, down almost 9% to 61.2% from 69.9% in GE2015.
Singapore’s electorate is unique in that a significant proportion is comprised of swing voters: Voters who don’t hold any blind allegiance to any political party, but vote based on a variety of factors both micro and macro. The above extreme scenarios were clearly targeted at these swing voters. Well, the swing voters have made their choice, their roar sending 4 more elected opposition MPs into Parliament. This article aims to unpack that roar and what it means for the state of Singaporean politics going forward.
1. The PAP is still the preferred party to form Singapore’s Government
Yes, this may come across as blindingly obvious, but it still needs to be said. The swing voter is by its very definition, liable to changes of opinion. And a large factor that determines how a swing voter votes is their perception of how their fellow swing voters are voting. If swing voters perceive that most swing voters are leaning towards voting for the opposition, they might feel compelled to vote for the incumbent. And if the reverse is true, swing voters might feel the need to shore up opposition support.
Why is this so? This is because the swing voter is trying to push the vote result into a sweet spot – one that lies between the two extreme scenarios espoused by either side. They don’t want the PAP to sweep all 93 seats in a ‘white tsunami’. Neither do they want the opposition to claim so much territory that the PAP is too weak to form the Government on its own. But because each swing voter only has a binary choice: either they vote for one side or the other (I’m ignoring the third option where they simply spoil their vote), they can’t very well say “I want to vote 0.6 for the PAP and 0.4 for the Opposition with my vote”. And so we can expect the swing voter bloc to continue being a source of uncertainty for both sides in future elections, as long as swing voters are still convinced that the PAP should be the Government.
2. Voters no longer believe that the PAP needs a ‘strong mandate’ to govern. They also don’t buy into the NCMP scheme.
Throughout the campaign period, the PAP repeatedly exhorted voters to vote for them alone. Granted, they couldn’t very well give any ground to the opposition without a fight. And therefore there was an attempt to equate voting for the PAP as voting for Singapore’s best interests. However, the main message that voters got was this: PAP will only be able to steer Singapore out of the Covid-19 pandemic if it has a strong mandate from the people.
What is a strong mandate, you may ask? While no PAP candidate publicly confirmed it, their incessant harping on the Non-Constituency Member of Parliament (NCMP) scheme as the PAP’s win-win solution for having the PAP in power and a largely de-fanged opposition presence in parliament shows that the PAP truly wanted a parliament where it held every single seat.
Clearly, the electorate has different ideas, handing Sengkang GRC to the WP and slashing the PAP’s margins in previous strongholds such as West Coast, Choa Chu Kang and Tanjong Pagar by double digit percentages. There is no doubt from the results that swing voters are convinced that a PAP supermajority is not good for Singapore. They are no longer convinced that to vote for the opposition is a vote against Singapore. They have realized, as members of a maturing democracy surely must, that one can vote for the opposition, yet still be pro-Singapore.
3. Social Media and the Internet are rewriting the electorate’s perception.
In the past, there was no way to have an easily accessible record of historical events. With the only information source available being biased mainstream media, Singaporeans could only rely on that to fill in the gaps in their memories. Therefore, Operation Coldstore became a myth of the past, and Chee Soon Juan became a crackpot in the eyes of the people, someone who should never be allowed into Parliament.
Fast forward to today. Chee won 45.2% of the votes in Bukit Batok’s Single Member Constituency (SMC). His party-mate, Dr. Paul Tambyah did even better, winning 46.26% of the votes in Bukit Panjang SMC. For someone previously seen as unfit for public office, this is an extremely good result.
Chee has been running for elections in Singapore for a long time, and only now is there a significant change in the way he is perceived (and supported) by the electorate. Why? Because of social media and the internet, two things which the PAP does not have absolute control over. With the ability to conduct interviews with social media personalities as well as upload party videos on Youtube, he has been able to display a side of himself to people that the PAP did not want them to see: someone who is merely human just like them, but who is standing up for what he believes in.
4. Reserved Election Shenanigans and Tan Cheng Block: The electorate has not forgotten.
Tan Cheng Bock almost became our President in 2011. There are many who say that if Tan Kin Lian and Tan Jee Say had not run, Tony Tan would not have been elected. In March 2016, Tan Cheng Bock publicly declared his interest to run for the next Presidential Election that would be held in 2017. The close result of 2011 and Tan Cheng Bock’s imminent candidacy made the upcoming Presidential Election one that was eagerly anticipated.
That is, until the PAP shut down his bid for the presidency just a few months later in September 2016, using its supermajority in Parliament to pass a “reserved election” in which only members of a particular race could take part. Under the new rules that they had drawn up for themselves, it was decreed that only Malays could take part. And not just any Malay. The candidate had to either be a senior executive managing a firm that had S$500 million in shareholders’ equity, or be the Speaker of Parliament or a similarly high post in the public sector (the exact criteria are a bit more in-depth than this, but this is the gist of it. You can find the full criteria here). And who was the Speaker of Parliament at the time? Mdm Halimah, who was conveniently of the right race (Although there was some hooha about her actually being Indian). With the extremely strict private sector criteria and the PAP being able to effectively control who the public sector candidate was, it came as no surprise that Mdm Halimah was declared the only eligible candidate on Nomination Day. A day later, she was Singapore’s President. And all without a single vote cast by any Singaporean.
Of course, the PAP denied that this was a move specifically aimed at blocking Tan Cheng Bock’s bid for the presidency. Chan Chun Sing, Singapore’s current Minister of Trade and Industry, stated in 2017 that the Government was prepared to pay the political price over making these changes to the Constitution.
We can clearly see from the GE2020 results that a price was indeed paid. A loss of almost 9% of vote share is very significant, although a combination of the first-past-the-post rule and the GRC system ensured that the PAP still won 89.2% of the seats in Parliament despite only garnering 61.2% of the votes. On the whole, it’s naught but a scratch to the PAP’s overwhelming dominance in Parliament. The PAP still retains its supermajority and can make changes to the Constitution anytime that it likes. But the swing voters have sent a clear signal that they have not been persuaded by the PAP’s rationale.
5. Swing Voters do not want Racial Politics.
In 2019, Heng Swee Keat, Singapore’s Deputy Prime Minister and the man who is next in line to be Prime Minister (PM) commented that Singapore was not ready to have a non-Chinese PM. He further added that race is an issue that always arises at election-time in Singapore.
Let us now consider the GE2015 results. Tharman Shanmugaratnam, Singapore’s Senior Minister and someone whom many have expressed keenness to be Singapore’s next PM, obtained 79.28% of the vote share in Jurong GRC. This was above even the current Prime Minister Lee Hsien Loong, who scored 78.63% in Ang Mo Kio GRC. Tharman’s score was the highest in the entire election.
And now let us consider the GE2020 results. Tharman scored 74.62% in Jurong, again the highest scorer of the entire election, while Hsien Loong scored 71.91%. So Tharman beat the current PM again, and by an even bigger margin than the last time. Furthermore, Swee Keat, who made the infamous comments above, scored just 53.41% in East Coast.
Yes, I know I’m ignoring a lot of other factors that influenced these results. But don’t these results show conclusively that Heng’s comments were wrong? We have an Indian leading both the current and future PM in both elections, but yet PAP still feels the need to say that Singapore “hasn’t arrived” at a stage where we can vote without race in mind. In fact, this was the same rationale that supposedly led to the reserved presidency as mentioned in my earlier point.
The swing voters have spoken, and it is exceedingly clear to me that the electorate does not care what our highest office-holders are in terms of race, whether it be the PM or the President. Our Singapore pledge firmly states “regardless of race”, and I think the results have shown that we as a people have taken it to heart. But has the PAP?
6. Voters will not be so easily manipulated.
On one hand, Singaporeans were exhorted to stay home during the Covid-19 pandemic. Contact tracing became mandatory, and groups of more than 5 are prohibited.
But on the other hand, we are also told that it’s absolutely necessary to hold an election during this same period, for Singaporeans to wait in long lines and in close proximity to each other as we congregate to cast our vote, all because the PAP needs a strong mandate.
On one hand, Heng Swee Keat lambasted the Worker’s Party, claiming that it was “playing games with voters” over their refusal to confirm if they would accept NCMP seats.
But on the other hand, Heng Swee Keat was moved to the East Coast GRC at the eleventh hour in a surprise move to secure the constituency. (As mentioned above, he was aptly rewarded for this with a razor-thin margin of just 53.41% of the votes.)
On one hand, Masagos Zulkifli, PAP Vice-Chairman stated that “candidates should not be defined by a single moment in time or in their career, but judged instead by their growth throughout their life”. He said this in defense of Ivan Lim, who appears to be the very first candidate in Singaporean politics to have been pushed into retracting his candidacy by the power of non-mainstream media.
But on the other hand, the PAP called on the WP to make clear its stand on Raeesah Khan, a WP candidate who ran (and won) in Sengkang GRC for this election, stating that the Police investigation into Raeesah’s comments made on social media was “a serious matter which goes to the fundamental principles on which our country has been built”.
On one hand, Chan Chun Sing stated in 2015, referring to SingFirst’s policies about giving allowances to the young and the elderly, “Some of them promised you $300 per month. I say, please don’t insult my residents. You think…. they are here to be bribed?”
On the other hand, the PAP Government has just given out several handouts under its many budgets to help Singaporeans cope with the Covid-19 situation. [To be clear, I totally approve of these handouts. What I don’t approve is that the PAP felt the need to lambast similar policies as bribery in the past. Comparing a policy with a crime is a political low blow in my book.]
I could go on, but I think I’ve made my point. And so did the electorate in this election, putting their vote where it counted to show their disdain for the heavy-handedness and double standards that the PAP has displayed for this election.
Conclusion
I don’t say the above to put down the PAP. The PAP would have you believe that to not support them is equivalent to not wanting what’s best for Singapore. This is a false dichotomy that must be stamped out, and I am glad to see our swing voters taking a real stand with this election.
No, I say the above as a harsh but ultimately supportive letter to the PAP. As everyone can see from the results, we all still firmly believe that the PAP should be the Government. We still have faith that PAP has the leadership to take us forward and out of the Covid-19 crisis.
But we also want to send the PAP a strong signal with this vote, to bring them down from their ivory towers and down to the ground. Enough with the double standards. Enough with the heavy-handedness. Singaporeans have clearly stated their desire for a more mature democracy, and that means more alternative voices in Parliament. The PAP needs to stop acting as the father who knows it all, and to start acting as the bigger brother who can work hand in hand with his alternative younger brother towards what’s best for the entire family: Singapore.
There is a real chance that the PAP will not listen, though. As Lee Hsien Loong admitted in a rally in 2006, “if there are 10, 20… opposition members in Parliament… I have to spent my time thinking what is the right way to fix them”.
Now, the PAP has POFMA at its disposal. It still has the supermajority in Parliament, making them able to change any law in Singapore, even the Constitution at will. We have already seen them put these tools to use for its own benefit. Let us see if the PAP will continue as it has always done, or will it take this opportunity to change itself for the better. Whatever the case, we will be watching, and we will be waiting to make our roar heard once again five years down the road.
Majulah Singapura!
Article Ends Here.
Here's the link to the actual article:
https://thethoughtexperiment.org/2020/07/11/ge2020-the-roar-of-the-swing-vote
And here's the link to the other political articles I've written about Singapore:
https://thethoughtexperiment.org/2020/07/07/ge2020-the-state-of-play/
https://thethoughtexperiment.org/2015/09/10/ge2015-voting-wisely/
https://thethoughtexperiment.org/2015/09/05/expectations-of-the-opposition/
submitted by sharingan87 to singapore [link] [comments]

Vault 7 - CIA Hacking Tools Revealed

Vault 7 - CIA Hacking Tools Revealed
March 07, 2017
from Wikileaks Website


https://preview.redd.it/9ufj63xnfdb41.jpg?width=500&format=pjpg&auto=webp&s=46bbc937f4f060bad1eaac3e0dce732e3d8346ee

Press Release
Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency.
Code-named "Vault 7" by WikiLeaks, it is the largest ever publication of confidential documents on the agency.
The first full part of the series, "Year Zero", comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA's Center for Cyber Intelligence (below image) in Langley, Virgina.
It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election.
Recently, the CIA lost control of the majority of its hacking arsenal including,
  1. malware
  2. viruses
  3. trojans
  4. weaponized "zero day" exploits
  5. malware remote control systems

...and associated documentation.
This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA.
The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.
"Year Zero" introduces the scope and direction of the CIA's global covert hacking program, its malware arsenal and dozens of "zero day" weaponized exploits against a wide range of U.S. and European company products, include,

  1. Apple's iPhone
  2. Google's Android
  3. Microsoft's Windows
  4. Samsung TVs,

...which are turned into covert microphones.
Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA).
The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force - its own substantial fleet of hackers.
The agency's hacking division freed it from having to disclose its often controversial operations to the NSA (its primary bureaucratic rival) in order to draw on the NSA's hacking capacities.
By the end of 2016, the CIA's hacking division, which formally falls under the agency's Center for Cyber Intelligence (CCI - below image), had over 5000 registered users and had produced more than a thousand,
hacking systems trojans viruses,
...and other "weaponized" malware.


https://preview.redd.it/3jsojkqxfdb41.jpg?width=366&format=pjpg&auto=webp&s=e92eafbb113ab3e972045cc242dde0f0dd511e96

Such is the scale of the CIA's undertaking that by 2016, its hackers had utilized more codes than those used to run Facebook.
The CIA had created, in effect, its "own NSA" with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.
In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA's hacking capabilities exceed its mandated powers and the problem of public oversight of the agency.
The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.
Once a single cyber 'weapon' is 'loose' it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.

