Wiki 2.0 the CIA files....

VaticanAssassin

God Mod
Joined
Jul 21, 2011
Posts
12,391
https://wikileaks.org/ciav7p1/

Rut roh....

NSA vs CIA?

The USA manipulated elections across Europe?

And now we know why Zuck tapes his web cam..

Should I tape my phone as well?

Where is Mike Yates? Bet the CIA got him.
 
Last edited:
Hmmmmmmm............


"The CIA's Remote Devices Branch's UMBRAGE group collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation.

With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the "fingerprints" of the groups that the attack techniques were stolen from."
 
Hmmmmmmm............


"The CIA's Remote Devices Branch's UMBRAGE group collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation.

With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the "fingerprints" of the groups that the attack techniques were stolen from."

Originally there was legal language in the enabling legislation regulating the Cable market that prevents them from remotely monitoring activity within households where their devices are installed. But somehow it either no longer exists, or it's being ignored completely.

Here's an article explaining the threat:

https://www.forbes.com/sites/joseph...ng-on-you-even-in-your-own-home/#1522485eb859
 
I doubt the Russians or the Chinese have the abilities of western agencies with Yank tech support. They may be more likely to use them and be suspected of using them. In the technical department of computers and shit no one can touch the west. Not in retaliatory capabilities.

You got issues with domestic agencies looking at you. Imagine how the much more the rest of the world gets tapped, intercepted and decoded.

We talk personal info and national security. Commercial traffic is SO much bigger and more lucrative. Look up ECHELON. The Five Eyes have their eyes all over the world and in space.
 
I doubt the Russians or the Chinese have the abilities of western agencies with Yank tech support. They may be more likely to use them and be suspected of using them. In the technical department of computers and shit no one can touch the west. Not in retaliatory capabilities.

You got issues with domestic agencies looking at you. Imagine how the much more the rest of the world gets tapped, intercepted and decoded.

We talk personal info and national security. Commercial traffic is SO much bigger and more lucrative. Look up ECHELON. The Five Eyes have their eyes all over the world and in space.

Commercial is where the $ is at no doubt.

But it is not nearly as fun as developing the ability hack a smart cars to assassinate someone!!

That is some Mike Yates level awesomeness right there....
 
Hmmmmmmm............


"The CIA's Remote Devices Branch's UMBRAGE group collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation.

With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the "fingerprints" of the groups that the attack techniques were stolen from."

Reread that carefully. They massaged Russian made malware and redeployed it so that if it was detected it would appear that the Russians were behind the hacking attempt.

Is any of this ringing a bell with anyone?

Ishmael
 
Reread that carefully. They massaged Russian made malware and redeployed it so that if it was detected it would appear that the Russians were behind the hacking attempt.

Is any of this ringing a bell with anyone?

Ishmael

Yes, Obama could have hacked the election and Hillary still lost.:D
 
Commercial is where the $ is at no doubt.

But it is not nearly as fun as developing the ability hack a smart cars to assassinate someone!!

That is some Mike Yates level awesomeness right there....

Bet that is not that difficult. A directed EMP can kill an engine at an opportune time. With cars on the web and access to manufacturers info that capability is close.

Now do it from space with a real time camera reading the plate number and an up-jumped drone operator with his finger on the button.
 
Reread that carefully. They massaged Russian made malware and redeployed it so that if it was detected it would appear that the Russians were behind the hacking attempt.

Is any of this ringing a bell with anyone?

Ishmael

Did you honestly think that is not why I mentioned it?:cool:
 
The craziest hypocrisy is that Podesta (Hillary's campaign manager) accepted $170,000 in Russian bribes during the campaign to make the sanctions go away ... and yet the Dems have been on a witch hunt accusing Trump's administration of cavorting with the Russians during the campaign.
 
Did you honestly think that is not why I mentioned it?:cool:

Oh, it gets even better.

Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized "zero day" exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

So now we have God only knows who in possession of that code for God only knows how long? The aliasing of that malware has to be so authentic as to be indistinguishable from the real deal. So anyone that had access to that software could have hacked Hillary et al and the FBI/CIA would blame it on the Russians when they were snookered by their own software.

Sooooooo, the hacker could have used "Umbrage" to hack Hillary et al giving far more credibility to Assange's steadfast claim that the source WAS NOT the Russians.

Ishmael
 
Have you noticed the part about the CIA hacking ability and making it look like the Russians or anyone else did it?
 
