Vault 7 wikileaks revealed inside CIA hacking force
Options
Neophyte Wolfgang
Members Posts: 4,169 ✭✭✭✭✭
https://wikileaks.org/ciav7p1/
Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named "Vault 7" by WikiLeaks, it is the largest ever publication of confidential documents on the agency.
The first full part of the series, "Year Zero", comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA's Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election.
Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized "zero day" exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.
"Year Zero" introduces the scope and direction of the CIA's global covert hacking program, its malware arsenal and dozens of "zero day" weaponized exploits against a wide range of U.S. and European company products, include Apple's iPhone, Google's Android and Microsoft's Windows and even Samsung TVs, which are turned into covert microphones.
Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA). The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force — its own substantial fleet of hackers. The agency's hacking division freed it from having to disclose its often controversial operations to the NSA (its primary bureaucratic rival) in order to draw on the NSA's hacking capacities.
Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named "Vault 7" by WikiLeaks, it is the largest ever publication of confidential documents on the agency.
The first full part of the series, "Year Zero", comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA's Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election.
Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized "zero day" exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.
"Year Zero" introduces the scope and direction of the CIA's global covert hacking program, its malware arsenal and dozens of "zero day" weaponized exploits against a wide range of U.S. and European company products, include Apple's iPhone, Google's Android and Microsoft's Windows and even Samsung TVs, which are turned into covert microphones.
Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA). The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force — its own substantial fleet of hackers. The agency's hacking division freed it from having to disclose its often controversial operations to the NSA (its primary bureaucratic rival) in order to draw on the NSA's hacking capacities.
Comments
-
Um....is this good?
-
Gettin messy out here
-
What a bunch of ? nerds
-
"Year Zero" introduces the scope and direction of the CIA's global covert hacking program, its malware arsenal and dozens of "zero day" weaponized exploits against a wide range of U.S. and European company products, include Apple's iPhone, Google's Android and Microsoft's Windows and even Samsung TVs, which are turned into covert microphones.
SPECULATION.....
If true, makes me wonder how many government agents work for these companies as software engineers or software engineering managers.....
(Even though typically there is a code review process when multiple ppl are needed to review the code prior to release. Managers and Engineers could just copy the code pre-release and forward it on) -
The [CIA malware] attack against Samsung smart TVs was developed in cooperation with the United Kingdom's MI5/BTSS. After infestation, Weeping Angel places the target TV in a 'Fake-Off' mode, so that the owner falsely believes the TV is off when it is on. In 'Fake-Off' mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.
As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.
The CIA's Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones. Infected phones can be instructed to send the CIA the user's geolocation, audio and text communications as well as covertly activate the phone's camera and microphone. -
The user and all related content has been deleted.
-
The user and all related content has been deleted.
-
The user and all related content has been deleted.
-
-
None of this surprises me
-
damn they bout to blame Obama for some more ? ...
-
The user and all related content has been deleted.
-
"CIA deliberately mimics the hacking protocals of Russia to obfuscate their own hacks"
Hmmm reminds me of this recent story:
"CNN: Vermont utility finds alleged Russian malware on computer"
Felt like a deflection to me at the time when the story came out right after wikileaks was being discredited as a russian ally. -
Fake News. Alternative news.
-
yall do know that the smart refrigerators was what helped bring the net down a bit a while back
-
The user and all related content has been deleted.
-
Black_Samson wrote: »"As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations. "
? told yall!!!!
That's been in the news several times over the last couple years as something regular hackers have the potential of doing.
This ? is coming of suspect as hell to me. From the timing to the specificity of the information being released.
Wikileaks is almost undoubtedly a Russian propaganda/espionage tool and/or in cahoots with the Trump administration. -
The user and all related content has been deleted.
-
And ain't nothing you can do about it.
Now you are simply aware.
Carry on. -
The user and all related content has been deleted.
-
We all should fuse into one black deity if we want to win.
-
Black_Samson wrote: »Samsung, Android, iOS, Alexa all that speech recog software came from Nuance Communications.
Nuance's Global Operations Vice President, Eric Tinch, worked for nine years in the CIA (Field Operations/Special Operations).
A black man at that. -
-
The user and all related content has been deleted.
-
None of this surprises me
"Power tends to corrupt, and absolute power corrupts absolutely."
I only trust the government to do what they are able to do...not what the law allows them to do.
If they are physically, mentally, technologically able to do something....expect it to happen with or without you knowledge and/or consent.