Julian Assange, WikiLeaks editor stated that,
"There is an extreme proliferation risk in the development of cyber 'weapons'.
Comparisons can be drawn between the uncontrolled proliferation of such 'weapons', which results from the inability to contain them combined with their high market value, and the global arms trade.
But the significance of 'Year Zero' goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective."

Wikileaks has carefully reviewed the "Year Zero" disclosure and published substantive CIA documentation while avoiding the distribution of 'armed' cyberweapons until a consensus emerges on the technical and political nature of the CIA's program and how such 'weapons' should analyzed, disarmed and published.

Wikileaks has also decided to Redact (see far below) and Anonymize some identifying information in "Year Zero" for in depth analysis. These redactions include ten of thousands of CIA targets and attack machines throughout,
Latin America Europe the United States

While we are aware of the imperfect results of any approach chosen, we remain committed to our publishing model and note that the quantity of published pages in "Vault 7" part one ("Year Zero") already eclipses the total number of pages published over the first three years of the Edward Snowden NSA leaks.

Analysis

CIA malware targets iPhone, Android, smart TVs
CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA's DDI (Directorate for Digital Innovation).
The DDI is one of the five major directorates of the CIA (see above image of the CIA for more details).
The EDG is responsible for the development, testing and operational support of all backdoors, exploits, malicious payloads, trojans, viruses and any other kind of malware used by the CIA in its covert operations world-wide.
The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell's 1984, but "Weeping Angel", developed by the CIA's Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.
The attack against Samsung smart TVs was developed in cooperation with the United Kingdom's MI5/BTSS.
After infestation, Weeping Angel places the target TV in a 'Fake-Off' mode, so that the owner falsely believes the TV is off when it is on. In 'Fake-Off' mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.
As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.
The CIA's Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones. Infected phones can be instructed to send the CIA the user's geolocation, audio and text communications as well as covertly activate the phone's camera and microphone.
Despite iPhone's minority share (14.5%) of the global smart phone market in 2016, a specialized unit in the CIA's Mobile Development Branch produces malware to infest, control and exfiltrate data from iPhones and other Apple products running iOS, such as iPads.
CIA's arsenal includes numerous local and remote "zero days" developed by CIA or obtained from GCHQ, NSA, FBI or purchased from cyber arms contractors such as Baitshop.
The disproportionate focus on iOS may be explained by the popularity of the iPhone among social, political, diplomatic and business elites.
A similar unit targets Google's Android which is used to run the majority of the world's smart phones (~85%) including Samsung, HTC and Sony. 1.15 billion Android powered phones were sold last year.
"Year Zero" shows that as of 2016 the CIA had 24 "weaponized" Android "zero days" which it has developed itself and obtained from GCHQ, NSA and cyber arms contractors.
These techniques permit the CIA to bypass the encryption of, WhatsApp
  1. Signal
  2. Telegram
  3. Wiebo
  4. Confide
  5. Cloackman
...by hacking the "smart" phones that they run on and collecting audio and message traffic before encryption is applied.
CIA malware targets Windows, OSx, Linux, routers
The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware.
This includes multiple local and remote weaponized "zero days", air gap jumping viruses such as "Hammer Drill" which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ("Brutal Kangaroo") and to keep its malware infestations going.
Many of these infection efforts are pulled together by the CIA's Automated Implant Branch (AIB), which has developed several attack systems for automated infestation and control of CIA malware, such as "Assassin" and "Medusa".
Attacks against Internet infrastructure and webservers are developed by the CIA's Network Devices Branch (NDB).
The CIA has developed automated multi-platform malware attack and control systems covering Windows, Mac OS X, Solaris, Linux and more, such as EDB's "HIVE" and the related "Cutthroat" and "Swindle" tools, which are described in the examples section far below.
CIA 'hoarded' vulnerabilities ("zero days")
In the wake of Edward Snowden's leaks about the NSA, the U.S. technology industry secured a commitment from the Obama administration that the executive would disclose on an ongoing basis - rather than hoard - serious vulnerabilities, exploits, bugs or "zero days" to Apple, Google, Microsoft, and other US-based manufacturers.
Serious vulnerabilities not disclosed to the manufacturers places huge swathes of the population and critical infrastructure at risk to foreign intelligence or cyber criminals who independently discover or hear rumors of the vulnerability.
If the CIA can discover such vulnerabilities so can others.
The U.S. government's commitment to the Vulnerabilities Equities Process came after significant lobbying by US technology companies, who risk losing their share of the global market over real and perceived hidden vulnerabilities.
The government stated that it would disclose all pervasive vulnerabilities discovered after 2010 on an ongoing basis.
"Year Zero" documents show that the CIA breached the Obama administration's commitments. Many of the vulnerabilities used in the CIA's cyber arsenal are pervasive and some may already have been found by rival intelligence agencies or cyber criminals.
As an example, specific CIA malware revealed in "Year Zero" is able to penetrate, infest and control both the Android phone and iPhone software that runs or has run presidential Twitter accounts.
The CIA attacks this software by using undisclosed security vulnerabilities ("zero days") possessed by the CIA but if the CIA can hack these phones then so can everyone else who has obtained or discovered the vulnerability.
As long as the CIA keeps these vulnerabilities concealed from Apple and Google (who make the phones) they will not be fixed, and the phones will remain hackable.
The same vulnerabilities exist for the population at large, including the U.S. Cabinet, Congress, top CEOs, system administrators, security officers and engineers.
By hiding these security flaws from manufacturers like Apple and Google the CIA ensures that it can hack everyone at the expense of leaving everyone hackable.
'Cyberwar' programs are a serious proliferation risk
Cyber 'weapons' are not possible to keep under effective control.
While nuclear proliferation has been restrained by the enormous costs and visible infrastructure involved in assembling enough fissile material to produce a critical nuclear mass, cyber 'weapons', once developed, are very hard to retain.
Cyber 'weapons' are in fact just computer programs which can be pirated like any other. Since they are entirely comprised of information they can be copied quickly with no marginal cost.
Securing such 'weapons' is particularly difficult since the same people who develop and use them have the skills to exfiltrate copies without leaving traces - sometimes by using the very same 'weapons' against the organizations that contain them.
There are substantial price incentives for government hackers and consultants to obtain copies since there is a global "vulnerability market" that will pay hundreds of thousands to millions of dollars for copies of such 'weapons'.
Similarly, contractors and companies who obtain such 'weapons' sometimes use them for their own purposes, obtaining advantage over their competitors in selling 'hacking' services.
Over the last three years the United States intelligence sector, which consists of government agencies such as the CIA and NSA and their contractors, such as Booz Allan Hamilton, has been subject to unprecedented series of data exfiltrations by its own workers.
A number of intelligence community members not yet publicly named have been arrested or subject to federal criminal investigations in separate incidents.
Most visibly, on February 8, 2017 a U.S. federal grand jury indicted Harold T. Martin III with 20 counts of mishandling classified information.
The Department of Justice alleged that it seized some 50,000 gigabytes of information from Harold T. Martin III that he had obtained from classified programs at NSA and CIA, including the source code for numerous hacking tools.
Once a single cyber 'weapon' is 'loose' it can spread around the world in seconds, to be used by peer states, cyber mafia and teenage hackers alike.
U.S. Consulate in Frankfurt is a covert CIA hacker base
In addition to its operations in Langley, Virginia the CIA also uses the U.S. consulate in Frankfurt as a covert base for its hackers covering Europe, the Middle East and Africa.
CIA hackers operating out of the Frankfurt consulate ("Center for Cyber Intelligence Europe" or CCIE) are given diplomatic ("black") passports and State Department cover.
The instructions for incoming CIA hackers make Germany's counter-intelligence efforts appear inconsequential: "Breeze through German Customs because you have your cover-for-action story down pat, and all they did was stamp your passport" Your Cover Story (for this trip) Q: Why are you here? A: Supporting technical consultations at the Consulate. Two earlier WikiLeaks publications give further detail on CIA approaches to customs and secondary screening procedures.
Once in Frankfurt CIA hackers can travel without further border checks to the 25 European countries that are part of the Shengen open border area - including France, Italy and Switzerland.
A number of the CIA's electronic attack methods are designed for physical proximity.
These attack methods are able to penetrate high security networks that are disconnected from the internet, such as police record database. In these cases, a CIA officer, agent or allied intelligence officer acting under instructions, physically infiltrates the targeted workplace.
The attacker is provided with a USB containing malware developed for the CIA for this purpose, which is inserted into the targeted computer. The attacker then infects and exfiltrates data to removable media.
For example, the CIA attack system Fine Dining, provides 24 decoy applications for CIA spies to use.
To witnesses, the spy appears to be running a program showing videos (e.g VLC), presenting slides (Prezi), playing a computer game (Breakout2, 2048) or even running a fake virus scanner (Kaspersky, McAfee, Sophos).
But while the decoy application is on the screen, the underlying system is automatically infected and ransacked.
How the CIA dramatically increased proliferation risks
In what is surely one of the most astounding intelligence own goals in living memory, the CIA structured its classification regime such that for the most market valuable part of "Vault 7", the CIA's, weaponized malware (implants + zero days) Listening Posts (LP) Command and Control (C2) systems, ...the agency has little legal recourse.
The CIA made these systems unclassified.
Why the CIA chose to make its cyber-arsenal unclassified reveals how concepts developed for military use do not easily crossover to the 'battlefield' of cyber 'war'.
To attack its targets, the CIA usually requires that its implants communicate with their control programs over the internet.
If CIA implants, Command & Control and Listening Post software were classified, then CIA officers could be prosecuted or dismissed for violating rules that prohibit placing classified information onto the Internet.
Consequently the CIA has secretly made most of its cyber spying/war code unclassified. The U.S. government is not able to assert copyright either, due to restrictions in the U.S. Constitution.
This means that cyber 'arms' manufactures and computer hackers can freely "pirate" these 'weapons' if they are obtained. The CIA has primarily had to rely on obfuscation to protect its malware secrets.
Conventional weapons such as missiles may be fired at the enemy (i.e. into an unsecured area). Proximity to or impact with the target detonates the ordnance including its classified parts. Hence military personnel do not violate classification rules by firing ordnance with classified parts.
Ordnance will likely explode. If it does not, that is not the operator's intent.
Over the last decade U.S. hacking operations have been increasingly dressed up in military jargon to tap into Department of Defense funding streams.
For instance, attempted "malware injections" (commercial jargon) or "implant drops" (NSA jargon) are being called "fires" as if a weapon was being fired.
However the analogy is questionable.
Unlike bullets, bombs or missiles, most CIA malware is designed to live for days or even years after it has reached its 'target'. CIA malware does not "explode on impact" but rather permanently infests its target. In order to infect target's device, copies of the malware must be placed on the target's devices, giving physical possession of the malware to the target.
To exfiltrate data back to the CIA or to await further instructions the malware must communicate with CIA Command & Control (C2) systems placed on internet connected servers.
But such servers are typically not approved to hold classified information, so CIA command and control systems are also made unclassified.
A successful 'attack' on a target's computer system is more like a series of complex stock maneuvers in a hostile take-over bid or the careful planting of rumors in order to gain control over an organization's leadership rather than the firing of a weapons system.
If there is a military analogy to be made, the infestation of a target is perhaps akin to the execution of a whole series of military maneuvers against the target's territory including observation, infiltration, occupation and exploitation.
Evading forensics and anti-virus
A series of standards lay out CIA malware infestation patterns which are likely to assist forensic crime scene investigators as well as, Apple
  1. Microsoft
  2. Google
  3. Samsung
  4. Nokia
  5. Blackberry
  6. Siemens
  7. anti-virus companies,
...attribute and defend against attacks.
"Tradecraft DO's and DON'Ts" contains CIA rules on how its malware should be written to avoid fingerprints implicating the "CIA, US government, or its witting partner companies" in "forensic review".
Similar secret standards cover the, use of encryption to hide CIA hacker and malware communication (pdf) describing targets & exfiltrated data (pdf) executing payloads (pdf) persisting (pdf), ...in the target's machines over time.
CIA hackers developed successful attacks against most well known anti-virus programs.
These are documented in, AV defeats Personal Security Products Detecting and defeating PSPs PSP/DebuggeRE Avoidance For example, Comodo was defeated by CIA malware placing itself in the Window's "Recycle Bin". While Comodo 6.x has a "Gaping Hole of DOOM".
CIA hackers discussed what the NSA's "Equation Group" hackers did wrong and how the CIA's malware makers could avoid similar exposure.

