This has probably been posted elsewhere but this was posted to Twitter:
https://mobile.twitter.com/cidgrad89/status/1330001837961965568
Wikileaks, 2017, CIA hacker base in Frankfurt, Project Kraken:
It describes a project at a covert CIA base in Germany whose job is to build fake programs which are essentially Trojans that infect machines. Kraken, as described in the WikiLeaks drop from 2017, https://wikileaks.org/ciav7p1/cms/space_31653889.html
Appears to be a task Management program. A task Management Trojan horse to be clear. The notes from retrospectives dropped in WikiLeaks are ridiculously unprofessional reports of "sprint planning" jargon. This is a front.
They use JIRA, as noted in the Kraken fake retros, which is a common tool for managing software development. Interestingly, Dominion also has election poll workers learn JIRA:
https://www.sos.state.co.us/pubs/elections/VotingSystems/systemsDocumentation/DominionDocumentation.html
From the manual, "Issues that the trainee has with testing
can also result in the creation of a new bug or improvement. Defining these issues further expands the
trainee’s training, as it teaches him/her how to effectively use Dominion’s issue-tracking system, JIRA,
and demonstrates how Dominion’s products and services are developed and improved over time using
change management procedures. Using JIRA also exemplifies how each department is interconnected
and broadens the trainee’s understanding of each employee’s role within the company."
So, my theory is that the Kraken Trojan horse is either embedded in a local or remote JIRA instance, and employees and poll workers may even unknowingly interact with or activate the Kraken by using the task Management program or somehow infect their USB keys with the Trojan. Either way, it seems like Kraken is code for a Trojan horse program built by the CIA, which is probably what's powering the Hammer and Scorecard vote rigging scheme.
Anyways that's the theory and it aligns with the Frankfurt raid mentioned by Sidney.
This has probably been posted elsewhere but this was posted to Twitter:
https://mobile.twitter.com/cidgrad89/status/1330001837961965568
Wikileaks, 2017, CIA hacker base in Frankfurt, Project Kraken:
It describes a project at a covert CIA base in Germany whose job is to build fake programs which are essentially Trojans that infect machines. Kraken, as described in the WikiLeaks drop from 2017, https://wikileaks.org/ciav7p1/cms/space_31653889.html
Appears to be a task Management program. A task Management Trojan horse to be clear. The notes from retrospectives dropped in WikiLeaks are ridiculously unprofessional reports of "sprint planning" jargon. This is a front.
They use JIRA, as noted in the Kraken fake retros, which is a common tool for managing software development. Interestingly, Dominion also has election poll workers learn JIRA:
https://www.sos.state.co.us/pubs/elections/VotingSystems/systemsDocumentation/DominionDocumentation.html
From the manual, "Issues that the trainee has with testing
can also result in the creation of a new bug or improvement. Defining these issues further expands the
trainee’s training, as it teaches him/her how to effectively use Dominion’s issue-tracking system, JIRA,
and demonstrates how Dominion’s products and services are developed and improved over time using
change management procedures. Using JIRA also exemplifies how each department is interconnected
and broadens the trainee’s understanding of each employee’s role within the company."
So, my theory is that the Kraken Trojan horse is either embedded in a local or remote JIRA instance, and employees and poll workers may even unknowingly interact with or activate the Kraken by using the task Management program or somehow infect their USB keys with the Trojan. Either way, it seems like Kraken is code for a Trojan horse program built by the CIA, which is probably what's powering the Hammer and Scorecard vote rigging scheme.
Anyways that's the theory and it aligns with the Frankfurt raid mentioned by Sidney.
Read the WikiLeaks on Project Kraken. It's a Trojan. Yes, you use the real JIRA. But dominion Voting machines probably use or communicate with a compromised version of the software. And the server was hosted in Frankfurt.
I believe the wikileaks documents is simply planning a software dev effort in JIRA. Most all software developers use JIRA. So yeah, there's a Kraken being planned, but its connection to JIRA is probably a red herring.
PS: It also looks like one person wrote down some ideas and there was no further participation in that dump.
Yeah it could be completely unprofessional ramblings about JIRA and storypoints for a tight knit top secret team working on CIA Trojan software. I suppose that's possible. Would be an absolute waste of time.
But take a look at the schema: https://wikileaks.org/ciav7p1/cms/page_39714844.html
It's intriguing if you're technical.
It's definitely a Trojan. Great work Pede!
Kraken is obviously the Inslaw software known as the Octopus, aka PROMIS which was kind of a prototype to the NSA spying software and other Big Data (tm) spyware which is so common in today's IT landscape.
Did you read the WikiLeaks page I linked at all?
I just totally flew off the handle but am I right?
What is the size of the ticket for election fraud
Haha well you can read Project Kraken's retros on the WikiLeaks. They seemed to have a lot of trouble getting the story points just right.
Their hacking base in Frankfurt and the Amazon AWS facility in Frankfurt is a coincidence, because it happens to be the largest Internet Exchange Point in Europe (DE-CIX) so Amazon uses this location to have the best performance for it's central EU region. The server IP addresses, which I have, belong to Amazon, not some hidden secret basement in Frankfurt.
Where did you get these IP addresses and how do you know Amazon owns them? You think they would say CIA on them?
mysite.scytl.com18.196.162.197 ppm.scytl.com18.196.162.197 demo.scytl.com18.196.162.197 test.scytl.com18.196.162.197 scytl.com18.196.162.197 bck.scytl.com18.196.162.197 mysitepre.scytl.com18.196.162.197 owasppre.scytl.com18.196.162.197 owasp.scytl.com18.196.162.197 alm.scytl.com18.196.162.197 edemocracy-experience.scytl.com18.196.162.197 agm.scytl.com18.196.162.197 mail3.scytl.com18.196.162.197 inside.scytl.com18.196.162.197 hrm.scytl.com18.196.162.197 ots.scytl.com18.196.162.197 owa.scytl.com18.196.162.197 dmspre.scytl.com18.196.162.197 mielectionspro2014.scytl.com18.196.162.197 18.196.162.197
CityFrankfurt am Main
ISPAmazon.com
ContinentEurope
Country CodeGermany
Yes, I caught that after. Still, you think Project Kraken also located in Frankfurt and leaked in 2017 from a CIA dump is a coincidence?
And do you think CIA would have their IPs publicly searchable? Or would they use a front?
Kraken is a German sea monster. So the CIA could name it this way because its catchy, and now the data on the german Amazon server was apparently named the same way.
Just like operation Warpspeed, which is commonly used in other operations.
All IPs are searchable, what is hosted on them is not. The wikileaks articles from 2017 have nothing to do with it.
Hmm. Doesn't really make sense. AWS is a cloud provider. If you were going to do some shady shit, why would you risk doing it on AWS, exposing yourself to internal audits and backups by Amazon employees and automated software? Do you know if any of these IP addresses are actually associated with server raid? Or is this just a SCYTL domain lookup.