Group of DNC hack victims sue Trump campaign – CNN

The lawsuit, led by the group United to Protect Democracy, filed on Wednesday would pit three Democratic donors against President Donald Trump's campaign and Stone, his longtime confidant. The complaint asserts that alleged coordination between the Trump campaign, Stone and "Russian government agents" led to the WikiLeaks release of the hacked DNC information.

Although WikiLeaks published the hacked information, the lawsuit does not target WikiLeaks, instead targeting the Trump campaign and Stone alone.

An attorney for Stone said that as of Wednesday he had not seen the lawsuit or been served -- but that he expects the suit to be quickly dismissed.

"Based on what has been described to him, Mr. Stone states unequivocally that the suit is without merit, is blatantly untruthful and not supported by one stitch of evidence," attorney Grant Smith said in a statement. "Mr. Stone and his legal team believe this will be summarily dismissed when the matter is taken out of the political arena and left to the judiciary."

The statement said those who brought the suit should "suffer the severe sanctions the honorable court will likely impose."

The White House did not immediately respond to comment. However, Trump has continually denied any coordination between his campaign and Russia.

On Tuesday morning, Donald Trump Jr. released a series of emails from last year showing an acquaintance offering information that could damage Hillary Clinton, purportedly from Russia. Trump Jr. has denied any improper action, and his father on Wednesday morning again referred to the questions about coordination with Russia as "the greatest witch hunt in political history."

The lawsuit makes a series of unsubstantiated assertions, largely based on inferences from press accounts and claims "on information and belief" that the Trump campaign and Stone coordinated with Russia, thereby harming the three plaintiffs.

The group pointed to comments from former US attorney John McKay, Harvard professor Laurence Tribe and Berkley Law dean Erwin Chemerinsky, who read the suit and gave it favorable chances of moving to the discovery phase -- enabling the lawyers to examine documents and interview witnesses in an attempt to demonstrate coordination.

"In my experience, most conspiracy cases begin with circumstantial evidence just like this case," John McKay, a former US attorney, said. "Investigation and discovery often proves it true."

Last July, just ahead of the Democratic National Convention, WikiLeaks released hacked emails from the party's committee.

Among those to have their information included in the release were Roy Cockrum, Scott Comer and Eric Schoenberg, all plaintiffs in the suit.

The release included private contact and identity information, including social security numbers. The lawsuit alleges, among other things, that Comer's homosexuality was outed against his will to his grandparents. It also says that Cockrum, as well as Schoenberg and his wife, had faced repeated identity theft attempts since the leak.

The lawsuit was filed in the US District Court in DC on three counts: the public disclosure of private facts, intentionally inflicting emotional distress and a conspiracy to prevent voters from acting politically.

CNN's Manu Raju contributed to this report.

UPDATE: This story has been updated to include additional comments on the suit's chances.

Excerpt from:
Group of DNC hack victims sue Trump campaign - CNN

Julian Assange: I urged Trump Jr to publish Russia emails via WikiLeaks – The Guardian

Julian Assange, the Wikileaks founder, has claimed that he contacted Donald Trump Jr and tried to persuade him to publish emails showing he was eager to accept sensitive information about Hillary Clinton via the anti-secrecy website.

Instead, the US presidents eldest son did so via Twitter, igniting a firestorm of criticism around his apparent willingness to work with the Russian government against his fathers Democratic rival.

Contacted Trump Jr this morning on why he should publish his emails (i.e with us), tweeted Assange, who is based at the Ecuadorian embassy in London. Two hours later, does it himself.

Asked by another Twitter user to explain, Assange elaborated: I argued that his enemies have it so why not the public? His enemies will just milk isolated phrases for weeks or months ... with their own context, spin and according to their own strategic timetable. Better to be transparent and have the full context ... but would have been safer for us to publish it anonymously sourced. By publishing it himself it is easier to submit as evidence.

It was not clear whether Assanges use of the word enemies was the reference to the media or political rivals.

The Australian added: Hes surely had advice and/or is confident on the facts. Id argue that even the completely innocent need @WikiLeaks.