Examples

The CIA's Engineering Development Group (EDG) management system contains around 500 different projects (only some of which are documented by "Year Zero") each with their own sub-projects, malware and hacker tools.
The majority of these projects relate to tools that are used for,
penetration infestation ("implanting") control exfiltration
Another branch of development focuses on the development and operation of Listening Posts (LP) and Command and Control (C2) systems used to communicate with and control CIA implants.
Special projects are used to target specific hardware from routers to smart TVs.
Some example projects are described below, but see the table of contents for the full list of projects described by WikiLeaks' "Year Zero".
UMBRAGE
The CIA's hand crafted hacking techniques pose a problem for the agency.
Each technique it has created forms a "fingerprint" that can be used by forensic investigators to attribute multiple different attacks to the same entity.
This is analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible.
As soon one murder in the set is solved then the other murders also find likely attribution.
The CIA's Remote Devices Branch's UMBRAGE group collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation.
With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the "fingerprints" of the groups that the attack techniques were stolen from.
UMBRAGE components cover,
keyloggers
  1. password collection
  2. webcam capture
  3. data destruction
  4. persistence
  5. privilege escalation
  6. stealth
  7. anti-virus (PSP) avoidance
  8. survey techniques

Fine Dining
Fine Dining comes with a standardized questionnaire i.e menu that CIA case officers fill out.
The questionnaire is used by the agency's OSB (Operational Support Branch) to transform the requests of case officers into technical requirements for hacking attacks (typically "exfiltrating" information from computer systems) for specific operations.
The questionnaire allows the OSB to identify how to adapt existing tools for the operation, and communicate this to CIA malware configuration staff.
The OSB functions as the interface between CIA operational staff and the relevant technical support staff.
Among the list of possible targets of the collection are,
  • 'Asset'
  • 'Liason Asset'
  • 'System Administrator'
  • 'Foreign Information Operations'
  • 'Foreign Intelligence Agencies'
  • 'Foreign Government Entities'
Notably absent is any reference to extremists or transnational criminals. The 'Case Officer' is also asked to specify the environment of the target like the type of computer, operating system used, Internet connectivity and installed anti-virus utilities (PSPs) as well as a list of file types to be exfiltrated like Office documents, audio, video, images or custom file types.
The 'menu' also asks for information if recurring access to the target is possible and how long unobserved access to the computer can be maintained.
This information is used by the CIA's 'JQJIMPROVISE' software (see below) to configure a set of CIA malware suited to the specific needs of an operation.
Improvise (JQJIMPROVISE)
  1. 'Improvise' is a toolset for configuration, post-processing, payload setup and execution vector
  2. selection for survey/exfiltration tools supporting all major operating systems like,
  3. Windows (Bartender)
  4. MacOS (JukeBox)
  5. Linux (DanceFloor)
  6. Its configuration utilities like Margarita allows the NOC (Network Operation Center) to customize tools
based on requirements from 'Fine Dining' questionnaires.
HIVE
HIVE is a multi-platform CIA malware suite and its associated control software.
The project provides customizable implants for Windows, Solaris, MikroTik (used in internet routers) and Linux platforms and a Listening Post (LP)/Command and Control (C2) infrastructure to communicate with these implants.
The implants are configured to communicate via HTTPS with the webserver of a cover domain; each operation utilizing these implants has a separate cover domain and the infrastructure can handle any number of cover domains.
Each cover domain resolves to an IP address that is located at a commercial VPS (Virtual Private Server) provider.
The public-facing server forwards all incoming traffic via a VPN to a 'Blot' server that handles actual connection requests from clients.
It is setup for optional SSL client authentication: if a client sends a valid client certificate (only implants can do that), the connection is forwarded to the 'Honeycomb' toolserver that communicates with the implant.
If a valid certificate is missing (which is the case if someone tries to open the cover domain website by accident), the traffic is forwarded to a cover server that delivers an unsuspicious looking website.
The Honeycomb toolserver receives exfiltrated information from the implant; an operator can also task the implant to execute jobs on the target computer, so the toolserver acts as a C2 (command and control) server for the implant.
Similar functionality (though limited to Windows) is provided by the RickBobby project.
See the classified user and developer guides for HIVE.

Frequently Asked Questions

Why now?
WikiLeaks published as soon as its verification and analysis were ready. In February the Trump administration has issued an Executive Order calling for a "Cyberwar" review to be prepared within 30 days.
While the review increases the timeliness and relevance of the publication it did not play a role in setting the publication date.
Redactions
Names, email addresses and external IP addresses have been redacted in the released pages (70,875 redactions in total) until further analysis is complete. Over-redaction: Some items may have been redacted that are not employees, contractors, targets or otherwise related to the agency, but are, for example, authors of documentation for otherwise public projects that are used by the agency.
Identity vs. person: the redacted names are replaced by user IDs (numbers) to allow readers to assign multiple pages to a single author. Given the redaction process used a single person may be represented by more than one assigned identifier but no identifier refers to more than one real person.
Archive attachments (zip, tar.gz, ...), are replaced with a PDF listing all the file names in the archive. As the archive content is assessed it may be made available; until then the archive is redacted.
Attachments with other binary content, are replaced by a hex dump of the content to prevent accidental invocation of binaries that may have been infected with weaponized CIA malware. As the content is assessed it may be made available; until then the content is redacted.
Tens of thousands of routable IP addresses references, (including more than 22 thousand within the United States) that correspond to possible targets, CIA covert listening post servers, intermediary and test systems, are redacted for further exclusive investigation.
Binary files of non-public origin, are only available as dumps to prevent accidental invocation of CIA malware infected binaries.
Organizational Chart
The organizational chart (far above image) corresponds to the material published by WikiLeaks so far.
Since the organizational structure of the CIA below the level of Directorates is not public, the placement of the EDG and its branches within the org chart of the agency is reconstructed from information contained in the documents released so far.
It is intended to be used as a rough outline of the internal organization; please be aware that the reconstructed org chart is incomplete and that internal reorganizations occur frequently.
Wiki pages
"Year Zero" contains 7818 web pages with 943 attachments from the internal development groupware. The software used for this purpose is called Confluence, a proprietary software from Atlassian.
Webpages in this system (like in Wikipedia) have a version history that can provide interesting insights on how a document evolved over time; the 7818 documents include these page histories for 1136 latest versions.
The order of named pages within each level is determined by date (oldest first). Page content is not present if it was originally dynamically created by the Confluence software (as indicated on the re-constructed page).
What time period is covered?
The years 2013 to 2016. The sort order of the pages within each level is determined by date (oldest first).
WikiLeaks has obtained the CIA's creation/last modification date for each page but these do not yet appear for technical reasons. Usually the date can be discerned or approximated from the content and the page order.
If it is critical to know the exact time/date contact WikiLeaks.
What is "Vault 7"
"Vault 7" is a substantial collection of material about CIA activities obtained by WikiLeaks.
When was each part of "Vault 7" obtained?
Part one was obtained recently and covers through 2016. Details on the other parts will be available at the time of publication.
Is each part of "Vault 7" from a different source?
Details on the other parts will be available at the time of publication.
What is the total size of "Vault 7"?
The series is the largest intelligence publication in history.
How did WikiLeaks obtain each part of "Vault 7"?
Sources trust WikiLeaks to not reveal information that might help identify them.
Isn't WikiLeaks worried that the CIA will act against its staff to stop the series?
No. That would be certainly counter-productive.
Has WikiLeaks already 'mined' all the best stories?
No. WikiLeaks has intentionally not written up hundreds of impactful stories to encourage others to find them and so create expertise in the area for subsequent parts in the series. They're there.
Look. Those who demonstrate journalistic excellence may be considered for early access to future parts.
Won't other journalists find all the best stories before me?
Unlikely. There are very considerably more stories than there are journalists or academics who are in a position to write them.
submitted by CuteBananaMuffin to conspiracy [link] [comments]

