SIGforum.com    Main Page  Hop To Forum Categories  The Lounge    WikiLeaks releases 'entire hacking capacity of the CIA'
Page 1 2 
Go
New
Find
Notify
Tools
Reply
  
WikiLeaks releases 'entire hacking capacity of the CIA' Login/Join 
Member
Picture of olfuzzy
posted
WikiLeaks on Tuesday released what it said is the full hacking capacity of the CIA in a stunning 8,000-plus page disclosure the anti-secrecy website contends is “the largest ever publication of confidential documents on the agency.”

The 8,761 documents and files -- released as “Vault 7 Part 1” and titled “Year Zero” -- were obtained from an “isolated, high-security network” at the CIA’s Center for Cyber Intelligence in Langley, Va., a press release from the website said. The trove had been “circulated among former U.S. government hackers and contractors,” one of whom “recently” gave the archive to WikiLeaks.

“We do not comment on the authenticity or content of purported intelligence documents," a CIA spokesperson told Fox News.

The collection of purported intelligence tools includes information on CIA-developed malware -- bearing names such as “Assassin” and “Medusa” -- intended to target iPhones, Android phones, smart TVs and Microsoft, Mac and Linux operating systems, among others. An entire unit in the CIA is devoted to inventing programs to hack data from Apple products, according to WikiLeaks.

Some of the remote hacking programs can allegedly turn numerous electronic devices into recording and transmitting stations to spy on their targets, with the information then sent back to secret CIA servers. One document appears to show the CIA was trying to “infect” vehicle control systems in cars and trucks for unspecified means.

WikiLeaks hinted that the capabilites revealed in Tuesday's disclosure could have even darker utility than simply spying.

“It would permit the CIA to engage in nearly undetectable assassinations,” the release stated.

The site said the CIA additionally failed to disclose security vulnerabilities and bugs to major U.S. software manufacturers, violating an Obama administration commitment made in January 2014. Instead, the agency used the software vulnerabilities -- which could also be exploited by rival agencies, nations and groups -- for its own ends, WikiLeaks said.

“As an example, specific CIA malware revealed in ‘Year Zero’ is able to penetrate, infest and control both the Android phone and iPhone software that runs or has run presidential Twitter accounts,” the WikiLeaks release stated.

WikiLeaks also revealed the U.S. Consulate in Frankfurt is a hacking base, and the website provided the methods by which agents obfuscate customs officers to gain entry to Germany, pretending to provide technical consultation.

WikiLeaks said its source released the files because they believed questions surrounding the CIA’s reach “urgently need to be debated in public,” echoing the motives of many previous leakers.

Some of the files include redacted information, such as tens “of thousands of CIA targets and attack machines throughout Latin America, Europe and the United States.”

http://www.foxnews.com/us/2017...ng-capacity-cia.html
 
Posts: 5181 | Location: 20 miles north of hell | Registered: November 07, 2012Reply With QuoteReport This Post
Peace through
superior firepower
Picture of parabellum
posted Hide Post
OK
 
Posts: 107564 | Registered: January 20, 2000Reply With QuoteReport This Post
Now in Florida
Picture of ChicagoSigMan
posted Hide Post
There was this interesting tidbit in there:

CIA Can "Misdirect Attribution" of Cyber Attacks

"The CIA's Remote Devices Branch's UMBRAGE group collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation.

With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the "fingerprints" of the groups that the attack techniques were stolen from.

UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques."



Hmmmm....so now when we are told by the gubmint that Russia was behind a hack, how can we be sure???
 
Posts: 6063 | Location: FL | Registered: March 09, 2009Reply With QuoteReport This Post
Member
posted Hide Post
What happens when the CIA tries one of these misdirect programs or hacks on the Mossad, vice versa?


Jim
 
Posts: 1349 | Location: Southern Black Hills | Registered: September 14, 2012Reply With QuoteReport This Post
Funny Man
Picture of TXJIM
posted Hide Post
quote:
Originally posted by ChicagoSigMan:
There was this interesting tidbit in there:

CIA Can "Misdirect Attribution" of Cyber Attacks

"The CIA's Remote Devices Branch's UMBRAGE group collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation.

With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the "fingerprints" of the groups that the attack techniques were stolen from.

UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques."



Hmmmm....so now when we are told by the gubmint that Russia was behind a hack, how can we be sure???


The Democrats will blame it on a Russia ventriloquist.....