WikiLeaks played a prominent role in the US presidential election, publishing emails stolen from the Democratic National Committee (DNC) and Clintons campaign manager, John Podesta.

As a candidate, Trump declared: I love WikiLeaks! US intelligence agencies concluded that the hacking was carried out by Russia.

Trumps longtime confidante Roger Stone communicated with Assange and a hacker known as Guccifer 2.0, who began posting DNC documents on 15 June less than a week after Trump Jrs meeting with a Russian lawyer in New York.

WikiLeaks apparent overlap of interests with the Trump campaign drew scrutiny at the time. Robert Mackey of the Intercept website wrote in August last year: The WikiLeaks Twitter feed has started to look more like the stream of an opposition research firm working mainly to undermine Hillary Clinton than the updates of a non-partisan platform for whistleblowers.

Originally posted here:
Julian Assange: I urged Trump Jr to publish Russia emails via WikiLeaks - The Guardian

REPORT: Manafort Coordinated With Wikileaks To Dump Clinton Emails – IR.net

Home News Politics

Posted By: Arthur Jones July 11, 2017

Share

175

Shares

As if these last two days hadntcaused the White House to go into panic mode enough, a new report from former White House Staffer, Claude Taylor, indicates that Paul Manaforts ties to Wikileaks may have been much tighter than initially thought. Manafort has had his name come up multiple times when discussing possible Trump campaign collusion with Russia, including just this past weekend when a New York Times Report indicated that he, along with Donald Trump Jr. and Jared Kushnermetwith a Russian attorney to discuss damaging information about the DNC and Clinton. If Taylors sources are accurate, then the depth of Manaforts involvement, in what seems to certainly appear to be collusion, may have expanded quite a bit.

Taylor, who claims to be in contact with an individual close to the Mueller investigation, just tweeted the following bombshell:

Breaking: Source with knowledge of investigation says there is solid proof that Manafort coordinated with Wikileaks in dumping HRC emails.

We assume that the emails that Taylors source is referring to are the John Podesta emails that leaked in November of last year. These emails happened to include messagesto andfrom Clinton herself. Manafort, who served as Trumps campaign manager for several months between May 19, 2016 and August 18, 2016, was never rumored to have any communication with Wikileaks, however another Trump campaign associate, Roger Stone, admitted to not only having a relationship with Wikileaks and Julian Assange, but also claimed to have communicated with Guccifer 2.0, the hacker who allegedly stole the DNC emails.

Considering that Roger Stone had supposedly convinced Donald Trump to hire Manafort to be his campaign manager, it would not seem out of the question for Manafort to have communicated and coordinated the release of such emails via Wikileaks.

When you combine this story with the fact that a GOP operative named Peter W. Smith claimed to have been working with those in the Trump campaign to access the missing Clinton emails from Russian hackers, the story seems to certainly have legs.

Excerpt from:
REPORT: Manafort Coordinated With Wikileaks To Dump Clinton Emails - IR.net

Wikileaks Just Suggested Julian Assange Should Run Trump’s US-Russia Cyber Security Unit – Newsweek

Wikileaks has suggested its founder Julian Assange should head up the proposed U.S.-Russian unit on cyber security.

Responding to a tweet from President Donald Trump, which suggested he had discussed the formation of an impenetrable cyber security unit with Russian president Vladimir Putin on Friday, Wikileaks said Assange would be a good fit.

Why not put @JulianAssange in charge of it? He's trusted by the public and has the CIA's best stuff anyway, the Wikileaks tweet said.

Daily Emails and Alerts - Get the best of Newsweek delivered to your inbox

WikiLeaks founder Julian Assange makes a speech from the balcony of the Ecuadorian Embassy, in central London, Britain February 5, 2016. Peter Nicholls//Reuters

The organization also linked to a press release from March, in which it detailed a number of leaks linked to the CIA.

Trumps announcement that he discussed the formation of a cyber security unit with Putin was met with criticism from Democrats and Republicans alike, given Russias alleged involvement in the U.S. election.

The president tweeted on Sunday: I strongly pressed President Putin twice about Russian meddling in our election. He vehemently denied it. I've already given my opinion.

Putin & I discussed forming an impenetrable Cyber Security unit so that election hacking, & many other negative things, will be guarded, he added.