Kristi Winters' & Kevin Logan's Happy Hour w/ Sargon

https://www.youtube.com/watch?v=5x-D2G93Skg
So Kristi Winters and Kevin Logan held a stream recently, and Sargon appeared as a guest, essentially giving us a Youtube Kristi vs Sargon II after their initial debate on the Skeptic Feminist channel a while back, with Sargon joining this video at around the 10 minute mark. And sweet Jesus I think Kristi owned Sargon even heavier in this debate.
The starting point of this debate comes from a comment Sargon made on YouTube that stated the following:
The Democrats believe this is a referendum on their entire platform: Orange Man bad, Deplorables are Nazis, socialism is a gift from the Prophet Marx (pbuh (peace be upon him))
So basically, Sargon believes that the "far left" are taking over the Democratic Party. I figured I'd try and recap this debate, in case people can't quite stomach over an hour of Sargon's material.
1) Sargon attempts to back this up by bringing up the election of Alexandria Ocasio-Cortez to Congress, but Kristi points out that this came from a progressive district that Cortez represents, and counters by bringing up right wing districts such as Steve King's, who despite his Neo-Nazi beliefs still nonetheless got elected by Republican voters in his district.
2) Sargon says there is a "whole slew of Justice Democrats" that have been elected recently in the US. Kristi challenges Sargon to name them. Sargon says there were "7 or 8", but bear in mind this is out of 228 so far, which hardly constitutes a "takeover".
3) Sargon says that it isn't that they aren't doing what he claims, it's that they haven't completed their "mission". Kristi counters and says maybe the reason these people are able to represent their districts is because they have more left leaning views, just as how a far right candidate was chosen to represent their district in Iowa even after saying that if a far right party in Austria would be Republicans in the US.
4) Kristi asks again for the evidence that "7 or 8" far left politicians were elected in the US, as well as asking for their corresponding districts. Sargon asks why she can't just Google it, but this was Sargon's empirical claim, so Kristi points out that he needs to substantiate it. Sargon accuses her of being pedantic, but actually it's quite considerably not "pedantry" to ask Sargon to back up his claims.
5) Sargon complains that he doesn't have a "sheet of notes" in front of him, but Kristi points out that she has her references ready, and Kevin lambasts Sargon for yet again not preparing for a debate. Sargon claims without evidence that a number of "corporate" Democrats were ousted, but he can't say how many also got in.
6) Fucking hell. We're only 6 minutes in and Sargon is threatening to not bother with this conversation if Kristi and Kevin aren't going to be "charitable" with his claims. Kevin points out the last time he chose to debate Kristi, he got annihilated, and when Sargon says that "things change", Kevin again highlights that Sargon seems to have done even less preparation for this debate.
7) Kristi points out that there is no reason to just take Sargon on his word about the "7 or 8 justice democrats" that were elected to Congress, when Sargon has only actually named one person, and Kevin doesn't care about Sargon's moral outrage over perceived "pedantry".
8) Kristi asks what exactly does it show that the one "justice Democrat" person Sargon could name got elected to Congress out of the potentially 230 Democrats, and says he can't show his claim, and Sargon seriously actually says "I can, I'm just not going to", which naturally justifiably provokes hysterical laughter from Kristi and Kevin. Sargon protests that he's not a scientist and even uses his lack of qualifications as a defence, not making this up, and that he just wanted to chat.
9) Kristi offers to show the exit polling data, and when Sargon agrees, Kevin brings up how Sargon wants them to show their sources, but he refuses to cite his own. It's pointed out that Sargon essentially desperately wanted a fight especially considering that Kristi's and Kevin's joint streams usually only get 70-80 viewers when live. Sargon's pretty much threatening to take his ball and go home because Kristi is making the shock horror request that he actually be accurate with his claims.
10) The chat moves on to the exit polling, and Sargon makes the claim now that "The Left is dying", despite claiming the existence of all those "justice Democrats" who got elected earlier. Sargon says they're not differentiating between the "Left" and "Far Left", to which Kevin asks why Sargon has a habit of steel-manning the far-right, but not giving even remotely charitable interpretations to the left, which Kristi and Kevin do actually have citations for unlike Carl.
11) Carl manages to find something which says "In the 2018 election, 26 of the 79 candidates endorsed by Justice Democrats won their respective Primary elections", but the problem here is that Kristi and Kevin were clearly taking about the General elections, and Sargon hasn't produced accurate figures for those.
12) At roughly the 22 minutes mark on the video, Kristi starts to go through the numbers on the Exit Polls according to CNN Politics which had 19,000 respondents (48% men, 52% women), and begins with the Gender gap, wherein while Republicans had a narrow 51%-47% advantage with men, Democrats had a considerably wider 59%-40% lead with women. This shows that women, who voted more than men, also skewed far more heavily Democrat and therefore produced a bigger effect on the election. She then brings up age, a real concern for the Republicans since Democrats lead 67%-32% with 18-29 year olds, and 58%-39% with 30-44 year olds. The other two brackets of 40-64 year olds and 65+ years old are more evenly split, albeit with a Republican lead.
13) Carl asks if Kristi feels confident about 2020, to which Kristi says she does, and Carl tries to bring the conversation to the 2020 race, but Kristi prevents Carl's attempt to change the subject since this is supposed to be about the mid-terms.
14) Kristi asks, based on the age and gender statistics she's cited, how Carl squares this with his thesis that the Left are "dying". Carl asks if those old people "started" as right wing, in other words expressing the old belief about how people become more right wing. Kristi counters with the nature of the party ID being stronger, as well as the fact that we would expect to see a stronger skew among older people than just basically 50%-50% if the belief about people being more conservative as they get older were to actually hold true, and that you'd expect considerably higher numbers in that age range for Republican than just 50% (like the 68% of the 18-29 year olds voting Democrat).
15) Kristi also brings up the importance of policies in how it affects how people vote, namely the deficit, tax cuts to the rich, and how McConnell hinted at going after social security and Medicaid.
16) Voter ID is talked about. Kristi talks about the issues surrounding this, for instance the problem with signatures, and how Voter ID affects minority groups. Kristi is in favour of Same Day Registration, and that voter ID should be free and not be something you are made to pay for, which I agree with. When Kristi brings up how women (who also statistically live longer) are affecting the vote, Carl responds by saying that Trump is still President. Popular Vote vs Electoral College comes up, Carl claims the victory was a landslide, when in actually it was the third narrowest victory since Reagan.
17) When pressed about what the points gap means for the long term sustainability of the Left, Carl, having no argument, sarcastically agrees, then derisively brings up Germany and France in terms of left wing parties. Carl again claims Trump's victory was a landslide, and even when Kristi brings up a page proving that Trump is actually in the bottom half of all time Presidential victories. Kristi says the definition of a statistical landslide is more than 4 points in percentage of the overall vote, and asks Carl for his definition of his landslide, which he doesn't provide.
18) Trump not attending the World War I centenary is brought up, as well as how Sargon, despite describing himself as centre-left, is so eager to support Trump. Carl attempts to get a definition of "Far-Right" and "tell me what I believe", but Kristi points out he's blatantly trying to straw-man her as he always does. Carl believes that he can say what a "far left" person believes, because he's totally able to read minds.
19) Kevin points out that the candidates that Carl supports are consistently the most right-wing in every election, and also the fact that Democrats now have the power to hold Trump even more to account, and Trump threatening counter-investigations, and the shitty way Trump appointed a replacement Attorney General. These are all things that Carl, as a supposed centre-left guy, should be concerned about, but he blatantly isn't, and Carl says that "I decide what I look into". Of course, this is false, since he actually has people send him stuff which he then covers in his videos, so he's not committed into looking into anything at all unless other people do his work for him.
20) At the 40 minutes mark, Kristi offers to look into the definition of "Far-Right" together on the stream, and points out that actual scholars use the working definitions. Carl refuses, and whines about how Kristi and Kevin are being totally mean, and appeals that there should be some decorum in this debate and Kristi and Kevin are in hysterical laughter at this point about Carl's tactics.
21) The previous debate is brought up, and Kevin asks if Carl was showing good "decorum" when he was seen giggling in his cam when Kristi brought up women waking up with spunk on their face after being raped. Carl claims to not remember this.
22) Carl claims that it matters more about what happens in the future, and also claims that Kristi and others in her field didn't see Brexit and Trump happening. Kristi points out that, actually, Brexit was within the margin of error for polling, and that Clinton did score 2 percentage points above Trump with the positioning of the Electoral College causing the issues. And in social science, including the markets, you use the statistical data from today to inform about how things are likely to be in the future.
23) Kristi says that positions consistent with "Far Right" leanings, as Carl has, are the espousing of misogyny and racism, as well as being willing to overthrow democratic institutions in order to protect their positions of power. When Carl queries if the Far Right is "basically fascism", Kristi responds that Carl's misogyny warms people up to the kind of rhetoric of fascism, with fascism being a very patriarchal, strict gender roles kind of ideology. Carl's attacks on women who challenge those gender roles justifies to his audience that those gender roles are right and should be forced on people.
24) Kristi points out that Carl's content often came up among white supremacists who support the strict gender roles, and Kevin points out that he can't think of a single Fascist society that wasn't based on a traditional view of gender relations. When Carl attempts a non-sequitur of trying to get Kristi to explain what his personal view on gender roles is, Kristi rebuts him by pointing out that he's best placed to explain that himself.
25) Carl says that gender roles are the expression of the necessary definition of the difference between biological sexes, varying from culture to culture, are socially constructed, have a particular reason for existing, and facilitate communication between the genders, for the purpose of procreation. While he admits they shouldn't be prescribed, he says that they should evolve over time, and jesus this is word salad. He says that these roles should be negotiated and agreed, and shouldn't be forced or deconstructed "from above"
26) Kristi queries what he means by "necessary characteristics" of biological differences between the sexes, and how modernity may affect the negating of this. Carl responds that the development of technology has facilitated the world-view in which the idea of masculinity being less important than it was, but that this comes with its own set of problems, and his example is of apparently high earning women who are single and childless which causes them unhappiness. Kristi points out that there's always the option of adoption, but Carl focuses on the "single" part, and says that the abandonment of male gender roles has been "bad" for women.
27) Kristi asks if the lessening of strength as a necessary requirement as well the better ability of women to control their reproductive organs therefore opens our society to more diverse and exploratory ways of expressing gender identity. Kristi points out through her research that things like gender isn't on a dichotomous spectrum, like her doctoral thesis which asked students about the attributes of an "ideal man" and "ideal woman", with men and masculine attributes being associated with "agency, competitiveness, aggression", and women and feminine attributes being associated with "caring, compassion, and helping others". When attribute tests were carried out on the students, men and women did not score strictly on the masculine and feminine attributes, and their scores were not determined by their sex, and some students had androgynous results with high masculine and feminine traits. Since we're no longer bound by physical limitations since we have technology, Kristi asks if re-exploration of gender roles based on societal needs is in order.
28) On the 1 hour mark on the video, Carl believes that technology hasn't changed us still being bound by physical limitations, and then asks what the reason for people self-identifying as compassionate was when the stereotype is of women being the compassionate sex. Kristi mentions a YouGov quota sample of 2800 respondents weighted to be nationally representative of the British population. Broken down by cohorts, younger men (18-29 year olds) were found to have the highest reported senses of agency, and that diminished over time, theorised to be as men getting to see the world and realising they're not as powerful as they thought they were. The drop off constituted either 1 or 2 points over time on average. Another interesting aspect is that men's self-reported compassion and communion with others went UP over time as they got older. Women on average started out with less agency and high communion, and for older women while the communion did stay the same, their agency went up over time as well as feelings of competitiveness and independence.
29) Carl asks if Kristi has correlated her findings with testosterone over lifetimes (don't worry, I don't think he's pulling a Davis Aurini to try and sell cream). Kristi says she can't do that because that would require access to medical data and those studies are very expensive and hard to get hold of as well to get approval for funding. Carl says that Kristi is going to skip that data, but Kristi points out that she would need to use people in her own sample, and this would require collection and storing of samples of testosterone, and her last study cost £10k. Carl concedes the real world restrictions of trying to do this test.
30) Carl says that while he does not have studies to hand, generally younger men have higher testosterone than older men. Kristi admits this could be correlated with a sense of self-efficacy, and that you could do a test of high and low testosterone of men of different ages. Carl says it wouldn't be surprising that young men with high amounts of testosterone who are fit and healthy would have high senses of agency. Kristi agrees. Huh, we're actually getting something of an engaging conversation here.
31) Carl mentions an interview with a "Hollywood actress" whose name he's forgotten, and she was apparently annoyed that older men "cultivated gravitas", and that women didn't have this, and Carl thinks that most women trade heavily on their looks, especially in Hollywood, mentioning the "attractive women going to Hollywood to get famous as actresses" cliche. He says that attractive men do this too, but claims that as women experience a decline in sexual attractiveness as they grow older, to which I would personally respond with many of the examples of women over 40 on this list as a counter-point: https://www.thetrendspotter.net/hottest-women-over-40/ . Get the hell outta here, Carl.
32) Anyway, Carl says that this doesn't seem to happen with men, and that they appear to get more attractive to the opposite sex as they get older. Kevin jokes that Carl must be drowning in women after him, but Carl is married apparently.