From Vault 7:

"CIA malware targets iPhone, Android, smart TVs

CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA's DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details).

The EDG is responsible for the development, testing and operational support of all backdoors, exploits, malicious payloads, trojans, viruses and any other kind of malware used by the CIA in its covert operations world-wide.

The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell's 1984, but "Weeping Angel", developed by the CIA's Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.

The attack against Samsung smart TVs was developed in cooperation with the United Kingdom's MI5/BTSS. After infestation, Weeping Angel places the target TV in a 'Fake-Off' mode, so that the owner falsely believes the TV is off when it is on. In 'Fake-Off' mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.

As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations."
 
Gee, I wonder how this can be misused:

UMBRAGE

"The CIA's hand crafted hacking techniques pose a problem for the agency. Each technique it has created forms a "fingerprint" that can be used by forensic investigators to attribute multiple different attacks to the same entity.

This is analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible. As soon one murder in the set is solved then the other murders also find likely attribution.

The CIA's Remote Devices Branch's UMBRAGE group collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation.

With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the "fingerprints" of the groups that the attack techniques were stolen from.

UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques."
 
Jesus christ... No doubt they let the computer geeks name this shit:

Weeping Angel -- Things you might do
Extract browser credentials or history
Extract WPA/WiFi credentials
Insert Root CA cert to facilitate MitM of browser, remote access, or Adobe application
Investigate the Remote Access feature
Investigate any listening ports & their respective services
Attempt to override /etc/hosts for blocking Samsung updates without DNS query and iptables (referred to by SamyGo)
Add ntpclient update calls to startup scripts to sync implant's system time for accurate audio collection timestamps

MaddeningWhispers
Concept of Operations
MaddeningWhispers is a set of software components that provide beaconing and remote access capabilities to a Vanguard-based device (ET project). This proof-of-concept project is done in conjunction with ESD/CNB.

Gyrfalcon
Project Objective:
Linux capability that ptraces an OpenSSH client collecting username, password, TCP/IP connections, and session data.
 
Last edited:
The craziest hypocrisy is that Podesta (Hillary's campaign manager) accepted $170,000 in Russian bribes during the campaign to make the sanctions go away ... and yet the Dems have been on a witch hunt accusing Trump's administration of cavorting with the Russians during the campaign.

Probably not so much crazy as calculating. I wouldn't be surprised if this whole but but but the Russians thing is really about inoculating all of the people involved with Hillary's Russian pay for outcome.

It makes it harder for Trump's justice department to finish their investigation of the Clinton Foundation when the clintons will just say this is just to divert attention from "the Russian THING."
 
so basicaly...

-The CIA can masquerade its malware as belonging to a foreign intelligence agency.
-The CIA stole hacking malware from the Russian Federation for their own use.
-The CIA is hacking everyone, including US citizens.
-Every microphone and webcam is remote controllable.
-The CIA’s exploits have been leaked internally and can be used by unauthorized people to gain access to virtually anything.
-CIA malware can infiltrate iPhones, Androids, Windows Phones, and even your smart TV.
-The U.S. consulate in Frankfurt is a covert CIA hacker base.
-The CIA created air gap jumping viruses that infect CDs, DVDs, flash drives, etc.
-The CIA created malware that specifically evaded certain anti-virus programs.
-The CIA can hack cars for “undetectable assassinations”
-CIA malware can infiltrate your macOS and Windows computers.
-CIA malware infiltrates your smartphone to read messages on encrypted apps, before you send them.
-CIA malware can infiltrate Linux and routers.
-The CIA was supposed to reveal major vulnerabilities, but instead, hoarded them for their own use.
-Notepad++, a popular text editor, has a DLL hijack.
 
We now live in Orwell's 1984, at least so far as government surveillance goes.

"You have zero privacy anyway. Get over it."

-- Scott McNealy
 
Last edited:
I read the Peter Wright book on MI5. He details how back in the 50s a phone could be activated with an EMP pulse sent down the phone line and then used as a microphone. I'm susre spy agencies have kept up with the latest phone technology.

https://en.wikipedia.org/wiki/Peter_Wright#Intelligence_career_highlights

Back in the early 1960s I used a program on an IBM 1401 mainframe to play God Save The Queen through the loudspeaker of a transistor radio that was switched off and had its batteries removed.

It was an IBM supplied program. I copied and changed it so it would play Colonel Bogey.
 
Back
Top