Wikileaks has been the subject of criticism from President Trump following the commuting of Chelsea Mannings sentence by former President Barack Obama.

Trump has referred to Manning asa traitor, The Hill reported, with Wikileaks responding by stating Trump was wrong to criticize Manning.

And Assange has not escaped criticism from Trumps administration, with CIA director Mike Pompeo hitting out at the Wikileaks founder and Attorney General Jeff Sessions stating in April that the arrest of Assange was a priority.

We are going to step up our effort and already are stepping up our efforts on all leaks, Sessions said in a press conference in April reported by CNN.

This is a matter that's gone beyond anything I'm aware of. We have professionals that have been in the security business of the United States for many years that are shocked by the number of leaks and some of them are quite serious. So yes, it is a priority. We've already begun to step up our efforts and whenever a case can be made, we will seek to put some people in jail, Sessions added.

Read the rest here:
Wikileaks Just Suggested Julian Assange Should Run Trump's US-Russia Cyber Security Unit - Newsweek

Who is Julian Assange and why have Swedish prosecutors dropped their rape case against the Wikileaks founder? – The Sun

WIKILEAKS founder Julian Assange has been repeatedly visited by pal Pamela Anderson in the Ecuadorian Embassy in Londonas he prepares to leave after Sweden dropped sexual assault allegations against him.

Heres thelowdown on Assanges efforts to avoid extradition to Sweden and his relationship with former Baywatch star Pamela Anderson.

PA:Press Association

Assange was in Sweden in August 2010 to speak at a conference when he met two women and had sex with them.

They later accused him of rape and molestation and Assange was questioned but never charged over the claims.

On November 20 after he had left the country, Interpol issued a Red Notice for Assanges arrest.

He gave himself up a week later and appeared before a judge in Westminster before being released on bail after his supporters paid 240,000 in cash and sureties.

Legal arguments continued until June 2012, when Swedish prosecutors called for him to be extradited something his lawyers were against in case he was sent to the US.

On June 19, 2012, he fled bail and applied for asylum in Ecuador, through the embassy in Knightsbridge.

The Ecuadorian authorities stated that he could remain as long as he wishes.

Assange was granted asylum in August that year but if he had set foot outside the building, Britain would have deported him to Sweden.

After pursuing the rape allegations for seven years, Swedens director of public prosecutions Marianne Nyhas decided to drop the case because theres no possibility of arresting him in the foreseeable future.

The prosecutor filed a request to the Stockholm District Court to revoke the arrest warrant.

At this point, all possibilities to conduct the investigation are exhausted, said Marianne Ny.

In order to proceed with the case, Julian Assange would have to be formally notified of the criminal suspicions against him.

We cannot expect to receive assistance from Ecuador regarding this.

Therefore the investigation is discontinued.

If he, at a later date, makes himself available, I will be able to decide to resume the investigation immediately.

Shortly after the announcement on May 19 Assange posted a picture of himself smiling on Twitter.

But theMet Police were quick to warn Assange: Well still arrest you.

Scotland Yard said they were obliged to execute an arrest warrant of Assange, which remains outstanding from when he failed to attend Westminster Court on June 29 2012.

Assanges mum Christine has called on Aussie PM Malcom Turnbull to press British authorities to allow her son safe passage to Ecuador.

Twitter / @JulianAssange

The 45-year-old is an Australian native who spearheaded the anti-secrecy group Wikileaks to expose the inner workings of governments, military and trade deals around the world.

Assange is a hacker, freedom of information advocate and a self-confessed political refugee.

He was born in Queensland in 1971 and attended the citys Central university where he studied programming, mathematics and physics.

Assange has a software designer son called Daniel with ex-wife Teresa.

Getty Images

Wikileaks was set up in 2006 to allow whistle-blowers to release anonymous documents.

The site - and Assange - became household names when Chelsea Manning leaked information about the US military.

One of the leaks was a video called Collateral Murder, which showed unarmed Iraqis being gunned down by American helicopters.

Assange has since been involved in the publication of material exposing toxic waste dumping on the ivory coast, Scientology manuals and Guantanamo Bay detention camp procedures.