33) In Kristi's own data, she's found that for men or for women is that people who have jobs as managers and who own their own businesses, rate highly on measures of agency, and as women age they often get management positions, which is tied to having direct control, and that this kind of thing was statistically significant.
34) Okay, Carl's actually making insightful contributions, holy shit. Carl asks what accounts for the difference, since obviously young men aren't managers, so why do they score so highly on agency? Kristi speculates that young men from 18 onwards feel that they have the world ahead of them, and that if they set their minds to it then they can do things. She also explains that unemployed and home-bound disabled people, regardless of gender, have very low senses of agency and high senses of communion. So not having a job and/or being dependent on government assistance does have an effect on how you perceive yourself and your ability to get by. Long story short, with all this data where both men and women score high and low on particular cohorts and some things in life change those as well, she is very skeptical of putting gender into a binary.
35) Carl concedes that there could be something other than male and female gender roles and that they aren't universal across cultures, though he does think it has something to do with his "cultural negotiation" point from earlier. But he "postulates" (ugh) that there is "definitely some kind of biological impetus" behind all of those things, and thinks that Kristi's data is some kind of expression of that. He thinks there is some kind of causation there, even if he can't prove that though he would be surprised if there wasn't.
36) Kristi notes that men as a group rate consistently higher on agency than women, while the reverse is true for communion. Kristi says some of it is "probably definitely" biologically informed, though linking DNA to behaviour would be incredibly hard, while linking to chemicals like testosterone would be "easier".
37) Carl does not believe that gender roles are going away, or that the supposed "feminist push to get rid of them" is going to work. He says that he doesn't have a prescriptive standard about "how gender roles SHOULD be", noting it's good we rethink them, and talks about how some people will want "agender" relationship dynamics, and some patriarchal, and how couples will negotiate those things. He asks what the opposite of patriarchal is.
38) On the 1 hour 10 minutes part of the video Kristi comes back to Carl's claim of feminists attempting to "destroy" gender roles, but then later himself saying rethinking them. Carl says it's not bad to rethink anything, but believes in a push by the "radical left" to deconstruct gender roles. Kristi points out that to "deconstruct" means to unpack and ask why we are doing this and what is its value. Carl says there is a push against "masculinity", and talks about an article, maybe from Vice, in which the writer said something like "Can we just all admit that masculinity is toxic?", which Carl considers to be dangerous, since apparently a lot of women don't think that, such as "40 year old successful business-women who can't get husbands", and "they aren't thinking masculinity is awful, they're thinking masculinity is hot and I want some of it".
39) Kristi says that she wants a healthy, positive masculinity for boys and for girls and for everyone to have such role models. She emphasises personal honour and care and connectiveness, as well as parents providing regardless of their gender. She brings up Lin Manuel Miranda as someone she sees as a brilliant male role model. She says there are men out there who don't get enough credit for not only being dads and providing, but also for pushing strollers and changing nappies, and as a feminist Kristi wants to see more baby nappy changing stations in men's public bathrooms so fathers don't have to end up changing nappies on a bench outside.
40) As a father himself who has at times had to resort to what Kristi described, Carl appreciates the fact that there are some nappy changing stations in public male bathrooms that he knows of so he definitely is not against those.
41) Kevin brings up the fact that Carl earlier mentioned an article he apparently read from Vice, or possibly Buzzfeed. Kevin asks why anyone should care, and that Carl is picking up on the whole stupid minutia of "Oh this pink haired feminist wrote this thing on Tumblr or Vice released an article" as if those things represent anything. Carl says that we have such things as "public intellectuals", and Kristi expresses surprise at Carl's insinuation that Vice constitutes a "think paper". Carl concedes that Vice is not a stellar example of this, but that they have such "dimensions" to them, and brings up this as well as Buzzfeed and Teen Vogue that write "intersectional" articles as if they are authorities on intersectionality. He says he enjoys laughing at them for perceived mistakes, and believes that they consider themselves "thought leaders".
42) Kevin says that every publication that puts something out there is part of a larger conversation, and inquires about how if there are a few publications writing articles that Carl considers to be stupid, why does he focus on those few rather than the many more much more pressing things that could cause considerably more damage? Carl says it's because this is what he's interested in talking about, and says that it is "not outside of the logic that is being suggested, the difference is scale, not kind".
43) Kevin says that the scale is minute, but Carl believes Kevin doesn't have a good argument against the "radical feminists". Kevin responds that he isn't trying to, and that he considers the focus of Carl's ire to be a really tiny, insignificant group that Carl has been trying to paint as the Dreaded Cultural Marxists Taking Over Everything.
44) Carl asks when he's ever used the term "Cultural Marxist". Kevin points out that Carl has said that Cultural Marxism exists, Carl then accuses "intersectional feminism" of being this, but Kristi says that IF is definitely not Marxist. Carl says that's what "they" think it is with no evidence.
45) Kristi inquires whether it's surely the case that it's a bigger problem that men who are fathers are being discriminated against because companies expect women to do the nappy work which leaves fathers out in the cold, and points out that this is something that feminists like herself really care about and want equality in nappy changing access. Carl agrees there should be gender neutral nappy changing facilities in public places, but he doesn't see that as being a "feminist" issue. But Kristi rebuts him by saying that because if women are mothers and they're the ones that always have to be out with the baby, and also it discriminates against dads as they can't do as much of the parenting, so overall it's a family and distribution of labour issue.
46) Carl says the problem is that the distribution of labour is not being dictated broadly by men, but by women. Kristi says if that was really the case, then there'd already be all of those nappy changing places accessible to men as well as women and that this would all be taken care of, but it hasn't and it's not women running the corporations or governments to make such things policy.
47) Carl disagrees, and claims that women don't broadly want what feminists want, but Kevin points out this only applies to Carl's "Straw-Man Feminism" that he's invented. Carl claims that most women aren't feminists and are more "traditionally minded" than feminists apparently seem to think, but Kristi rebuts this by pointing out that statistically women's viewpoints are more likely to be feminist positions than for them to outright call themselves feminists, and that to claim as Carl says that women mostly don't have feminist values isn't borne out by the actual data.
48) Carl doesn't think feminism has the "monopoly" on those things, but Kristi brings up things like more equal pay, more balanced work life, and more women getting elected, and with most people agreeing with those positions then they're supporting feminist positions. Carl says they are "other people's positions" too, to which Kristi says that what defines them is that the positions challenge gender roles. Carl claims "not necessarily", to which Kristi asks how considering the history of women being paid less.
49) Kevin inquires that even if we are to take Carl's claim that most women aren't feminists as fact, then why is Carl so worried about them? Carl talks about institutions in society, and thinks that feminism should keep to itself like Scientology. Carl says the problem is "They (feminists) are in our institutions", and Kevin wants to clarify if Carl would be okay with feminism if it didn't try to do or achieve anything and just shut up. Carl denies this, and instead says that if it "kept to itself" and if it was "voluntary". Jesus fucking Christ.
50) An exasperated Kevin points that it IS voluntary and asks if Carl has been imprisoned or something. Carl asks what Kristi and Kevin think trying to make misogyny a hate crime is and whether that is voluntary, and claims this amounts to an attempt to make it so that "people have to accept feminism". Kristi and Kevin say that is not what feminism is, and Kevin says that there are loads of laws, and asks about murder laws using Carl's "voluntary" logic, and that crimes exist. Carl says he can't think of many ideologies that are "pro-murder", to which Kevin points out Carl's Far-Right friends for their views on Jewish people.
51) At the 1 hour 20 minutes part of the video, Kristi brings the conversation back to Carl's "feminists in institutions wielding power" claim and asks for clarification on this. Carl brings up the Women & Equalities Commission in the UK. Kristi asks how they wield power, Carl responds "the very nature of it, it's a Women & Equalities ... it's not an 'equalities' commission". Kristi presses him to clarify what it does and if it writes legislation, and Carl says he needs to Google it, and Kristi also points out it can't vote on anything, it can just make recommendations. Carl says it holds debates and meetings, what he describes as "partial free speech", and says it's controlled by feminists, and that apparently they "do actively block certain measures", and he brings up as an example the MP Philip Davies apparently being "shut down by Jess Phillips and her sisterhood as she calls it".
52) Kevin steps in here and calls Carl out on this lie, pointing out that Davies did have his debate and it did take place, just not in the main chamber of the House of Commons as most debates don't. Carl still takes issue with this, and again blames Jess Phillips and her "cronies". Kristi points out Davies is simply being treated like everyone else, and Kevin points out that Carl is mixing up the Women & Equalities Commission with the All Parliamentary Group, which isn't a commission. Carl concedes this, but still is critical of the W&EC, since it "still has the same people on it and still has these kinds of effects".
53) Kristi incredulously says the effect was a guy had to give a speech in a room other the one people usually give speeches in. Carl asks why he shouldn't have the main floor of the Chamber, and Kristi answers "because nobody else does" and asks why he should get special treatment, and Kevin points out that it is one room and there is a limited amount of time and they need to get through parliamentary business.
54) Carl again repeats the claim that Philip Davies got shut down because he's an MRA. Again Kevin points out this is bollocks, and that Davies did get his debate in a room where actually most of the debates take place within Westminster Hall. Carl attempts a pathetic fallacy of claiming Kevin doesn't care about male suicide, and Kevin again points out the debate actually took place and wasn't shut down at all. Carl alleges without evidence a "large number of attempts" to shut it down, but Kevin says this doesn't matter since it wasn't shut down and the debate happened and the system worked.
55) Carl alleges a "deliberate consequence of a network of feminists, that Jess Phillips talks about in her book, that deliberately go out of their way to shut down and block" various measures and debates, but Kristi again points out that in this instance Davies was simply treated equally to other Parliamentarians. Carl claims this is no different than if Republicans held whatever house and blocked Democratic proposals to get important things done, but Kristi again points out that Davies actually got to give his talk. Kevin points out that unlike Carl he has actually read the Hansard transcript of the debate and that it actually took place, and indeed that there were feminists there who took part in the debate. Carl again complains it wasn't in the main chamber and makes accusations of "stalling" by the feminists based on ideological reasons.
56) Kevin points out that Phillip Davies was one of the MPs who objected to the Upskirting Bill - which did take place in the main chamber - and he suggests that if this how Davies spends his time in the main chamber, then he doesn't deserve time in the main chamber and he should have his debates in other rooms where most debates take place just like everyone else. Carl tries to claim this is irrelevant, but it actually isn't because if one is a shit Parliamentarian, you can't expect entitlement for other Parliamentarians to take you seriously.
57) Kevin points out that there were lies told about Jess Phillips (a mother who has two sons) apparently laughing about male suicide, when in actuality she was laughing about the claim that male issues don't get talked about. Carl asks if Kevin thinks they do, to which Kevin replies in the affirmative in which he brings up an example of International Men's Day being debated in Parliament, and Kevin also highlights an old video on his channel about ICMI 2016 from his Descent of Manosphere series, in which Kevin uses screenshots from Hansard transcripts which show where male issues are directly referenced, including during a session of Prime Ministers Questions in which David Cameron addressed a question about false allegations of rape.
58) Carl claims there is "pushback" when these things are addressed, which Kevin points out is basic freedom of speech, and Carl again says that if Republicans were shutting down Democrat things then Kristi and Kevin would be complaining, again ignoring that nothing got shut down in this case.
59) Carl brings up corporations which have diversity officers, and asks who Kristi and Kevin think are running them and what their ideologies are. Kristi calls Carl out on the fact that all he's doing at this point is asking questions that she thought Carl would surely have the answers to, and that she thought he would actually be able to name all these people he had a problem with. Kristi points out that she'd have expected a list of at least 50 or 60 names that Carl could have brought up, and when Carl says that he's not an "inquisitor", Kristi compares his rhetoric to McCarthyism claiming a list of communists in the military but not actually showing who they actually are. Kevin points out that Carl has only been able to actually name one woman from the US (Cortez), and one woman from the UK (Phillips) which constitutes two women a continent apart from one another.
60) Oh it's Appeal to Incredulity Time as Carl asks how they can't see what's going on! He also whines about them apparently being immature for laughing at his tactics throughout the debate. They do compliment the parts of the discussion referenced earlier which actually seemed pretty insightful when they were talking about actual data, and they don't rule out another debate in future.
And that's it at the 1 hour 28 minute mark! But yeah Carl got absolutely destroyed here, and was even more exposed for being ridiculously paranoid and evidence-free on his claims.
I will reach out to Kristi Winters and Kevin Logan via Twitter with this recap, so that if I've reported anything inaccurately in this recap then through their feedback I can adjust my recap accordingly.
I've also stored this recap on a more permanent place on my newly created blogspot page: http://jon91919writes.blogspot.com/2018/11/the-kristi-winters-vs-carl-benjamin-ii.html
For those interested, I also did a recap of Sargon's debate with Jenni Goodchild in a post here a couple of years ago: https://np.reddit.com/GamerGhazi/comments/5a7pwh/revisiting_the_sargon_vs_jenni_goodchild_debate/
Hope you enjoy!
EDIT: Fixed some formatting issues.
submitted by J91919 to GamerGhazi [link] [comments]

