24
posted ago by stoic_troll +24 / -0

This has probably been posted elsewhere but this was posted to Twitter:

https://mobile.twitter.com/cidgrad89/status/1330001837961965568 Wikileaks, 2017, CIA hacker base in Frankfurt, Project Kraken:

It describes a project at a covert CIA base in Germany whose job is to build fake programs which are essentially Trojans that infect machines. Kraken, as described in the WikiLeaks drop from 2017, https://wikileaks.org/ciav7p1/cms/space_31653889.html

Appears to be a task Management program. A task Management Trojan horse to be clear. The notes from retrospectives dropped in WikiLeaks are ridiculously unprofessional reports of "sprint planning" jargon. This is a front.

They use JIRA, as noted in the Kraken fake retros, which is a common tool for managing software development. Interestingly, Dominion also has election poll workers learn JIRA:

https://www.sos.state.co.us/pubs/elections/VotingSystems/systemsDocumentation/DominionDocumentation.html

From the manual, "Issues that the trainee has with testing can also result in the creation of a new bug or improvement. Defining these issues further expands the trainee’s training, as it teaches him/her how to effectively use Dominion’s issue-tracking system, JIRA, and demonstrates how Dominion’s products and services are developed and improved over time using change management procedures. Using JIRA also exemplifies how each department is interconnected and broadens the trainee’s understanding of each employee’s role within the company."

So, my theory is that the Kraken Trojan horse is either embedded in a local or remote JIRA instance, and employees and poll workers may even unknowingly interact with or activate the Kraken by using the task Management program or somehow infect their USB keys with the Trojan. Either way, it seems like Kraken is code for a Trojan horse program built by the CIA, which is probably what's powering the Hammer and Scorecard vote rigging scheme.

Anyways that's the theory and it aligns with the Frankfurt raid mentioned by Sidney.

This has probably been posted elsewhere but this was posted to Twitter: https://mobile.twitter.com/cidgrad89/status/1330001837961965568 Wikileaks, 2017, CIA hacker base in Frankfurt, Project Kraken: It describes a project at a covert CIA base in Germany whose job is to build fake programs which are essentially Trojans that infect machines. Kraken, as described in the WikiLeaks drop from 2017, https://wikileaks.org/ciav7p1/cms/space_31653889.html Appears to be a task Management program. A task Management Trojan horse to be clear. The notes from retrospectives dropped in WikiLeaks are ridiculously unprofessional reports of "sprint planning" jargon. This is a front. They use JIRA, as noted in the Kraken fake retros, which is a common tool for managing software development. Interestingly, Dominion also has election poll workers learn JIRA: https://www.sos.state.co.us/pubs/elections/VotingSystems/systemsDocumentation/DominionDocumentation.html From the manual, "Issues that the trainee has with testing can also result in the creation of a new bug or improvement. Defining these issues further expands the trainee’s training, as it teaches him/her how to effectively use Dominion’s issue-tracking system, JIRA, and demonstrates how Dominion’s products and services are developed and improved over time using change management procedures. Using JIRA also exemplifies how each department is interconnected and broadens the trainee’s understanding of each employee’s role within the company." So, my theory is that the Kraken Trojan horse is either embedded in a local or remote JIRA instance, and employees and poll workers may even unknowingly interact with or activate the Kraken by using the task Management program or somehow infect their USB keys with the Trojan. Either way, it seems like Kraken is code for a Trojan horse program built by the CIA, which is probably what's powering the Hammer and Scorecard vote rigging scheme. Anyways that's the theory and it aligns with the Frankfurt raid mentioned by Sidney.
Comments (23)
sorted by:
4
deleted 4 points ago +4 / -0
2
stoic_troll [S] 2 points ago +2 / -0

Read the WikiLeaks on Project Kraken. It's a Trojan. Yes, you use the real JIRA. But dominion Voting machines probably use or communicate with a compromised version of the software. And the server was hosted in Frankfurt.