At one point there were five major films about Wikileaks in development with one, The Fifth Estate starring Benedict Cumberbatch, released in 2013.

Most recently, Wikileaks claimed UK government helped CIA hack Samsung Smart TVs and turn them into "microphones".

It has been reported that TV viewers were stalked by a virus in their set called the Weeping Angel.

Software was also allegedly developed by the CIA to hack into peoples smartphones, computers and cars.

It claimed the papers dubbed Vault 7 expose how a sinister TV surveillance program was developed by UK and US spy chiefs.

Getty Images

Baywatch star Pamela Anderson whose close friendship with Wikileaks founder Assange has set tongues wagging has visited Assange at the embassy repeatedly.

It comes two weeks after the 49-year-old actress wrote a cringe-worthy online love letter to sexy Assange calling for world leaders to help set him free.

Pamela, 49, was introduced to Assange by Vivienne Westwood in August 2014, and sought advice from him about her animal rights charity.

She has since been pictured entering the building on six occasions.

On Anderson, Assange has said: "Shes an attractive person with an attractive personality and whip smart. Shes no idiot at all, she psychologically very savvy."

Asked if he was in love with Pam, he added: "Well I mean I like her, shes great. Im not gonna go into private details."

In an interview with Australian hosts Kyle and Jackie O Pamela pretty much confirmed their relationship saying: It was never the intention to become romantic.

"It was just to join forces to do something important. Things happen for sure.

In March she published a blog post in which she praised Assange and what he was doing.

She said: "Julian is trying to free the world by educating it. It is a romantic struggle.

"I love him for his."

AP:Associated Press

The Aussie has been visited byLady Gaga, Eric Cantona and Yoko Ono, and several times byPamelaover the past few months.

Assange had to have his internet access cut off to stop him interfering in the US presidential election.

Wikileaks published thousands of emails from Hillary Clinton's campaign in the final weeks of the race for the White House.

Assange defended the publication, denying links with Russia and claims that his website was trying to influence the US vote.

He also has a cat for company, which has its own dedicated Twitter account @EmbassyCat.

-A previous version of this story said that Assange had sex with two men who later accused him of rape. In actual fact they were women. The story was corrected on 10th March.

Read the original here:
Who is Julian Assange and why have Swedish prosecutors dropped their rape case against the Wikileaks founder? - The Sun

WikiLeaks drops new CIA tools, BothanSpy and Gyrfalcon – SC Magazine

WikiLeaks drops new CIA tools, BothanSpy and Gyrfalcon

WikiLeaks latest Vault7 offering includes two CIA hacking tools, BothanSpy and Gyrfalcon 2.0, which can swipe SSH credentials.

BothanSpy and Gyrfalcon target the Windows and Linux operating systems, respectively, reported Bleeping Computer.

According to the BothanSpy user manual, posted by Wikileaks and dating from 2015, this malware will is a tool that targets the SSH client program Xshell and steals user credentials for all active SSH sessions. BothanSpy will exfiltrate the stolen credentials through the Fire and Collect (F&C) channel and out to disk on the attacker-side. By using F&C, BothanSpy never touches disk.

The even older Gyrfalcon manual states The application compresses, encrypts, and stores the collected data into a collection file kept on the Linux platform's file system. Gyrfalcon is capable of collecting full or partial OpenSSH session traffic including user name and passwords of OpenSSH users.

Bleeping Computer noted that WikiLeaks has previously released 13 pieces of malware the hacktivist group claims has been pulled from the CIA.

More here:
WikiLeaks drops new CIA tools, BothanSpy and Gyrfalcon - SC Magazine

WikiLeaks: CIA steals SSH credentials from Windows and Linux with BothanSpy and Gyrfalcon tools – BetaNews

The latest addition to WikiLeaks' Vault 7 cache of CIA tools and documents gives details of tools used by the agency to attack Windows and Linux computers. The BothanSpy and Gyrfalcon projects can be used to intercept and exfiltrate SSH (Secure Shell) credentials.