Vault 7 release info from actual files

sorry for the mess. copy paste....
Press Release Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named "Vault 7" by WikiLeaks, it is the largest ever publication of confidential documents on the agency. The first full part of the series, "Year Zero", comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA's Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election. Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized "zero day" exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive. "Year Zero" introduces the scope and direction of the CIA's global covert hacking program, its malware arsenal and dozens of "zero day" weaponized exploits against a wide range of U.S. and European company products, include Apple's iPhone, Google's Android and Microsoft's Windows and even Samsung TVs, which are turned into covert microphones. Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA). The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force — its own substantial fleet of hackers. The agency's hacking division freed it from having to disclose its often controversial operations to the NSA (its primary bureaucratic rival) in order to draw on the NSA's hacking capacities. By the end of 2016, the CIA's hacking division, which formally falls under the agency's Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other "weaponized" malware. Such is the scale of the CIA's undertaking that by 2016, its hackers had utilized more code than that used to run Facebook. The CIA had created, in effect, its "own NSA" with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified. In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA's hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons. Once a single cyber 'weapon' is 'loose' it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike. Julian Assange, WikiLeaks editor stated that "There is an extreme proliferation risk in the development of cyber 'weapons'. Comparisons can be drawn between the uncontrolled proliferation of such 'weapons', which results from the inability to contain them combined with their high market value, and the global arms trade. But the significance of "Year Zero" goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective." Wikileaks has carefully reviewed the "Year Zero" disclosure and published substantive CIA documentation while avoiding the distribution of 'armed' cyberweapons until a consensus emerges on the technical and political nature of the CIA's program and how such 'weapons' should analyzed, disarmed and published. Wikileaks has also decided to redact and anonymise some identifying information in "Year Zero" for in depth analysis. These redactions include ten of thousands of CIA targets and attack machines throughout Latin America, Europe and the United States. While we are aware of the imperfect results of any approach chosen, we remain committed to our publishing model and note that the quantity of published pages in "Vault 7" part one (“Year Zero”) already eclipses the total number of pages published over the first three years of the Edward Snowden NSA leaks. Analysis CIA malware targets iPhone, Android, smart TVs CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA's DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details). The EDG is responsible for the development, testing and operational support of all backdoors, exploits, malicious payloads, trojans, viruses and any other kind of malware used by the CIA in its covert operations world-wide. The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell's 1984, but "Weeping Angel", developed by the CIA's Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization. The attack against Samsung smart TVs was developed in cooperation with the United Kingdom's MI5/BTSS. After infestation, Weeping Angel places the target TV in a 'Fake-Off' mode, so that the owner falsely believes the TV is off when it is on. In 'Fake-Off' mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server. As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations. The CIA's Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones. Infected phones can be instructed to send the CIA the user's geolocation, audio and text communications as well as covertly activate the phone's camera and microphone. Despite iPhone's minority share (14.5%) of the global smart phone market in 2016, a specialized unit in the CIA's Mobile Development Branch produces malware to infest, control and exfiltrate data from iPhones and other Apple products running iOS, such as iPads. CIA's arsenal includes numerous local and remote "zero days" developed by CIA or obtained from GCHQ, NSA, FBI or purchased from cyber arms contractors such as Baitshop. The disproportionate focus on iOS may be explained by the popularity of the iPhone among social, political, diplomatic and business elites. A similar unit targets Google's Android which is used to run the majority of the world's smart phones (~85%) including Samsung, HTC and Sony. 1.15 billion Android powered phones were sold last year. "Year Zero" shows that as of 2016 the CIA had 24 "weaponized" Android "zero days" which it has developed itself and obtained from GCHQ, NSA and cyber arms contractors. These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the "smart" phones that they run on and collecting audio and message traffic before encryption is applied. CIA malware targets Windows, OSx, Linux, routers The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized "zero days", air gap jumping viruses such as "Hammer Drill" which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( "Brutal Kangaroo") and to keep its malware infestations going. Many of these infection efforts are pulled together by the CIA's Automated Implant Branch (AIB), which has developed several attack systems for automated infestation and control of CIA malware, such as "Assassin" and "Medusa". Attacks against Internet infrastructure and webservers are developed by the CIA's Network Devices Branch (NDB). The CIA has developed automated multi-platform malware attack and control systems covering Windows, Mac OS X, Solaris, Linux and more, such as EDB's "HIVE" and the related "Cutthroat" and "Swindle" tools, which are described in the examples section below. CIA 'hoarded' vulnerabilities ("zero days") In the wake of Edward Snowden's leaks about the NSA, the U.S. technology industry secured a commitment from the Obama administration that the executive would disclose on an ongoing basis — rather than hoard — serious vulnerabilities, exploits, bugs or "zero days" to Apple, Google, Microsoft, and other US-based manufacturers. Serious vulnerabilities not disclosed to the manufacturers places huge swathes of the population and critical infrastructure at risk to foreign intelligence or cyber criminals who independently discover or hear rumors of the vulnerability. If the CIA can discover such vulnerabilities so can others. The U.S. government's commitment to the Vulnerabilities Equities Process came after significant lobbying by US technology companies, who risk losing their share of the global market over real and perceived hidden vulnerabilities. The government stated that it would disclose all pervasive vulnerabilities discovered after 2010 on an ongoing basis. "Year Zero" documents show that the CIA breached the Obama administration's commitments. Many of the vulnerabilities used in the CIA's cyber arsenal are pervasive and some may already have been found by rival intelligence agencies or cyber criminals. As an example, specific CIA malware revealed in "Year Zero" is able to penetrate, infest and control both the Android phone and iPhone software that runs or has run presidential Twitter accounts. The CIA attacks this software by using undisclosed security vulnerabilities ("zero days") possessed by the CIA but if the CIA can hack these phones then so can everyone else who has obtained or discovered the vulnerability. As long as the CIA keeps these vulnerabilities concealed from Apple and Google (who make the phones) they will not be fixed, and the phones will remain hackable. The same vulnerabilities exist for the population at large, including the U.S. Cabinet, Congress, top CEOs, system administrators, security officers and engineers. By hiding these security flaws from manufacturers like Apple and Google the CIA ensures that it can hack everyone &mdsh; at the expense of leaving everyone hackable. 'Cyberwar' programs are a serious proliferation risk Cyber 'weapons' are not possible to keep under effective control. While nuclear proliferation has been restrained by the enormous costs and visible infrastructure involved in assembling enough fissile material to produce a critical nuclear mass, cyber 'weapons', once developed, are very hard to retain. Cyber 'weapons' are in fact just computer programs which can be pirated like any other. Since they are entirely comprised of information they can be copied quickly with no marginal cost. Securing such 'weapons' is particularly difficult since the same people who develop and use them have the skills to exfiltrate copies without leaving traces — sometimes by using the very same 'weapons' against the organizations that contain them. There are substantial price incentives for government hackers and consultants to obtain copies since there is a global "vulnerability market" that will pay hundreds of thousands to millions of dollars for copies of such 'weapons'. Similarly, contractors and companies who obtain such 'weapons' sometimes use them for their own purposes, obtaining advantage over their competitors in selling 'hacking' services. Over the last three years the United States intelligence sector, which consists of government agencies such as the CIA and NSA and their contractors, such as Booze Allan Hamilton, has been subject to unprecedented series of data exfiltrations by its own workers. A number of intelligence community members not yet publicly named have been arrested or subject to federal criminal investigations in separate incidents. Most visibly, on February 8, 2017 a U.S. federal grand jury indicted Harold T. Martin III with 20 counts of mishandling classified information. The Department of Justice alleged that it seized some 50,000 gigabytes of information from Harold T. Martin III that he had obtained from classified programs at NSA and CIA, including the source code for numerous hacking tools. Once a single cyber 'weapon' is 'loose' it can spread around the world in seconds, to be used by peer states, cyber mafia and teenage hackers alike. U.S. Consulate in Frankfurt is a covert CIA hacker base In addition to its operations in Langley, Virginia the CIA also uses the U.S. consulate in Frankfurt as a covert base for its hackers covering Europe, the Middle East and Africa. CIA hackers operating out of the Frankfurt consulate ( "Center for Cyber Intelligence Europe" or CCIE) are given diplomatic ("black") passports and State Department cover. The instructions for incoming CIA hackers make Germany's counter-intelligence efforts appear inconsequential: "Breeze through German Customs because you have your cover-for-action story down pat, and all they did was stamp your passport"
Your Cover Story (for this trip) Q: Why are you here? A: Supporting technical consultations at the Consulate. Two earlier WikiLeaks publications give further detail on CIA approaches to customs and secondary screening procedures. Once in Frankfurt CIA hackers can travel without further border checks to the 25 European countries that are part of the Shengen open border area — including France, Italy and Switzerland. A number of the CIA's electronic attack methods are designed for physical proximity. These attack methods are able to penetrate high security networks that are disconnected from the internet, such as police record database. In these cases, a CIA officer, agent or allied intelligence officer acting under instructions, physically infiltrates the targeted workplace. The attacker is provided with a USB containing malware developed for the CIA for this purpose, which is inserted into the targeted computer. The attacker then infects and exfiltrates data to removable media. For example, the CIA attack system Fine Dining, provides 24 decoy applications for CIA spies to use. To witnesses, the spy appears to be running a program showing videos (e.g VLC), presenting slides (Prezi), playing a computer game (Breakout2, 2048) or even running a fake virus scanner (Kaspersky, McAfee, Sophos). But while the decoy application is on the screen, the underlaying system is automatically infected and ransacked. How the CIA dramatically increased proliferation risks In what is surely one of the most astounding intelligence own goals in living memory, the CIA structured its classification regime such that for the most market valuable part of "Vault 7" — the CIA's weaponized malware (implants + zero days), Listening Posts (LP), and Command and Control (C2) systems — the agency has little legal recourse. The CIA made these systems unclassified. Why the CIA chose to make its cyberarsenal unclassified reveals how concepts developed for military use do not easily crossover to the 'battlefield' of cyber 'war'. To attack its targets, the CIA usually requires that its implants communicate with their control programs over the internet. If CIA implants, Command & Control and Listening Post software were classified, then CIA officers could be prosecuted or dismissed for violating rules that prohibit placing classified information onto the Internet. Consequently the CIA has secretly made most of its cyber spying/war code unclassified. The U.S. government is not able to assert copyright either, due to restrictions in the U.S. Constitution. This means that cyber 'arms' manufactures and computer hackers can freely "pirate" these 'weapons' if they are obtained. The CIA has primarily had to rely on obfuscation to protect its malware secrets. Conventional weapons such as missiles may be fired at the enemy (i.e into an unsecured area). Proximity to or impact with the target detonates the ordnance including its classified parts. Hence military personnel do not violate classification rules by firing ordnance with classified parts. Ordnance will likely explode. If it does not, that is not the operator's intent. Over the last decade U.S. hacking operations have been increasingly dressed up in military jargon to tap into Department of Defense funding streams. For instance, attempted "malware injections" (commercial jargon) or "implant drops" (NSA jargon) are being called "fires" as if a weapon was being fired. However the analogy is questionable. Unlike bullets, bombs or missiles, most CIA malware is designed to live for days or even years after it has reached its 'target'. CIA malware does not "explode on impact" but rather permanently infests its target. In order to infect target's device, copies of the malware must be placed on the target's devices, giving physical possession of the malware to the target. To exfiltrate data back to the CIA or to await further instructions the malware must communicate with CIA Command & Control (C2) systems placed on internet connected servers. But such servers are typically not approved to hold classified information, so CIA command and control systems are also made unclassified. A successful 'attack' on a target's computer system is more like a series of complex stock maneuvers in a hostile take-over bid or the careful planting of rumors in order to gain control over an organization's leadership rather than the firing of a weapons system. If there is a military analogy to be made, the infestation of a target is perhaps akin to the execution of a whole series of military maneuvers against the target's territory including observation, infiltration, occupation and exploitation. Evading forensics and anti-virus A series of standards lay out CIA malware infestation patterns which are likely to assist forensic crime scene investigators as well as Apple, Microsoft, Google, Samsung, Nokia, Blackberry, Siemens and anti-virus companies attribute and defend against attacks. "Tradecraft DO's and DON'Ts" contains CIA rules on how its malware should be written to avoid fingerprints implicating the "CIA, US government, or its witting partner companies" in "forensic review". Similar secret standards cover the use of encryption to hide CIA hacker and malware communication (pdf), describing targets & exfiltrated data (pdf) as well as executing payloads (pdf) and persisting (pdf) in the target's machines over time.
CIA hackers developed successful attacks against most well known anti-virus programs. These are documented in AV defeats, Personal Security Products, Detecting and defeating PSPs and PSP/DebuggeRE Avoidance. For example, Comodo was defeated by CIA malware placing itself in the Window's "Recycle Bin". While Comodo 6.x has a "Gaping Hole of DOOM". CIA hackers discussed what the NSA's "Equation Group" hackers did wrong and how the CIA's malware makers could avoid similar exposure. Examples The CIA's Engineering Development Group (EDG) management system contains around 500 different projects (only some of which are documented by "Year Zero") each with their own sub-projects, malware and hacker tools. The majority of these projects relate to tools that are used for penetration, infestation ("implanting"), control, and exfiltration. Another branch of development focuses on the development and operation of Listening Posts (LP) and Command and Control (C2) systems used to communicate with and control CIA implants; special projects are used to target specific hardware from routers to smart TVs. Some example projects are described below, but see the table of contents for the full list of projects described by WikiLeaks' "Year Zero". UMBRAGE The CIA's hand crafted hacking techniques pose a problem for the agency. Each technique it has created forms a "fingerprint" that can be used by forensic investigators to attribute multiple different attacks to the same entity. This is analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible. As soon one murder in the set is solved then the other murders also find likely attribution. The CIA's Remote Devices Branch's UMBRAGE group collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation. With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the "fingerprints" of the groups that the attack techniques were stolen from. UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques. Fine Dining Fine Dining comes with a standardized questionnaire i.e menu that CIA case officers fill out. The questionnaire is used by the agency's OSB (Operational Support Branch) to transform the requests of case officers into technical requirements for hacking attacks (typically "exfiltrating" information from computer systems) for specific operations. The questionnaire allows the OSB to identify how to adapt existing tools for the operation, and communicate this to CIA malware configuration staff. The OSB functions as the interface between CIA operational staff and the relevant technical support staff. Among the list of possible targets of the collection are 'Asset', 'Liason Asset', 'System Administrator', 'Foreign Information Operations', 'Foreign Intelligence Agencies' and 'Foreign Government Entities'. Notably absent is any reference to extremists or transnational criminals. The 'Case Officer' is also asked to specify the environment of the target like the type of computer, operating system used, Internet connectivity and installed anti-virus utilities (PSPs) as well as a list of file types to be exfiltrated like Office documents, audio, video, images or custom file types. The 'menu' also asks for information if recurring access to the target is possible and how long unobserved access to the computer can be maintained. This information is used by the CIA's 'JQJIMPROVISE' software (see below) to configure a set of CIA malware suited to the specific needs of an operation. Improvise (JQJIMPROVISE) 'Improvise' is a toolset for configuration, post-processing, payload setup and execution vector selection for survey/exfiltration tools supporting all major operating systems like Windows (Bartender), MacOS (JukeBox) and Linux (DanceFloor). Its configuration utilities like Margarita allows the NOC (Network Operation Center) to customize tools based on requirements from 'Fine Dining' questionairies. HIVE HIVE is a multi-platform CIA malware suite and its associated control software. The project provides customizable implants for Windows, Solaris, MikroTik (used in internet routers) and Linux platforms and a Listening Post (LP)/Command and Control (C2) infrastructure to communicate with these implants. The implants are configured to communicate via HTTPS with the webserver of a cover domain; each operation utilizing these implants has a separate cover domain and the infrastructure can handle any number of cover domains. Each cover domain resolves to an IP address that is located at a commercial VPS (Virtual Private Server) provider. The public-facing server forwards all incoming traffic via a VPN to a 'Blot' server that handles actual connection requests from clients. It is setup for optional SSL client authentication: if a client sends a valid client certificate (only implants can do that), the connection is forwarded to the 'Honeycomb' toolserver that communicates with the implant; if a valid certificate is missing (which is the case if someone tries to open the cover domain website by accident), the traffic is forwarded to a cover server that delivers an unsuspicious looking website. The Honeycomb toolserver receives exfiltrated information from the implant; an operator can also task the implant to execute jobs on the target computer, so the toolserver acts as a C2 (command and control) server for the implant. Similar functionality (though limited to Windows) is provided by the RickBobby project. See the classified user and developer guides for HIVE.
Frequently Asked Questions Why now? WikiLeaks published as soon as its verification and analysis were ready. In Febuary the Trump administration has issued an Executive Order calling for a "Cyberwar" review to be prepared within 30 days. While the review increases the timeliness and relevance of the publication it did not play a role in setting the publication date. Redactions Names, email addresses and external IP addresses have been redacted in the released pages (70,875 redactions in total) until further analysis is complete. Over-redaction: Some items may have been redacted that are not employees, contractors, targets or otherwise related to the agency, but are, for example, authors of documentation for otherwise public projects that are used by the agency. Identity vs. person: the redacted names are replaced by user IDs (numbers) to allow readers to assign multiple pages to a single author. Given the redaction process used a single person may be represented by more than one assigned identifier but no identifier refers to more than one real person. Archive attachments (zip, tar.gz, ...) are replaced with a PDF listing all the file names in the archive. As the archive content is assessed it may be made available; until then the archive is redacted. Attachments with other binary content are replaced by a hex dump of the content to prevent accidental invocation of binaries that may have been infected with weaponized CIA malware. As the content is assessed it may be made available; until then the content is redacted. The tens of thousands of routable IP addresses references (including more than 22 thousand within the United States) that correspond to possible targets, CIA covert listening post servers, intermediary and test systems, are redacted for further exclusive investigation. Binary files of non-public origin are only available as dumps to prevent accidental invocation of CIA malware infected binaries. Organizational Chart The organizational chart corresponds to the material published by WikiLeaks so far. Since the organizational structure of the CIA below the level of Directorates is not public, the placement of the EDG and its branches within the org chart of the agency is reconstructed from information contained in the documents released so far. It is intended to be used as a rough outline of the internal organization; please be aware that the reconstructed org chart is incomplete and that internal reorganizations occur frequently. Wiki pages "Year Zero" contains 7818 web pages with 943 attachments from the internal development groupware. The software used for this purpose is called Confluence, a proprietary software from Atlassian. Webpages in this system (like in Wikipedia) have a version history that can provide interesting insights on how a document evolved over time; the 7818 documents include these page histories for 1136 latest versions. The order of named pages within each level is determined by date (oldest first). Page content is not present if it was originally dynamically created by the Confluence software (as indicated on the re-constructed page). What time period is covered? The years 2013 to 2016. The sort order of the pages within each level is determined by date (oldest first). WikiLeaks has obtained the CIA's creation/last modification date for each page but these do not yet appear for technical reasons. Usually the date can be discerned or approximated from the content and the page order. If it is critical to know the exact time/date contact WikiLeaks. What is "Vault 7" "Vault 7" is a substantial collection of material about CIA activities obtained by WikiLeaks. When was each part of "Vault 7" obtained? Part one was obtained recently and covers through 2016. Details on the other parts will be available at the time of publication. Is each part of "Vault 7" from a different source? Details on the other parts will be available at the time of publication. What is the total size of "Vault 7"? The series is the largest intelligence publication in history. How did WikiLeaks obtain each part of "Vault 7"? Sources trust WikiLeaks to not reveal information that might help identify them. Isn't WikiLeaks worried that the CIA will act against its staff to stop the series? No. That would be certainly counter-productive. Has WikiLeaks already 'mined' all the best stories? No. WikiLeaks has intentionally not written up hundreds of impactful stories to encourage others to find them and so create expertise in the area for subsequent parts in the series. They're there. Look. Those who demonstrate journalistic excellence may be considered for early access to future parts. Won't other journalists find all the best stories before me? Unlikely. There are very considerably more stories than there are journalists or academics who are in a position to write them.
submitted by JonBendini to conspiracy [link] [comments]

