Virgil Showlion
Distinguished Associate
Moderator
[b]leones potest resistere[/b]
Joined: Dec 20, 2010 15:19:33 GMT -5
Posts: 27,448
|
Vault 7
Mar 7, 2017 18:19:48 GMT -5
Post by Virgil Showlion on Mar 7, 2017 18:19:48 GMT -5
I'm surprised nobody has started a thread on this yet. The latest big thing from Wikileaks, according to ZH: WikiLeaks has published what it claims is the largest ever release of confidential documents on the CIA. It includes more than 8,000 documents as part of ‘Vault 7’, a series of leaks on the agency, which have allegedly emerged from the CIA's Center For Cyber Intelligence in Langley, ... .
A total of 8,761 documents have been published as part of ‘Year Zero’, the first in a series of leaks the whistleblower organization has dubbed ‘Vault 7.’ WikiLeaks said that ‘Year Zero’ revealed details of the CIA’s “global covert hacking program,” including “weaponized exploits” used against company products including “Apple's iPhone, Google's Android and Microsoft's Windows and even Samsung TVs, which are turned into covert microphones.”
WikiLeaks tweeted the leak, which it claims came from a network inside the CIA’s Center for Cyber Intelligence in Langley, Virginia.
Among the more notable disclosures which, if confirmed, "would rock the technology world", the CIA had managed to bypass encryption on popular phone and messaging services such as Signal, WhatsApp and Telegram. According to the statement from WikiLeaks, government hackers can penetrate Android phones and collect “audio and message traffic before encryption is applied.”
Another profound revelation is that the CIA can engage in "false flag" cyberattacks which portray Russia as the assailant. Discussing the CIA's Remote Devices Branch's UMBRAGE group, Wikileaks' source notes that it "collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation.
"With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the "fingerprints" of the groups that the attack techniques were stolen from. UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques." The article is extensive and I encourage everyone to read it to get an idea of the allegations. In particular, take a look at the section "Examples of CIA projects". What's the buzz about this on the news down there? According to ZH, "WikiLeaks has asserted that it has not mined the entire leak and has only verified it, asking that journalists and activists do the leg work." Discuss.
|
|
Spellbound454
Senior Member
"In the end, we remember not the words of our enemies but the silence of our friends"
Joined: Sept 9, 2011 17:28:42 GMT -5
Posts: 3,990
|
Vault 7
Mar 7, 2017 18:29:35 GMT -5
Post by Spellbound454 on Mar 7, 2017 18:29:35 GMT -5
Are we surprised? Its all part of the current game rules....(which is no rules at all and anything which gains an advantage)
|
|
Rob Base 2.0
Well-Known Member
Joined: Feb 23, 2017 18:12:07 GMT -5
Posts: 1,538
|
Vault 7
Mar 7, 2017 18:32:55 GMT -5
Post by Rob Base 2.0 on Mar 7, 2017 18:32:55 GMT -5
I'm still waiting for dudes from Project Veritas thingee on CNN that O'Keefe dude was hyping last week.....whatevs happened to that?
|
|
Tennesseer
Member Emeritus
Joined: Dec 20, 2010 21:58:42 GMT -5
Posts: 63,612
|
Vault 7
Mar 7, 2017 18:39:21 GMT -5
Post by Tennesseer on Mar 7, 2017 18:39:21 GMT -5
I'm still waiting for dudes from Project Veritas thingee on CNN that O'Keefe dude was hyping last week.....whatevs happened to that?
|
|
djAdvocate
Member Emeritus
only posting when the mood strikes me.