BothanSpy is used to target Windows, while Gyrfalcon is used for Linux machines, with both working in different ways. A number of popular distros can be hit by Gyrfalcon, including CentOS, Debian, RedHat, openSUSE and Ubuntu, and both tools function as implants that steal credentials before transmitting them to a CIA server.

The leaked documentation for the tools was updated as recently as March 2015, and the file relating to BothanSpy reveals that XShell needs to be installed as it itself installs as a Shellterm extension. There are smatterings of humor throughout the file, with a warning that: "It does not destroy the Death Star, nor does it detect traps laid by The Emperor to destroy Rebel fleets." There is also the introductory quip: "Many Bothan spies will die to bring you this information, remember their sacrifice."

Writing about the Windows tools, BothanSpy, WikiLeaks says:

BothanSpy is an implant that targets the SSH client program Xshell on the Microsoft Windows platform and steals user credentials for all active SSH sessions. These credentials are either username and password in case of password-authenticated SSH sessions or username, filename of private SSH key and key password if public key authentication is used. BothanSpy can exfiltrate the stolen credentials to a CIA-controlled server (so the implant never touches the disk on the target system) or save it in an encrypted file for later exfiltration by other means. BothanSpy is installed as a Shellterm 3.x extension on the target machine.

The Linux tool is different, and the guide warns that anyone using it must "obtain a thorough understanding of the Linux/UNIX command line interface and shells such as bash, csh, and sh." There is the additional note that: "Both the library and application must be installed with root privileges, however, they do not need root privilege to execute successfully on the Linux platform. Therefore, the operator must be confident with their understanding of Linux to use root privileges and not muck up the Linux platform's configuration."

About Gyrfalcon WikiLeaks says:

Gyrfalcon is an implant that targets the OpenSSH client on Linux platforms (centos, debian, rhel, suse, ubuntu). The implant can not only steal user credentials of active SSH sessions, but is also capable of collecting full or partial OpenSSH session traffic. All collected information is stored in an encrypted file for later exfiltration. It is installed and configured by using a CIA-developed root kit (JQC/KitV) on the target machine.

You can read more about BothanSpy and Gyrfalcon over on WikiLeaks.

Image credit: i3alda and Stanislaw Mikulski / Shutterstock

Read more here:
WikiLeaks: CIA steals SSH credentials from Windows and Linux with BothanSpy and Gyrfalcon tools - BetaNews

DNC won’t release evidence of Seth Rich’s WikiLeaks ties – WND.com

Murdered DNC staffer Seth Rich

WASHINGTON A team of private investigators demanded the Democratic National Committee turn over any and all information that could help determine whether there is a link between the Democratic National Committeeemail hacking during the 2016 presidential race and the mysterious murder of DNC employee Seth Rich.

But the DNC wouldnt provide any information Thursday, claiming its not interested in propagating conspiracy theories about a beloved colleague.

DNC Chairman Thomas Perez

While the DNC insists that its email was hacked by Russia in a grand conspiracyto assist Donald Trump in rigging the election, the Profiling Project pointed out in aletter to DNC Chairman Tom Perez that Guccifer 2.0 categorically denied links between the Russian government and the hacked documents.

There have been all sorts of reporting in the media on the DNC computer hacking on June 14, 2016, one month before Mr. Richs murder, the letter states. At the time, the DNC blamed the hacking on two groups associated with Russian intelligence. However, a blogger named Guccifer 2.0 subsequently claimed that he hacked your computer system, and passed along thousands of pages of files to WikiLeaks.

Subsequent unsubstantiated reports have linked Mr. Richs murder with either Russia or WikiLeaks or both, suggesting that Mr. Rich was the source of the emails or he was connected in some other way.

Get the hottest, most important news stories on the Internet delivered FREE to your inbox as soon as they break! Take just 30 seconds and sign up for WNDs Email News Alerts!

Jack Burkman, a lawyer and GOP lobbyist who is funding the Profiling Project, wrote the letter on behalf of the group. Hecalled onthe DNC to turn over any evidence that would substantiate Richs ties to WikiLeaks.