Weekly Roundup | Random Chat | Notifications

News roundup for the previous week.
In International news
  1. Thai PM Set to Speed Up #Thailand China Railway Project: -speed train project between Bangkok and Nakhon Ratchasima province is part of the rail project primarily designed to link southwest China's Yunnan province with northeastern Thailand via northern Laos
  2. It's unfair to single out Chinese-Australians on political donations | Jieh-Yung Lo | Australia news
  3. It is believed the commander of the Fitzgerald and people found liable will be punished. We hope all US warships in the West Pacific should draw a lesson from the incident, not only for their own safety, but also for the peace of the sea passages in the region.
  4. Chinese citizen shot dead in Laos: The Chinese embassy has asked the Lao side to break the case as soon as possible, punish the assailants while taking effective measures to ensure safety of Chinese citizens and institutions in Laos
  5. China travel agencies and Crimea
  6. Presidential Political and Media Advisor Bouthaina Shaaban discussed on Saturday with China’s Special Envoy to Syria Xie Xiaoyan and the accompanying delegation enhancing the relations between the two countries.
  7. Chinese National Games invites overseas Chinese athletes for first time
  8. "While I greatly appreciate the efforts of President Xi & China to help with North Korea, it has not worked out. At least I know China tried!" - Donald Trump (lmao)
  9. Trump Announces He's Cancelling Obama's 'Completely One-Sided Deal With Cuba' (How can China trust any agreement with the U.S. if every change in government there is this possibility?)
  10. US says China should contribute more to fight against terror
  11. AIIB approves Argentina, Madagascar and Tonga as new members
  12. Germany Warns U.S. Against Ceding Lead Role to China, Russia: Wolfgang Schaeuble, Germany’s veteran finance minister, urged the U.S. to limit Russian and Chinese influence or risk bringing about “the end of our liberal world order.”
  13. Paris climate deal would have given India and China free pass: Mike Pence
  14. Spotlight: China, U.S. hold "constructive and fruitful" dialogue on diplomatic, security issues
  15. Ex-CIA officer charged with spying for China
  16. China's Growing Influence On Middle East Shouldn't Be Lost On An Impulsive Trump Administration. If Washington resorts to simplified, binary decision making regarding complex, multifaceted issues, it will be out maneuvered by Beijing
  17. Russia-China rivalry in Central Asia overblown: view of a "lingering rivalry between Russia and China" often overlooks the transparent dialogue. Russia's rather bilateral relationship with Central Asia, with a focus on security-related issues, does not conflict with China's trade projects
  18. China’s encroachment into Latin America: The Beijing regime seeks to undercut traditional American influence in the hemisphere. China places a priority on strengthening Latin America’s anti-democrats and is using its growing economic power in the region to expand its strategic options
  19. Chinese community reacts to ABC-Fairfax political donations series
  20. U.S. navy (w/ congress' support) strives to maintain dominance over China
  21. Panamanian President, Juan Carlos Varela, discusses renewed relations with China
  22. China Pushes U.S. Aside in Pakistan: “The Chinese are winning the perceptions game, whatever the reality. That then leads to political outcomes, because people see the inevitability of China’s rise and China’s power,” said Ely Ratner of the Council on Foreign Relations
In Domestic news
  1. China’s PLA ‘to play bigger role in boosting Hong Kong patriotism’
  2. From pig farmer to one of China’s highest-paid online authors: Li Zhi
  3. Increasingly Affluent Chinese Want Healthier Food and that Has Big Implications for Meat Producers
  4. Hong Kong youths turn their backs on Chinese identity: survey - Only 3.1 percent of Hong Kong youths identify themselves as "Chinese", a historic low, as the former British colony prepares to celebrate the 20th anniversary of its return to Chinese rule, a poll released on Tuesday suggests.
  5. Toothpick crossbow craze has China quivering
  6. Green finance to help reduce pollution, boost industrial upgrading
  7. China to levy 100% tax on overseas football transfers - China will effectively double the cost for its clubs to buy foreign football players in a move aimed at slowing the influx of pricey overseas stars and encouraging homegrown talent
  8. Chinese public criticizes calls from UN to take refugees
  9. Hong Kong leader Carrie Lam on claims China is tightening its grip: "Give us the evidence"
  10. China's Xi visit to Hong Kong confirmed: report
  11. More than 140 missing after landslide engulfs mountain village in China
  12. earthrise - China's Transport Revolution
  13. Chinese Bankers Flock to Hong Kong as Expats Retreat: scores of mainland professionals are filling the elite financial ranks of Hong Kong, while a series of lay-offs at Western banks has led to an exodus of expatriates
In SciTech news
  1. Quantum internet: China smashes record for beaming entangled particles
  2. China's two supercomputers still world's fastest as U.S. squeezed out of 3rd place
  3. Chinese scientists to grow potatoes on the moon: will be sealed inside a "mini ecosystem" as part the Chang'e-4 mission due to launch next year
  4. Traditional Chinese medicine might be effective as a complement or alternative to traditional Western medicine for primary and secondary prevention of heart disease, according to a state of the art review paper published in the Journal of the American College of Cardiology
  5. China successfully launches x-ray satellite: will search the sky for black holes, neutron stars, and other extremely energetic phenomena. Last of four missions covered under China’s 12th 5-year plan. Other three are a dark matter probe, microgravity experiments, and long-range quantum entanglement
  6. China's first cargo spacecraft, Tianzhou-1, has successfully completed its second refuelling of the Tiangong-2 space lab in orbit, further proving a process being tested as part of plans for a large, modular space station
  7. China's Three Major Telecom Operators Will Start #5G Pre-Commercial Deployment Within Two Years: China Unicom will consider selecting two to four cities to carry out technology and network verification of 5G in the second half of this year
  8. China now ranks as the most influential country in 4 of 8 core scientific fields, tying with the U.S., according to the Japan Science and Technology Agency. Computer science, mathematics, materials science and engineering. "I was not expecting China to overtake the U.S. in many fields" said Yuko Ito
  9. Tech giants in China convene for one day to share their plans
  10. China propels rise of electric ultra-high-performance cars
  11. Meet the Chinese Finance Giant That’s Secretly an AI Company: The smartphone payments business Ant Financial is using computer vision, natural language processing, and mountains of data to reimagine banking, insurance, and more
  12. China's big investment, "brain gains" lead to scientific breakthroughs: From world's largest radio telescope, collecting samples of combustible ice, to the successful transmission of "entangled" photon pairs from space, achievements made by Chinese scientists have been drawing worldwide attention
  13. In China, a robot has started delivering packages to people
  14. China cracks down on fake peer reviews - Funding agencies announce harsh penalties and stronger policing efforts.
  15. In 2015, China's biomedical research teams ranked No. 4 on the top 10 list for the total number of new discoveries published in six top-tier journals. In 2000, China didn't even make the top 10 - JCI Insight. China spent 75% of what the U.S. spent on total R&D in 2015. In 2000, China spent 12%
  16. Piezoelectric nanogenerators for self-powered flexible sensors: small size factor, simple structure, and long-term stability make them favorable for use in powering micro/nanosystems, various small power consumer devices, remote and mobile sensors, and even wearable wireless electronics
  17. Hyundai partners with Baidu in car navigation system: Navigation systems equipped in Hyundai cars sold in China will feature the Baidu MapAuto and Duer OS Auto systems
  18. Scientists from several U.S. and Chinese universities say new findings about microbes and their interaction with other species show that Darwin's theory of evolution needs an update
In Economic news
  1. Tesla nearing deal to build factory in China, but will need to partner with local producer to do so. Is this a way for China to acquire IP? China is not keen to easily give away key markets, especially electric cars. is this a trojan horse strategy?
  2. Foreign investors bet billions on China blue-chips joining MSCI index
  3. Multinationals losing battle for Chinese consumers
  4. Chinese theme parks dominate top 20 in Asia-Pacific ranking: Although Japanese parks took the top three spots, Chinese destinations filled out 11 of the top 20 in the Asia-Pacific ranking
  5. US President Donald Trump has forced the American car giant Ford to shift production from Mexico, to China.
  6. China applying for more patents than ever before as companies push to innovate, protect brands: Enforcement via litigation can only occur if a patent is in force. Although around a quarter of all patents in force in 2015 were in the US, China’s share is growing fast, almost 1.5m from 600,000 in 2010
  7. Building stronger brands will boost China's image
  8. Ford's Signal to the Auto World: Here Comes China
  9. Chinese factories are eagerly enlisting robots to address worker shortages and automation needs, prompting Japanese manufacturers to scramble to boost output
  10. Russia offers China joint development of engines for civil aviation: “We proposed to the Chinese that we jointly create an engine for a long-haul aircraft based on the Russian PD-14 engine," Rostec spokesperson Viktor Kladov told RIA Novosti
  11. Is China the Most Protectionist Country? No, Not By a Long Shot
  12. Inevitable Chinese slowdown 'a myth'
  13. West should be more concerned with its debts than China’s
  14. Western brands risk alienating China’s young consumers with campaigns that play to Western clichés. If you compare metro systems, China’s is not only more modern, it is cleaner, faster and on time. That’s why Chinese milleninals find it frustrating to see China painted only with a prism of the past
  15. Jack Ma: This is what to study if you want a high-paying job in the future
  16. Chinese salaries has increased a lot duing the last decade
  17. Chinese electric bus firm staying out of North America
In Military news
  1. Chinese military is officially recognizing the existence of the new Chinese ZTQ and has even given it a name; Xinqingtan. The ZTQ was designed for rough, mountainous terrain as found in Tibet and the mountainous jungles on Vietnamese border
  2. A more loyal PLA rebuffs the heresy of separating the Party and military
  3. China to set up military bases in Pakistan - Pentagon report
  4. China, #Finland willing to advance military cooperation: Niinisto said Finland highly values the collaboration with China in various areas including national defense and military, and is willing to work with Chinese partners to further develop the relations between the armies of the two sides
  5. American and Chinese aircraft could be flying 4,000 miles per hour by 2030: CASIC debuted the Teng Yun spacecraft design during the Global Space Exploration 2017. CASC's hypersonic spaceplane, announced in August 2016. Its engine and other critical technology are slated for completion by 2020
  6. China 'deploys submarine-hunting aircraft to South China Sea' in defiance of US warnings
  7. China may have the world’s most powerful submarine detector
Other Notables
  1. Does the current Chinese leadership make offerings at the Mausoleum of the Yellow Emperor? (as Qin Shi Huang to Mao Ze Dong did)
  2. Cultural confidence plays vital role in China’s further development
  3. Dress show combining traditional and contemporary styles held at princely mansion
  4. The Glory of Daming Palace
  5. A total of 73.7 percent of people support providing Good Samaritans with rewards when they take a stand against injustice, according to a survey conducted by the Social Survey Center of China Youth Daily and online survey platform Wenjuan.com
  6. Western hypocrisy and historical revisionism regarding Hong Kong
  7. Lin Shan Ju – Homophobic Taiwanese White Supremacist and Ex-Candidate of the One Nation Party
  8. Master Jiang and the Six Kingdoms (Release 2018)
  9. Contact Fairfax Directly and Protest at their mistreatment of the Australian Chinese Community
  10. Pamela Anderson promised to write a love letter to the nation of China and visit the country if the Chinese government and people supported Assange’s release (we have to get this most important of news to President Xi)
  11. Little Hong Kong girl with a big voice handles pressure and critics with aplomb, father says: Family support behind why nine-year-old Celine Tam Tsz-kwan has the confidence of an adult superstar. “We as parents are just trying hard to give her the best of what she has always wanted,” Steve Tam
  12. Beijing strengthens protection of historical buildings: This year, Xicheng and Dongcheng districts in the center of the city will take measures to relocate current residents from 26 historical buildings, such as ancient guild halls, temples, and former residences of historical figures
  13. Zeus can throw lightning bolts, Yahweh (the Christian God) causes mega floods, but what does the Jade Emperor have in terms of supernatural powers?
  14. Making the OnePus 5
  15. Is there someone who will always hold your hand, regardless of old age or disease, until death do you apart?
  16. Samples of sea cucumbers collected by China's manned submersible Jiaolong after its dive in Yap Trench
  17. Little Orphan Island on the Yangtze River, 1870s
  18. Voice of China: US should look in the mirror before lecturing the world on human rights
  19. The Swiss Witnesses to China’s Cultural Revolution
  20. Forever Chang’an
  21. Voice of China: US should look in the mirror before lecturing the world on human rights
  22. Determined actions to frustrate the imperial machinations of the US on the ground should be matched with strong words. The China-Russia nexus must not only articulate their vision for a new international order but also expose the hurdles that stand in its way without mincing any words.
  23. Review: Wait, Was That Confucius? PBS’s Rushed ‘Story of China’
  24. Butt hurt writer is angry at Europeans for observing Chinese sovereignty
  25. Chinese - The Sinitic Languages
  26. Newsweek Ponders: how separate is hong kong to china?
  27. How Russians succeed in Chinese Kung fu
  28. Biography of Yellow Turban leader Bo Cai
  29. He Was Bullied as a Kid For Being Chinese, Now He's the Black Power Ranger
  30. Good books on Chinese politics?
  31. Warning: Graphic Images Whales massacred by locals on beach in Faroe Islands (I sure hope Chinese media reported this story for the reasons I think they should)
  32. Today: Sino-Soviet split, June 22 Remember: every day is history.
  33. The Forbidden City
  34. Father and daughter run for challenge: Running together has allowed Tian and his daughter to spend time with each other, as well as enable them to stay physically fit, while inspiring family and friends to do the same
  35. How China’s fearsome Tiger Dads found their way back into fashion: Strict fathers are winning support as society resists rising Western influence to embrace traditional Chinese parenting style
  36. 30 Story Building In China Built In 15 Days Time Lapse
  37. How Western Fake News Took Over China’s Social Media
  38. Where Stories of Peaceful Coexistence Are Written in Stone
  39. Body Folding Kung Fu With a Master
  40. Panama's Diplomatic Switch from ROC to PRC has everything to do with PRC's previous plan to fund and build the "Nicaragua Canal", which was announced in May 2017 to be either "paralyzed, or nonexistent" (I.e. PRC Threatened to end Panama Canal's monopoly in the region, and Panama caved)
  41. Spouts of Fury: When Tea and Kung Fu Collide
  42. The Art of Making 9-Foot Noodles by Hand
  43. Shaolin Temple Kung Fu Academy, Mount Song, Henan
  44. Translation of Cheng Pu's official SGZ biography
  45. What do you guys think about the Tui Bei Tu? (prophecy in China)
  46. DJI - SkyPixel - A New Way Up
  47. Someone spent 2 years painstakingly replicating China's Forbidden City in 'Minecraft': The team was led by 22-year-old Su Yijun from Guangzhou, who orchestrated the plan from scratch in 2014
  48. Fairy Footsteps in Green land
  49. So what is the Chinese Equivalent of 4chan/8chan?
  50. China’s old Silk Road revival: hi-speed trains, massive skyscrapers and free-trade zones
  51. Classic Chinese Music II [不裝飾你的夢]
  52. Female pilots fly JH-7 fighter bombers
  53. Qing Dynasty vase breaks Irish record at auction: was sold for $825,000 at Sheppard's auction in Ireland. The item is believed to date from the reign of the Qianlong Emperor, the fourth emperor of the dynasty, who lived between 1711 and 1799
  54. GT editorial: Dialogue may lead to better ties if Trump can ignore US media criticism
  55. Mongols/Yuan should be considered Chinese or not...?
  56. A 7-year-old Romanian girl named Nana wows Chinese judges with fluent Chinese song
  57. California looks to build high-speed rail in cooperation with China
submitted by AutoModerator to Sino [link] [comments]