______________________________
“I'd like to know why well-educated idiots keep apologizing for lazy and complaining people who think the world owes them a living.”
― John Wayne
 
Posts: 7093 | Location: Austin, TX | Registered: June 29, 2010Reply With QuoteReport This Post
Member
Picture of Draal
posted Hide Post
The words "undetectable assassinations" meaning smart car hacks I gather. I'm going to need a bigger bag of popcorn.
 
Posts: 164 | Location: Oak Park, IL | Registered: July 21, 2015Reply With QuoteReport This Post
Do---or do not.
There is no try.
posted Hide Post
quote:
Originally posted by TXJIM:

The Democrats will blame it on a Russia ventriloquist.....



Which one---Paul Winchellevsky or Jeffamir Dunhamivich?
 
Posts: 4498 | Registered: January 01, 2004Reply With QuoteReport This Post
Oh stewardess,
I speak jive.
Picture of 46and2
posted Hide Post
quote:
so now when we are told by the gubmint that Russia was behind a hack, how can we be sure???

you/we can't. all we have is trust in our government to tell the truth, or the lack thereof.
 
Posts: 25613 | Registered: March 12, 2004Reply With QuoteReport This Post
10mm is The
Boom of Doom
Picture of Fenris
posted Hide Post
quote:
Originally posted by TXJIM:
quote:
Originally posted by ChicagoSigMan:
There was this interesting tidbit in there:

CIA Can "Misdirect Attribution" of Cyber Attacks

"The CIA's Remote Devices Branch's UMBRAGE group collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation.

With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the "fingerprints" of the groups that the attack techniques were stolen from.

UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques."



Hmmmm....so now when we are told by the gubmint that Russia was behind a hack, how can we be sure???


The Democrats will blame it on a Russia ventriloquist.....

These false clue strategies are hardly new, nor unique to CIA, which is one reason why the "WE KNOW RUSSIA DID IT" meme is so laughable.




The budget should be balanced, the Treasury should be refilled, public debt should be reduced, the arrogance of officialdom should be tempered and controlled, and the assistance to foreign lands should be curtailed lest Rome become bankrupt. People again must learn to work, instead of living on public assistance. ~ Cicero 55 BC

The Dhimocrats love America like ticks love a hound.
 
Posts: 17460 | Location: Northern Virginia | Registered: November 08, 2008Reply With QuoteReport This Post
Conveniently located directly
above the center of the Earth
Picture of signewt
posted Hide Post
quote:
Originally posted by 46and2:
quote:
so now when we are told by the gubmint that Russia was behind a hack, how can we be sure???

you/we can't. all we have is trust in our government to tell the truth, or the lack thereof.


We are now firmly in an era where whether they hacked or not, .gov can fabricate any story line they want, then unsay it a while later when Official Ministry of Truth Policy changes.

Many saw it coming and couldn't believe it would ever happen, except in fanciful novels.

Some know it happened, yet are morally bound to deny it due to oath/career/sense of duty.



Paging Winston Smith.....report to Room 101 immediately!!!!

Julia awaits introduction to your rat cage buddies.
 
Posts: 9854 | Location: sunny Orygun | Registered: September 27, 2009Reply With QuoteReport This Post
Member
Picture of downtownv
posted Hide Post
I'm Back in the USSR...
Shhh KGB CIA is everywhere


_________________________

https://www.teampython.com


 
Posts: 8353 | Location: 18 miles long, 6 Miles at Sea | Registered: January 22, 2012Reply With QuoteReport This Post
The Persian
Picture of PPGMD
posted Hide Post
quote:
Originally posted by Fenris:
quote:
Originally posted by TXJIM:
quote:
Originally posted by ChicagoSigMan:
There was this interesting tidbit in there:

CIA Can "Misdirect Attribution" of Cyber Attacks

"The CIA's Remote Devices Branch's UMBRAGE group collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation.

With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the "fingerprints" of the groups that the attack techniques were stolen from.

UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques."



Hmmmm....so now when we are told by the gubmint that Russia was behind a hack, how can we be sure???


The Democrats will blame it on a Russia ventriloquist.....

These false clue strategies are hardly new, nor unique to CIA, which is one reason why the "WE KNOW RUSSIA DID IT" meme is so laughable.


And it isn't just used by nation states. I remember one case where a clever white hat, reused a worm changing it instead to patch the vulnerability on infected systems and those not infected yet.


