Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Vault 7: CIA Hacking Tools Revealed (Wikileaks unveils the CIA)
Wikileaks ^ | 3/7/2017 | Wikileaks

Posted on 03/07/2017 6:12:05 AM PST by Ultra Sonic 007

Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named "Vault 7" by WikiLeaks, it is the largest ever publication of confidential documents on the agency.

The first full part of the series, "Year Zero", comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA's Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election.

Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized "zero day" exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

"Year Zero" introduces the scope and direction of the CIA's global covert hacking program, its malware arsenal and dozens of "zero day" weaponized exploits against a wide range of U.S. and European company products, include Apple's iPhone, Google's Android and Microsoft's Windows and even Samsung TVs, which are turned into covert microphones.

Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA). The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force — its own substantial fleet of hackers. The agency's...

(Excerpt) Read more at wikileaks.org ...


TOPICS: Breaking News; Constitution/Conservatism; Crime/Corruption; Government
KEYWORDS: brennan; brennancia; cci; cia; ciahacking; ciahackingarsenal; crowdstrike; deepstate; dmitrialperovitch; dncemailhack; dnchack; obama; obamagate; shadowgovernment; trump; vault7; vault7graphic; wiki; wikileaks
Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-80 ... 201-211 next last
To: Red Badger

SAT phone safe...


41 posted on 03/07/2017 6:50:13 AM PST by seeker41 (Trump Save America)
[ Post Reply | Private Reply | To 38 | View Replies]

To: seeker41

SAT phone safe? You decide.........

https://en.wikipedia.org/wiki/Iridium_Communications


42 posted on 03/07/2017 6:52:22 AM PST by Red Badger (If "Majority Rule" was so important in South Africa, why isn't it that way here?.......)
[ Post Reply | Private Reply | To 41 | View Replies]

To: Ultra Sonic 007

It’ll be cool when Brennon, Snowden and Assange are all in prison.


43 posted on 03/07/2017 6:55:46 AM PST by ifinnegan (Democrats kill babies and harvest their organs to sell)
[ Post Reply | Private Reply | To 1 | View Replies]

To: All

4D chess.

Trump knew this was coming out this week. He made his allegations about wiretapping this weekend. Leftists and their MSM goons say it could never happen.

Wikileaks dumps proof the CIA was hacking everyone every which way possible. BOOM!


44 posted on 03/07/2017 6:55:51 AM PST by TigerClaws
[ Post Reply | Private Reply | To 1 | View Replies]

To: silverleaf
I wonder how he shielded it

I don't know, but John McCain's current method of espionage appears to be getting on a jet - or putting an absolutely trusted surrogate on a jet - and flying across the world to have a face-to-face meeting in a secure room or hand off notes in person.

(in my best John McCain voice) "You can't wiretap The Maverick, my friends! I'm a little too sharp for you."

Mr. niteowl77

45 posted on 03/07/2017 7:04:43 AM PST by niteowl77
[ Post Reply | Private Reply | To 13 | View Replies]

To: hapnHal

All devices are hackable given enough time and money.


46 posted on 03/07/2017 7:06:19 AM PST by FlatLandBeer
[ Post Reply | Private Reply | To 19 | View Replies]

To: Ultra Sonic 007

The CIA interfered in the 2004 election against the incumbent President.


47 posted on 03/07/2017 7:09:25 AM PST by cll (Serviam!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Ultra Sonic 007

So, once again Trump seems prophetic, or perhaps he had foreknowledge and he was setting the stage with his call for surveillance investigation.


48 posted on 03/07/2017 7:11:51 AM PST by binreadin
[ Post Reply | Private Reply | To 1 | View Replies]

To: Ultra Sonic 007

Interesting.


49 posted on 03/07/2017 7:13:12 AM PST by b4its2late (A Liberal is a person who will give away everything he doesn't own.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Beach333
CIA malware targets iPhone, Android, smart TVs

CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA's DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details).

The EDG is responsible for the development, testing and operational support of all backdoors, exploits, malicious payloads, trojans, viruses and any other kind of malware used by the CIA in its covert operations world-wide.

The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell's 1984, but "Weeping Angel", developed by the CIA's Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.

The attack against Samsung smart TVs was developed in cooperation with the United Kingdom's MI5/BTSS. After infestation, Weeping Angel places the target TV in a 'Fake-Off' mode, so that the owner falsely believes the TV is off when it is on. In 'Fake-Off' mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.

As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.

The CIA's Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones. Infected phones can be instructed to send the CIA the user's geolocation, audio and text communications as well as covertly activate the phone's camera and microphone.

Despite iPhone's minority share (14.5%) of the global smart phone market in 2016, a specialized unit in the CIA's Mobile Development Branch produces malware to infest, control and exfiltrate data from iPhones and other Apple products running iOS, such as iPads. CIA's arsenal includes numerous local and remote "zero days" developed by CIA or obtained from GCHQ, NSA, FBI or purchased from cyber arms contractors such as Baitshop. The disproportionate focus on iOS may be explained by the popularity of the iPhone among social, political, diplomatic and business elites.

A similar unit targets Google's Android which is used to run the majority of the world's smart phones (~85%) including Samsung, HTC and Sony. 1.15 billion Android powered phones were sold last year. "Year Zero" shows that as of 2016 the CIA had 24 "weaponized" Android "zero days" which it has developed itself and obtained from GCHQ, NSA and cyber arms contractors.

These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the "smart" phones that they run on and collecting audio and message traffic before encryption is applied.