Binary.com e confiavel bot free usa como funciona option ... Simple CCI Strategy Along With Martingale  99% Winning Trick  Binary Option Strategy 10 Trade Review The top Binary Option Touch/No Touch binary Option Accurate strategy  99% winning ratio  Binary Option Trading Iq option trading strategy EZTrader - Binary Options Trading Most profitable strategy for binary option ($35,000 in 30 mins) BINARY OPTIONS TRADING - Best Binary Options Strategy 2020 Stockpair Review The best Binary Option

Präsidentenwahl 2016 8211 Auswirkungen auf US-Vermögenswerte Veröffentlicht am 10. Juli 2016 von Andrew Vargas Präsidentenwahl-Effekt auf de... Presidential Election 2016 – Effect on US Assets. Published on July 10, 2016 by Andrew Vargas Presidential Election effect on the Markets. Which U.S. Presidential Candidate does Wall Street want to win? Presidential candidates make lofty promises. They promise that their policies are the best way to make America great again. But when politicians promise change, they don’t know how to ... Le opzioni binarie.selezione dei migliori broker per opzioni binarie.opzioni.lorenzo opzioni binarie democratic socialism binary options signalen.opzioni binarie guadagni reali hote funzionano le opzioni binarie com opzioni binarie per ipad tobin tax su opzioni.. Conoscenza di.trading di opzioni binarie con.cerchi opzioni binarie online.condividi post. Schedule presidential.trova i best broker opzioni binarie per te.perfectite fare.binary trading forex quotes zip u binary options.cerchi opzioni binarie online.non esistono neanche trucchi per.conto prova opzioni binarie democratic debate 2016: 645: likes.guide will opzioni binarie.b.i trucchi per opzioni binarie non esistono.questi broker pagano direttamente le tasse.le opzioni binarie ... All ads.trucchi e consigli per il trading di opzioni binarie.opzioni binarie in italia piattaforme trading opzioni binarie strategie opzioni.no tags.sem categoria.binary options trading in united states democratic primary 2016.binarie democratic convention.le opzioni binarie sono uno strumento finanziario.votato dagli utentipany info: optionbit is a binary options trading platform provider ... Larson&Holz to cancel binary options trading. Larson&Holz will introduce a number of precaution measures, including temporary cancellation of trading in binary options and of pending orders in case of fast price changes and gaps. The broker will also restrict the amount of opened positions and total volume of opened deals. As for margins, the broker said minimum required rates may be doubled ... No one could have predicted the 2017 boom back in 2016. Considering all of the above, one wonders what will happen in the next four years? Can any predictions be made? Bitcoin’s Price Since Last U.S. Presidential Election. Since the last U.S. election in November 2016, Bitcoin was about 7% of its current value. Just imagine what detractors ... Data firms are working to sure up their analyzation techniques this year in order to improve their accuracy when the race for the White House heats up in 2016. Candidates will want to target ... Trading.broker opzioni binarie.binary options trading in united states democratic primary 2016.scopri i benefici dele fare.our revolutionary binary options trading platform. Sistema software 2017 fare soldi con il trading opzioni binarie.quantum code italianoitaly quantum code di michael crawford.pratica con opzioni binarie democratic presidential candidates.truffe trading soldi opzioni ... The 2016 US election had a big divide on candidates’ differences on regulation. Clinton was viewed as more pro-regulation of businesses and Trump more toward deregulation. Traders believed the heavily regulated energy and financial sectors would benefit from his presidency.

[index] [6788] [20225] [12940] [28243] [7283] [12379] [23591] [3344] [22958] [4052]

Binary.com e confiavel bot free usa como funciona option ...

binary Option demo Edition of binary Option trading platform serves as a good way for traders to get to be aware of platform much better and use it for exercise to realize extra confidence in ... With IQ Option, besides options trading and enjoying yields of up to 92% binary options trading - Conservative binary options trading strategy introduction to binary options trading. Freedom ... If you are interested in participating in the profitable world of binary options trading, is the 10 generous yields of up to 81% and total asset portfolio should capture their attention. Whether ... Most profitable strategy for binary option ever Tutorial with an example. Please dont forget to hit like and share. Post your question in the comment. Subscribe for more exciting secret strategies. Trick Rise Fall Binary 2016, Trick Rise Fall Binary, Trading Digit, Digit Trading, Binary Digit Match, Trick Digits Binary, Trick Digits Matches, Trick Digits Differs, Trick Digits Match, Trick ... Quitting binary option and pausing your trading with the markets basically because of recent failures? Well I was at the verge of giving up but on the other hand I understood that giving up wasn't ... Trading Platform: Stock Par seems in a league of its own, as its only operations platforms for binary options and few options in the industry appear to be unmatched. Within the trading platform ... Binary options safe trading No touch Strategy 100% Winning - Duration: 8:37. Binary Options Forex Trading Make Money Online Tips 8,685 views EZTrader has recently launched an enhance & innovative mobile trading application for Smartphones & tablets, enabling you to trade anytime, anywhere, and making trading binary options even simpler... Trick Rise Fall Binary 2016, Trick Rise Fall Binary, Trading Digit, Digit Trading, Binary Digit Match, Trick Digits Binary, Trick Digits Matches, Trick Digits Differs, Trick Digits Match, Trick ...

http://binaryoptiontrade.fecranyzo.tk