0
wizzingonwallstreet 0 points ago +1 / -1

I believe the wikileaks documents is simply planning a software dev effort in JIRA. Most all software developers use JIRA. So yeah, there's a Kraken being planned, but its connection to JIRA is probably a red herring.

PS: It also looks like one person wrote down some ideas and there was no further participation in that dump.

2
stoic_troll [S] 2 points ago +2 / -0

Yeah it could be completely unprofessional ramblings about JIRA and storypoints for a tight knit top secret team working on CIA Trojan software. I suppose that's possible. Would be an absolute waste of time.

But take a look at the schema: https://wikileaks.org/ciav7p1/cms/page_39714844.html

It's intriguing if you're technical.

-1
BeardedNinjaPede -1 points ago +1 / -2

It's definitely a Trojan. Great work Pede!

2
LiberalFatigue 2 points ago +2 / -0

Kraken is obviously the Inslaw software known as the Octopus, aka PROMIS which was kind of a prototype to the NSA spying software and other Big Data (tm) spyware which is so common in today's IT landscape.

1
stoic_troll [S] 1 point ago +1 / -0

Did you read the WikiLeaks page I linked at all?

1
LiberalFatigue 1 point ago +1 / -0

I just totally flew off the handle but am I right?

2
Jojobelle 2 points ago +2 / -0

What is the size of the ticket for election fraud

2
stoic_troll [S] 2 points ago +2 / -0

Haha well you can read Project Kraken's retros on the WikiLeaks. They seemed to have a lot of trouble getting the story points just right.

2
nomoremasks 2 points ago +2 / -0

Their hacking base in Frankfurt and the Amazon AWS facility in Frankfurt is a coincidence, because it happens to be the largest Internet Exchange Point in Europe (DE-CIX) so Amazon uses this location to have the best performance for it's central EU region. The server IP addresses, which I have, belong to Amazon, not some hidden secret basement in Frankfurt.

2
stoic_troll [S] 2 points ago +2 / -0

Where did you get these IP addresses and how do you know Amazon owns them? You think they would say CIA on them?

1
nomoremasks 1 point ago +1 / -0

mysite.scytl.com18.196.162.197 ppm.scytl.com18.196.162.197 demo.scytl.com18.196.162.197 test.scytl.com18.196.162.197 scytl.com18.196.162.197 bck.scytl.com18.196.162.197 mysitepre.scytl.com18.196.162.197 owasppre.scytl.com18.196.162.197 owasp.scytl.com18.196.162.197 alm.scytl.com18.196.162.197 edemocracy-experience.scytl.com18.196.162.197 agm.scytl.com18.196.162.197 mail3.scytl.com18.196.162.197 inside.scytl.com18.196.162.197 hrm.scytl.com18.196.162.197 ots.scytl.com18.196.162.197 owa.scytl.com18.196.162.197 dmspre.scytl.com18.196.162.197 mielectionspro2014.scytl.com18.196.162.197 18.196.162.197

CityFrankfurt am Main

ISPAmazon.com

ContinentEurope

Country CodeGermany

1
deleted 1 point ago +1 / -0
1
deleted 1 point ago +1 / -0
1
deleted 1 point ago +1 / -0
2
stoic_troll [S] 2 points ago +2 / -0

Yes, I caught that after. Still, you think Project Kraken also located in Frankfurt and leaked in 2017 from a CIA dump is a coincidence?

And do you think CIA would have their IPs publicly searchable? Or would they use a front?

2
nomoremasks 2 points ago +2 / -0

Kraken is a German sea monster. So the CIA could name it this way because its catchy, and now the data on the german Amazon server was apparently named the same way.

Just like operation Warpspeed, which is commonly used in other operations.

All IPs are searchable, what is hosted on them is not. The wikileaks articles from 2017 have nothing to do with it.

2
stoic_troll [S] 2 points ago +2 / -0

Hmm. Doesn't really make sense. AWS is a cloud provider. If you were going to do some shady shit, why would you risk doing it on AWS, exposing yourself to internal audits and backups by Amazon employees and automated software? Do you know if any of these IP addresses are actually associated with server raid? Or is this just a SCYTL domain lookup.