CIA UMBRAGE Project DESTROYS Democrat’s Credibility on Russia

cia umbrage

Tuesday saw the release of one of the largest troves of CIA documents from Wikileaks yet.  Dubbed “Vault 7” the treasure trove of classified files and documents has triggered speculation that there’s another Snowden within the U.S. government.  Vault 7 also reveals the disturbing methods that the CIA has for spying on you using your cell phone, your Samsung Smart TV, or even your car.  One of the most interesting things contained in these documents, however, are details about a secret CIA project known as UMBRAGE.

Vault 7 describes UMBRAGE as:

The CIA’s hand crafted hacking techniques pose a problem for the agency. Each technique it has created forms a “fingerprint” that can be used by forensic investigators to attribute multiple different attacks to the same entity.

This is analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible. As soon one murder in the set is solved then the other murders also find likely attribution.

The CIA’s Remote Devices Branch‘s UMBRAGE group collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.

With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from.

UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.

In essence the programs and techniques collected by UMBRAGE allows the U.S. government to hack anything, anytime, anywhere…and they can blame the hack on just about anyone they want.  Consequences?  Who needs to worry about consequences when you can hack your allies and blame your enemies?  Need some information on a British official?  Hack his computer, but do it with an Iranian program.  Once the Brits figure out their man has been hacked they’ll be lead straight to the mullahs’ doorstep.  Worried about the geopolitical consequences of hacking one of your enemies?  Why bother wasting the skull sweat on that when you can hack them and blame THEIR enemies for it?  Hack the hell out of Iran and send the tech-savvy Islamists on a wild goose chase that ends at Kim Jong Un’s not-so-secret “hidden” Japanese tentacle porn folder.  You’ve stirred up trouble between two bad hombres, plus have the added bonus of having cause some jihadists to claw their own eyes out with their finger nails in disgust and horror.

cia umbrage porn
A folder labeled “Definitely NOT Japanese Tentacle Porn?” C’mon, Kim…

What’s that?  You want to delegitimize a certain incoming President of the United States of America?  Want to set him up as a traitor to his country that conspired with Russia to steal the election from poor, old, grandmotherly Hillary Clinton?  Easy peasy.  All you need to do is get your party cronies and the sycophants in the news media to concoct a story about said candidate’s deep ties to various Russian officials.  Once you’ve done that you’ll need to start accusing Russia of attempting to influence the election on behalf of that candidate.  The media will twist that story until it goes from “Russia influenced the election” to “Russia HACKED the election.”  The next step is to call on Congress to investigate what could possibly be the worst scandal of any president EVER.  At the very least it would be grounds for impeachment.

Once the investigation gets going all you’ll need to do is arrange for the committee to find “evidence” of Russia hacking election machines, campaign and party computers, etc.  Of course you know that the entire story’s bogus.  The Russians didn’t have any influence on the election.  They certainly didn’t HACK anything having anything to do with the election either.  That’s why you have the CIA use their personnel to hack a few key election-related items.  All they need to do is use some of the UMBRAGE project’s “borrowed” techniques to point the finger squarely at the Russians.  It’s just that easy!

Easier than getting your ass beat by a hooker!

Wikileaks has, in one fell swoop, utterly and completely destroyed the Democrat’s lies that Trump and the Russians hacked the election.  The Democrats-and some Republicans-have been insisting for months that we MUST investigate any allegations of Russia hacking influencing our elections.  Because otherwise democracy is dead or something.  Except what’s the point of investigating anything when the CIA can literally manufacture the evidence the Democrats would need to prove Russian hacking in the first place?  UMBRAGE virtually guarantees that there WOULD be evidence of Russian hacking precisely because the CIA itself can make that evidence up!  How could we trust the integrity of any evidence that an investigation might uncover?

Quite simply put, we can’t.  There is absolutely no way that we can trust that any investigation into Russia hacking the election would be fair and impartial.  Especially in light of the latest revelations from Wikileaks.  Any evidence that might turn up could easily have been fabricated by the CIA.  Using the results of any such investigation to remove Trump as president, or retaliate against the Russians would not just be irresponsible, it would be criminal.  I’d daresay even treasonous.  This fact needs to be thrown back in the faces of every liberal whenever they cry about Russia hacking the election for Trump.  One cannot honestly call for an open and fair investigation in light of the fact that UMBRAGE exists.

Once again, it would seem that Wikileaks has struck a blow for the people against the globalist establishment.  No wonder Assange is the Left’s public enemy number one.

Comment Rules

1) No doxxing. Violators of Rule 1 will have commenting privileges revoked.

2) No death threats.

3) No nudity/pornography.

4) Spamming of a product or service is not allowed and will result in an immediate revoking of commenting privileges.

5) Keep off topic discussion to open threads or the forums