D.C. lobbyist and attorney Jack Burkman

By way of this letter, I am formally asking that the DNC release any, and all, information to our independent investigators including emails, internal memos and other correlating information regarding discussions of this matter that may help them determine the connection, if any between the DNC hacking and the murder of Seth Rich, the letter states. I look forward to your cooperation in our efforts to find those responsible for killing a young man with a bright future and one of your employees.

In its response to the Profiling Projects letter, the DNC stated:

The DNC supports law enforcement in their work to get to the bottom of this terrible tragedy and hold the perpetrators accountable. The DNC is not interested in propagating conspiracy theories about a beloved colleague.

We ask news organizations to respect Seths memory and stop highlighting publicity stunts and spreading false or debunked information.

As WND has reported,Rich, 27, had accepted a position with Hillary Clintons campaign just before his death. He was murdered in Washington, D.C., near his apartment in an affluent neighborhood. Rich was shot twice in the back with a handgun, and hiswallet, credit cards, watch and phone were left in his possession.The Metropolitan Police Department hasdescribed the murderas a botched robbery.

Murdered DNC staffer Seth Rich

Private investigators have claimedthere is evidence Rich was the source WikiLeaks used to obtain thousands ofDNC emails released on the eve of the partys presidential nominating convention last July. The emails, indicating the party was manipulating the primary race in favor of Hillary Clinton, led to the resignation of former DNC Chairwoman Rep. Debbie Wasserman Schultz.On July 22, just 12 days after Richs death and days before the Democratic Party Convention in Philadelphia, WikiLeaks released 20,000 DNC emails.

Also as WND has reported, former detective Rod Wheeler was initially hired by Richs parents through a third party to find their sons killer. Wheeler alleges former interim DNC chairwoman Donna Brazille contacted the Metropolitan Police Department demanding to know why he was snooping after Wheeler began investigating Richs murder. As a result, he said, law-enforcement authorities are now refusing to provide him with more details about the case.

Wheeler and another source also told WND that the familys spokesman, Brad Bauman a Democratic political crisis consultant was assigned to the family by the DNC. Bauman denies the DNC hired him to represent the Rich family, calling the claim patently 100 percent false.

WND has launched a GoFundMe campaign to get to the bottom of the Seth Rich murder. Help us find out what really happened to the DNC staffer!

As WND reported, the total reward for solving Richs murder currently stands at approximately a half-million dollars. However, the DNC has offered no rewardfor information leading to the arrest of the murderer of its own young staffer. Instead, the DNC honored its murdered employee by dedicating a bike rack outside its headquarters to Richs memory.

The DNC honored its murdered employee, Seth Rich, by dedicating a bike rack with this plaque outside its headquarters to Richs memory (Photo: screenshot)

Several online accounts belonging to Rich have been deleted in recent weeks, according to the Profiling Project. As WND reported, Burkman filed an emergency motion on June 21 to require police to preserve, protect and properly organize the all-important online information of Seth Rich.

Seth Richs Twitter account has recently been deleted Seth Richs Facebook page has recently been deleted and Seth Richs Reddit account (MeGRIMLOCK) has recently been edited and some of its postings deleted, the motion states.Little is more critical to the investigation of this murder than this online information that could lead to the determination of a motive for the murder. Most of the current working theories of the case may be disproven or enhanced by examining Seth Richs online information. Regrettably, some of this information is now lost due to the apparent spoliation of MPD. MPD must now be forced by this Court to act swiftly and decisively to preserve evidence.

Seth Rich

Also in June, the Profiling Project released a preliminary 80-page report on Rich that details why its highly improbable that the DNC staffer was the victim of a random homicide.

The project, an all-volunteer group of current and former George Washington University forensic psychology graduate students and instructors, said it came together for the investigation to aid the Washington, D.C., Metropolitan Police utilizing forensic psychology skills and tools in hopes of providing at least one actionable item.

The findings included:

The group found in its investigation the crime scene was very organized to the point of being sanitized.

This would indicate careful planning on the part of the offender, control of the entry to and exit from the crime scene as well as in-depth understanding of law-enforcement investigative processes, Doherty explained during a press conference. A proficient killer is what we think the fact that the killer has gotten away with it for this period of time and it appears it was a very sanitized crime scene, so there is certainly some level of proficiency in the killing.