Joined: Jun 21, 2011 12:33:54 GMT -5
Posts: 75,233
Mini-Profile Background: {"image":"","color":"000307"}
|
Vault 7
Mar 7, 2017 18:40:34 GMT -5
Post by djAdvocate on Mar 7, 2017 18:40:34 GMT -5
I'm still waiting for dudes from Project Veritas thingee on CNN that O'Keefe dude was hyping last week.....whatevs happened to that? it landed with a thud, and yielded nothing. that's what happens when he can't selectively edit stuff to make it seem like something it isn't.
|
|
Virgil Showlion
Distinguished Associate
Moderator
[b]leones potest resistere[/b]
Joined: Dec 20, 2010 15:19:33 GMT -5
Posts: 27,448
|
Vault 7
Mar 7, 2017 18:42:25 GMT -5
Post by Virgil Showlion on Mar 7, 2017 18:42:25 GMT -5
I'm still waiting for dudes from Project Veritas thingee on CNN that O'Keefe dude was hyping last week.....whatevs happened to that? Never heard of it.
|
|
Virgil Showlion
Distinguished Associate
Moderator
[b]leones potest resistere[/b]
Joined: Dec 20, 2010 15:19:33 GMT -5
Posts: 27,448
|
Vault 7
Mar 7, 2017 18:45:32 GMT -5
Post by Virgil Showlion on Mar 7, 2017 18:45:32 GMT -5
Are we surprised? Its all part of the current game rules....(which is no rules at all and anything which gains an advantage) This "Vault 7" is far worse than what I felt the CIA would dare engage in. Buried in the article is also the allegation that the CIA isn't particularly airtight when it comes to not sharing their hacking suites with contractors, connected politicians, etc. Hence it's not just the CIA we have to worry about if the allegations are true.
|
|
Rob Base 2.0
Well-Known Member
Joined: Feb 23, 2017 18:12:07 GMT -5
Posts: 1,538
|
Vault 7
Mar 7, 2017 18:46:41 GMT -5
Post by Rob Base 2.0 on Mar 7, 2017 18:46:41 GMT -5
|
|
Virgil Showlion
Distinguished Associate
Moderator
[b]leones potest resistere[/b]
Joined: Dec 20, 2010 15:19:33 GMT -5
Posts: 27,448
|
Post by Virgil Showlion on Mar 7, 2017 18:49:23 GMT -5
Ohhhhh yes. I take it back. We did talk about this in one thread.
|
|
Spellbound454
Senior Member
"In the end, we remember not the words of our enemies but the silence of our friends"
Joined: Sept 9, 2011 17:28:42 GMT -5
Posts: 3,990
|
Vault 7
Mar 7, 2017 18:53:41 GMT -5
Post by Spellbound454 on Mar 7, 2017 18:53:41 GMT -5
Are we surprised? Its all part of the current game rules....(which is no rules at all and anything which gains an advantage) This "Vault 7" is far worse than what I felt the CIA would dare engage in. Buried in the article is also the allegation that the CIA isn't particularly airtight when it comes to not sharing their hacking suites with contractors, connected politicians, etc. Hence it's not just the CIA we have to worry about if the allegations are true. I just read a brief synopsis on the Beeb ...Spyware for consumer devices mostly. I'll take another look tomorrow
|
|
Tennesseer
Member Emeritus
Joined: Dec 20, 2010 21:58:42 GMT -5
Posts: 63,612
|
Post by Tennesseer on Mar 7, 2017 19:03:48 GMT -5
|
|
Rob Base 2.0
Well-Known Member
Joined: Feb 23, 2017 18:12:07 GMT -5
Posts: 1,538
|
Post by Rob Base 2.0 on Mar 9, 2017 8:24:34 GMT -5
If I missed Vaults 1 through 6, can I still look at 7 and still understand it?
|
|
Value Buy
Senior Associate
Joined: Dec 20, 2010 17:57:07 GMT -5
Posts: 18,680
Today's Mood: Getting better by the day!
Location: In the middle of enjoying retirement!
Favorite Drink: Zombie Dust from Three Floyd's brewery
Mini-Profile Name Color: e61975
Mini-Profile Text Color: 196ce6
|
Post by Value Buy on Mar 9, 2017 8:27:27 GMT -5
Anyone else think the CIA had already gone to Vault 8 and vault 7 is already obsolete?
There goes another black helicopter hovering over the house right now!
|
|