50 posted on 03/07/2017 7:13:56 AM PST by COUNTrecount
[ Post Reply | Private Reply | To 22 | View Replies]

To: Ultra Sonic 007

Interesting.


51 posted on 03/07/2017 7:14:19 AM PST by b4its2late (A Liberal is a person who will give away everything he doesn't own.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Ultra Sonic 007

https://www.reddit.com/r/The_Donald/comments/5y0dn0/official_wikileaks_vault_7_release_thread_post/

Live thread of people on The_Donald combing through the stack.


52 posted on 03/07/2017 7:15:21 AM PST by VanDeKoik
[ Post Reply | Private Reply | To 1 | View Replies]

To: Freee-dame

Amusing that the book originating the term “Utopia” was a satire lambasting such idealism.


53 posted on 03/07/2017 7:18:46 AM PST by ctdonath2 (Understand the Left: "The issue is never the issue. The issue is always the Revolution.")
[ Post Reply | Private Reply | To 30 | View Replies]

To: Ultra Sonic 007; All

Did anyone see this in the link above? Just scroll down....

“Wikileaks claims US consulate in Frankfurt used as covert base for CIA hackers covering Europe, Middle East and Africa”

U.S. Consulate in Frankfurt is a covert CIA hacker base
In addition to its operations in Langley, Virginia the CIA also uses the U.S. consulate in Frankfurt as a covert base for its hackers covering Europe, the Middle East and Africa.

CIA hackers operating out of the Frankfurt consulate ( “Center for Cyber Intelligence Europe” or CCIE) are given diplomatic (”black”) passports and State Department cover. The instructions for incoming CIA hackers make Germany’s counter-intelligence efforts appear inconsequential: “Breeze through German Customs because you have your cover-for-action story down pat, and all they did was stamp your passport”

Your Cover Story (for this trip)
Q: Why are you here?
A: Supporting technical consultations at the Consulate.

Two earlier WikiLeaks publications give further detail on CIA approaches to customs and secondary screening procedures.

Once in Frankfurt CIA hackers can travel without further border checks to the 25 European countries that are part of the Shengen open border area — including France, Italy and Switzerland.

A number of the CIA’s electronic attack methods are designed for physical proximity. These attack methods are able to penetrate high security networks that are disconnected from the internet, such as police record database. In these cases, a CIA officer, agent or allied intelligence officer acting under instructions, physically infiltrates the targeted workplace. The attacker is provided with a USB containing malware developed for the CIA for this purpose, which is inserted into the targeted computer. The attacker then infects and exfiltrates data to removable media. For example, the CIA attack system Fine Dining, provides 24 decoy applications for CIA spies to use. To witnesses, the spy appears to be running a program showing videos (e.g VLC), presenting slides (Prezi), playing a computer game (Breakout2, 2048) or even running a fake virus scanner (Kaspersky, McAfee, Sophos). But while the decoy application is on the screen, the underlaying system is automatically infected and ransacked.


54 posted on 03/07/2017 7:19:21 AM PST by Enlightened1
[ Post Reply | Private Reply | To 1 | View Replies]

To: Ultra Sonic 007
This is an organizational chart, incomplete, but was put together from the documents in Vault 7.I have zoomed in on the highlighted area.

Those are some scary department nems....

The whole chart is here.

taken from the bottom of the page here Wikileaks Vault 7 Home

55 posted on 03/07/2017 7:19:41 AM PST by GregNH (If you can't fight, please find a good place to hide!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ifinnegan

It’ll be cool when Brennon, Snowden and Assange are all in prison.


Snowden and Assange have exposed deep corruption in these spy agencies. Corruption that has turned the agencies from protecting the American people to protecting the agencies own interests.


56 posted on 03/07/2017 7:22:26 AM PST by Flick Lives (I want to live long enough to see all Deep State operatives executed)
[ Post Reply | Private Reply | To 43 | View Replies]

To: Red Badger; I want to know; All

>
And what will those who now have this arsenal be able to do with it? They now have the hacking capacity of the CIA.

IRS, ATF, DEA, Your state LEOs, Your county Sheriff, The bratty kid next door......Happy goldfish bowl!...........................
>

And McAfee, Kaspersky, Norton, etc.

IMO, another great boom for We the People and White/Grey hackers to help improve our privacy and security.

Snowden was the shoe in the door to the Deep State.


57 posted on 03/07/2017 7:23:34 AM PST by i_robot73 ("A man chooses. A slave obeys." - Andrew Ryan)
[ Post Reply | Private Reply | To 28 | View Replies]

To: Chauncey Gardiner
“Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency...”

Since the imam-in-chief’s election and his appointment of fellow muslim Brennan in charge of the CIA.


2001. Since George W. started allowing deep-state globalists to define his response to 9-11.


58 posted on 03/07/2017 7:29:39 AM PST by Buckeye McFrog
[ Post Reply | Private Reply | To 10 | View Replies]

To: Ultra Sonic 007

59 posted on 03/07/2017 7:29:40 AM PST by Enlightened1
[ Post Reply | Private Reply | To 1 | View Replies]

To: Enlightened1
These attack methods are able to penetrate high security networks that are disconnected from the internet, such as police record database. In these cases, a CIA officer, agent or allied intelligence officer acting under instructions, physically infiltrates the targeted workplace.The attacker is provided with a USB containing malware developed for the CIA for this purpose, which is inserted into the targeted computer. The attacker then infects and exfiltrates data to removable media.

This is really frightening!

60 posted on 03/07/2017 7:33:06 AM PST by seeker41 (Trump Save America)
[ Post Reply | Private Reply | To 54 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-80 ... 201-211 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson