PDA

View Full Version : Vault 7: part 3: How the CIA covered its tracks giving hack tools to insurgents




UWDude
03-31-2017, 09:10 AM
https://twitter.com/wikileaks/status/847749901010124800
https://twitter.com/wikileaks/status/847749901010124800

https://pbs.twimg.com/media/C8PP5p_UIAAInNj.jpg

pcosmar
03-31-2017, 09:27 AM
and the band played on


:(

Athan
03-31-2017, 10:33 AM
We really need to disband these guys. Seriously they come off completely anti-American and more dangerous than fucking Al-Queda and Isis combined. I don't know who's side they are on other than the anti-American islamic caliphate.

UWDude
03-31-2017, 10:40 PM
They are opening up doors to trouble everywhere. They are trying to use viruses as weapons, and massive blowback is about to happen. Now that the exploits are known, people will trap them. Some who already knew about this, like wikileaks, very likely has the same exact weapons now. Since the CIA didn't find out about the leaks until it was too late.

CIA didn't care it was releasing cyber-bioweapons into the internet-sphere. They were just giving them to their terrorist friends too, like Al Nusra and ISIS.

merkelstan
04-01-2017, 08:38 AM
true power is unlibertarian and requires control of information - seeing who is saying what, doing what.

also control of the press

and the schools

and none of this 'lawfulness'

[EDIT] and the central bank / printing press

AZJoe
04-01-2017, 10:46 AM
http://allnewspipeline.com/images/ciaRussianHackers1.jpg

AZJoe
04-01-2017, 10:51 AM
From ActivitPost (http://www.activistpost.com/2017/03/wikileaks-vault-7-reveals-cia-can-disguise-hacks-malware-russian-chinese.html):

With each release from these Vault 7 leaks, it becomes more apparent that everything we thought the CIA might get in this 1984 (http://www.activistpost.com/product/1328869334/US/permacultucom-20/?cart=y)-esque world — they already have. ...

Over the course of the last 4 months, the deep state has claimed — without evidence — that Russia has interfered in US elections. With this technology, the CIA could theoretically present the evidence it needs to “prove” Russian meddling. ...

the CIA could create a virus that would potentially devastate entire systems — and then blame it on anyone they want.

As Leak of Nations reports (http://leakofnations.com/cia-shadowed-a-black-hat-hackers-conference-in-order-to-deliver-their-sonic-screwdriver-mac-exploit-wikileaks-vault7-sonic-screwdriver-thunderstrike/), in the second batch of ‘Vault 7’ documents, WikiLeaks released a user guide for Sonic Screwdriver – an implant on the Apple Thunderbolt-to-USB converter that allows code to be booted onto an attached device, even if the device is password-protected.
What this means is that the CIA can infect the firmware of Macs at the core of the system with a trojan horse. Having a proverbial ocean of computers to choose from, the CIA could then pick one of those infected computers, launch an attack, use Marble to cover it up and blame it on whomever they wish.

It is no wonder Ubuntu founder Mark Shuttleworth called this “a trojan horse of monumental proportions.”

For now, however, the only one to be caught hacking US elections is the Department of Homeland Security. As the Free Thought Project previously reported, the Department of Homeland Security, under the Obama administration, attempted to hack the Indiana State electoral system nearly 15,000 times.

Prior to the hacks in Indiana, it was the State of Georgia to expose DHS meddling in their elections. ...

http://www.activistpost.com/2017/03/wikileaks-vault-7-reveals-cia-can-disguise-hacks-malware-russian-chinese.html

AZJoe
04-01-2017, 10:57 AM
The source code released reveals Marble contains test examples in Chinese, Russian, Korean, Arabic and Farsi.

847773877954543616
“This would permit a forensic attribution double game, for example by pretending that the spoken language of the malware creator was not American English, but Chinese, but then showing attempts to conceal the use of Chinese, drawing forensic investigators even more strongly to the wrong conclusion,”
Wikileaks: Marble (https://wikileaks.org/vault7/?marble#Marble%20Framework)