-------
A turbo: Exhaust gasses go into the turbocharger and spin it, witchcraft happens, and you go faster.

Mr. Doom and Gloom
"King in the north!"
"Slow is smooth... and also slow.
 
Posts: 20052 | Location: At the wall | Registered: February 13, 2008Reply With QuoteReport This Post
I have not yet begun
to procrastinate
posted Hide Post
This is going to get real interesting....


--------
After the game, the King and the pawn go into the same box.
 
Posts: 3775 | Location: Central AZ | Registered: October 26, 2006Reply With QuoteReport This Post
Peace through
superior firepower
Picture of parabellum
posted Hide Post
I know this may shock some of you but, I just don't care. Really, I don't.

"Oh, but this will mean bad yadda yadda yadda for the US..."

Sorry, I don't see it. I see a bunch of boobs playing cloak and dagger games and it all means nothing.


____________________________________________________

"I am your retribution." - Donald Trump, speech at CPAC, March 4, 2023
 
Posts: 107564 | Registered: January 20, 2000Reply With QuoteReport This Post
The Persian
Picture of PPGMD
posted Hide Post
The only thing that is shocking is that it appears that they didn't learn their lesson from Snowden. Don't give contractors the keys to the kingdom.


-------
A turbo: Exhaust gasses go into the turbocharger and spin it, witchcraft happens, and you go faster.

Mr. Doom and Gloom
"King in the north!"
"Slow is smooth... and also slow.
 
Posts: 20052 | Location: At the wall | Registered: February 13, 2008Reply With QuoteReport This Post
Member
posted Hide Post
quote:
Don't give contractors the keys to the kingdom.


Like every business in the country has done for cheap labor
 
Posts: 1403 | Registered: November 07, 2013Reply With QuoteReport This Post
Step by step walk the thousand mile road
Picture of Sig2340
posted Hide Post
quote:
Originally posted by snoris:
quote:
Originally posted by TXJIM:

The Democrats will blame it on a Russia ventriloquist.....



Which one---Paul Winchellevsky or Jeffamir Dunhamivich?


Your lips moved typing that.





Nice is overrated

"It's every freedom-loving individual's duty to lie to the government."
Airsoftguy, June 29, 2018
 
Posts: 31436 | Location: Loudoun County, Virginia | Registered: May 17, 2006Reply With QuoteReport This Post
Step by step walk the thousand mile road
Picture of Sig2340
posted Hide Post
Having read the lead story on Foxnews.com that the FBI is starting a witch hunt to find the person responsible, I can say without reservation that I'm glad I don't work as a contractor for CIA. Those poor schlubs are going to get polygraphed to death.





Nice is overrated

"It's every freedom-loving individual's duty to lie to the government."
Airsoftguy, June 29, 2018
 
Posts: 31436 | Location: Loudoun County, Virginia | Registered: May 17, 2006Reply With QuoteReport This Post
Peace through
superior firepower
Picture of parabellum
posted Hide Post
I am sick of the clownishness of people who are supposed to be "security experts". I am sick of every day seeing new stories about how 60 million accounts of some company or other have been hacked.
I am sick of government agencies displaying rampant ignorance. The CIA can't protect this data, which is supposed to be vital to national security? The CIA?? Think about that for a minute.

So, really, just fuck all of these idiots. Before too long, we'll hear of some theft from some other "vital" government system, even more outrageous and supposedly more harmful than even the CIA breach. This will be announced probably around the same time that we hear the same shit from the private sector- something like "XYZ Bank announces that 900 million accounts have been hacked."

You know its true. This shit gets bigger and more frequent every day. Just fuck all of these people. I'm going to live my life, and they can go on doing their stupid, bumbling, inept, incompetent bullshit, mmkay? Really, just fuck you.
 
Posts: 107564 | Registered: January 20, 2000Reply With QuoteReport This Post
Member
posted Hide Post
For all we know, somebody with better than average clearance clicked on a link in an email titled "12 HOT girls for the summer".

Not sense. Not intelligence. Not smarts. Just better than average clearance.


***************************
Knowing more by accident than on purpose.
 
Posts: 14186 | Location: Tampa, Florida | Registered: December 12, 2003Reply With QuoteReport This Post
  Powered by Social Strata Page 1 2  
 

SIGforum.com    Main Page  Hop To Forum Categories  The Lounge    WikiLeaks releases 'entire hacking capacity of the CIA'

© SIGforum 2024