The lack of clues fromRichs murderer scene and the fact that nosuspects have surfaced to claim the large reward offering is highly suspect, Doherty said.

The crime scene was sanitized; there is no direct linking to really anything. The police have no suspects, he said. The individuals have gotten away with it at this point in time. There were no behavioral indications at the crime scene. It didnt look like rage or revenge or hate were the motivation behind it. Its really a lack of behavioral indicators, motion and evidence that leads us to believe that whoever did this is proficient at killing.

Intersection where DNC staffer Seth Rich was found conscious and breathing with apparent gunshot wound(s) to the back, according to a July 10, 2016, police report (WND photo: Alicia Powe)

The Profiling Project revealed in May that weapons were stolen from anearby FBI vehicle hours before Rich was shot, including a .40 caliber Glock-22 handgun and a Rock River Arms Rifle. The burglary took place just two miles south of Richs murder scene.

The group is currently awaiting a court hearing before the Washington, D.C., Superior Court to force the police department and Washington, D.C., Mayor Muriel Bowser to publicly release critical evidence in the Seth Rich investigation, including the medical examiners report, autopsy documents and ballistics reports, which would determine they type of gun used to shoot Rich.

WND has launched a GoFundMe campaign to get to the bottom of the Seth Rich murder. You can personally help us get to the truth of what really happened.

View post:
DNC won't release evidence of Seth Rich's WikiLeaks ties - WND.com

WikiLeaks Releases Documents on Two CIA Projects Targeting Network Protocols – Sputnik International

World

17:35 06.07.2017(updated 17:41 06.07.2017) Get short URL

"Today, July 6th 2017, WikiLeaks publishes documents fromthe BothanSpy and Gyrfalcon projects ofthe CIA. The implants described inboth projects are designed tointercept and exfiltrate SSH credentials butwork ondifferent operating systems withdifferent attack vectors," WikiLeaks said ina statement.

SSH is a cryptographic network protocol which gives the user a secure remote access toa websites server. The SSH credentials are the login details, namely the server address, port number, the username and the password.

According toWikiLeaks, the BothanSpy is an implant targeting the SSH client program forMicrosoft Windows platform, stealing user credentials form active SSH sessions. The data is then either exfiltrated toa CIA-controlled server, or encrypted and saved forlater exfiltration byother means.

Gyrfalcon, inits turn, is an implant that targets Linux platforms and can steal the credentials, encrypting the information forlater exfiltration.

WikiLeaks released three documents that appear tobe the CIAs tool documentation and user manuals forboth projects asevidence.

The whistleblowing website released the first patch fromthe Vault 7 project inMarch, withthe first full part comprising 8,761 documents. The previous release, dedicated tothe CIA spying geo-location malware forWiFi-enabled devices, dubbed ELSA, took place onJune 28.

Read more from the original source:
WikiLeaks Releases Documents on Two CIA Projects Targeting Network Protocols - Sputnik International

WikiLeaks: CNN extorted apology from creator of Trump wrestling gif – News965

A bold claim of blackmail and extortion by CNN lit up social media Wednesday.

The Reddit user, HanA**holeSolo, who created the image of President Donald Trump wrestling CNN has apologized for his actions, but a handful of conservative media outlets are accusing the network of blackmailing the user.

A web article, posted on CNNs website, details the efforts used to track down the Reddit user and dig into his posting history. In a thorough Reddit post, the user apologized for creating the image and for previously posting racist, bigoted, and anti-semitic content. The article explains the contents of his apology.

CNN is not publishing "HanA**holeSolo's" name because he is a private citizen who has issued an extensive statement of apology, showed his remorse by saying he has taken down all his offending posts, and because he said he is not going to repeat this ugly behavior on social media again. The article reads, In addition, he said his statement could serve as an example to others not to do the same.

WikiLeaks, Eric Trump, conservative outlets and other Twitter users are taking issue with the next line in the article that reads CNN reserves the right to publish his identity should any of that change.

Some called it extortion, unethical and possibly illegal.

As of the time this article was posted, CNN has not identified the Reddit user in question.

Continued here:
WikiLeaks: CNN extorted apology from creator of Trump wrestling gif - News965