A statement from WikiLeaks indicated that it planned to post nearly 9,000 files describing code developed in secret by the CIA to steal data from targets overseas and turn ordinary devices including cellphones, computers and even television sets into surveillance tools.Now, maybe, not so much?
The authenticity of the trove could not immediately be determined. A CIA spokesman would say only that “we do not comment on the authenticity or content of purported intelligence documents.” But current and former U.S. officials said that details contained in the documents suggest that they are legitimate.
Such a breach of U.S. intelligence capabilities, and the potential fallout it might cause among U.S. allies, could pose a significant challenge to President Trump, who in the past has praised WikiLeaks and disparaged the CIA.
Tuesday, March 07, 2017
Deep State Digging
Wiki Leaks strikes again:
Here comes the eclipse:
The regulators are still at it: Using the "altFEC" twitter account, one of several "alt" sites set up by government work...
Were they the ancestors of piano players? The brain circuits that led to two-sided tools and weapons such as hand-axes and cleavers are the ...
They really are after everyone's job: The study found that 42 percent of UK consumers believe their job is likely to be replaced by a ro...