Free Republic
Browse · Search
News/Activism
Topics · Post Article

This thread has been locked, it will not receive new replies.
Locked on 03/31/2017 7:11:16 AM PDT by Sidebar Moderator, reason:

http://www.freerepublic.com/focus/f-news/3539691/posts



Skip to comments.

Latest WikiLeaks release shows how the CIA uses computer code to hide the origins of its hacking..
Daily Mail ^ | March 31, 2017

Posted on 03/31/2017 5:10:53 AM PDT by maggief

WikiLeaks has published hundreds more files today which it claims show the CIA went to great lengths to disguise its own hacking attacks and point the finger at Russia, China, North Korea and Iran.

The 676 files released today are part of WikiLeaks' Vault 7 tranche of files and they claim to give an insight into the CIA's Marble software, which can forensically disguise viruses, trojans and hacking attacks.

WikiLeaks says the source code suggests Marble has test examples in Chinese, Russian, Korean, Arabic and Farsi (the Iranian language).

It says: 'This would permit a forensic attribution double game, for example by pretending that the spoken language of the malware creator was not American English, but Chinese.'

This could lead forensic investigators into wrongly concluding that CIA hacks were carried out by the Kremlin, the Chinese government, Iran, North Korea or Arabic-speaking terror groups such as ISIS.

(Excerpt) Read more at dailymail.co.uk ...


TOPICS: Culture/Society; Foreign Affairs; News/Current Events; Russia
KEYWORDS: ciacode; ciahacking
Full title:

Latest WikiLeaks release shows how the CIA uses computer code to hide the origins of its hacking attacks and 'disguise them as Russian or Chinese activity'

1 posted on 03/31/2017 5:10:53 AM PDT by maggief
[ Post Reply | Private Reply | View Replies]

To: maggief

https://wikileaks.org/vault7/?marble#Marble

Marble Framework
31 March, 2017

Today, March 31st 2017, WikiLeaks releases Vault 7 “Marble” — 676 source code files for the CIA’s secret anti-forensic Marble Framework. Marble is used to hamper forensic investigators and anti-virus companies from attributing viruses, trojans and hacking attacks to the CIA.

Marble does this by hiding (”obfuscating”) text fragments used in CIA malware from visual inspection. This is the digital equivallent of a specalized CIA tool to place covers over the english language text on U.S. produced weapons systems before giving them to insurgents secretly backed by the CIA.

Marble forms part of the CIA’s anti-forensics approach and the CIA’s Core Library of malware code. It is “[D]esigned to allow for flexible and easy-to-use obfuscation” as “string obfuscation algorithms (especially those that are unique) are often used to link malware to a specific developer or development shop.”

The Marble source code also includes a deobfuscator to reverse CIA text obfuscation. Combined with the revealed obfuscation techniques, a pattern or signature emerges which can assist forensic investigators attribute previous hacking attacks and viruses to the CIA. Marble was in use at the CIA during 2016. It reached 1.0 in 2015.

The source code shows that Marble has test examples not just in English but also in Chinese, Russian, Korean, Arabic and Farsi. This would permit a forensic attribution double game, for example by pretending that the spoken language of the malware creator was not American English, but Chinese, but then showing attempts to conceal the use of Chinese, drawing forensic investigators even more strongly to the wrong conclusion, -— but there are other possibilities, such as hiding fake error messages.

The Marble Framework is used for obfuscation only and does not contain any vulnerabilties or exploits by itself.


2 posted on 03/31/2017 5:11:43 AM PDT by maggief
[ Post Reply | Private Reply | To 1 | View Replies]

To: maggief

Rubio claim DEM was hacked by location in Russia. Maybe it was CIA


3 posted on 03/31/2017 5:13:00 AM PDT by 4rcane
[ Post Reply | Private Reply | To 1 | View Replies]

To: maggief

FBI went snooping at Trump tower, after pings coming from Russia. How do they know Trump servers was pinged from Russia without being the source of the pings or getting having acess to Trump tower servers first


4 posted on 03/31/2017 5:15:32 AM PDT by 4rcane
[ Post Reply | Private Reply | To 1 | View Replies]

To: maggief

You know, if the CIA keeps effing around, they are likely to cause a real cyber attack and America will suffer greatly. I’m sure by now the Russians are super pissed and will seek retribution.


5 posted on 03/31/2017 5:15:58 AM PDT by New Jersey Realist (The only thing necessary for the triumph of evil is for good men to do nothing. Edmund Burke)
[ Post Reply | Private Reply | To 1 | View Replies]

To: maggief

These leaks are not helpful. We know what the CIA does, but making it this public will (1) make it harder for the CIA to blame the Russians for their own efforts, and not just their efforts to protect Agency funding in the most recent election, and (2) potentially provoke other countries to turn against us to an even greater extent than the CIA has already turned against us.


6 posted on 03/31/2017 5:27:28 AM PDT by Pollster1 ("Governments derive their just powers from the consent of the governed")
[ Post Reply | Private Reply | To 1 | View Replies]

To: maggief
And my confiscated tax contributions pay for this nastiness. B S
7 posted on 03/31/2017 5:27:37 AM PDT by polymuser (There's a yuuuge basket of deportables.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: maggief
I have extremely low trust in the CIA. Especially under Brennan.
8 posted on 03/31/2017 5:29:38 AM PDT by boycott
[ Post Reply | Private Reply | To 1 | View Replies]

To: Pollster1

These leaks are not helpful. We know what the CIA does, but making it this public will (1) make it harder for the CIA to blame the Russians for their own efforts, and not just their efforts to protect Agency funding in the most recent election, and (2) potentially provoke other countries to turn against us to an even greater extent than the CIA has already turned against us.


If it exposes the corrupt CIA under obama and Brennan, it is helpful. The CIA has been out of control for far too long.


9 posted on 03/31/2017 5:31:57 AM PDT by boycott
[ Post Reply | Private Reply | To 6 | View Replies]

To: 4rcane

Rubio claim DEM was hacked by location in Russia. Maybe it was CIA

The ability to hack and make it appear to be from somewhere else isn’t knew. This has been around for a long time.

It is illegal to hack in the USA. So hackers in the USA have been able to make it appear to be from China, Russia, Europe or somewhere else in the world for several years. Even the novice hackers could do this years ago.


10 posted on 03/31/2017 5:38:43 AM PDT by boycott
[ Post Reply | Private Reply | To 3 | View Replies]

To: Pollster1
These leaks are not helpful.

Really???

I sort of felt it cuts right to the non-stop "Russian hacking the election" crap. At this point the "intelligence" communities run our country, controlling the politicians and judges with their games. There is no oversight that can not be over run with their games. Basically we have a massive mess on our hands.

11 posted on 03/31/2017 5:51:33 AM PDT by Lady Heron
[ Post Reply | Private Reply | To 6 | View Replies]

To: boycott

Ditto that!! Lord, that picture looks like Comey.


12 posted on 03/31/2017 5:52:51 AM PDT by MagnoliaB (You can't always get what you want but if you try sometime you might find, you get what you need.)
[ Post Reply | Private Reply | To 8 | View Replies]

To: maggief

And when they can do that, they can make communications look like it came from somewhere else (like Russia), and then let it return through the NSA as new “intelligence” from foreign sources.


13 posted on 03/31/2017 6:04:24 AM PDT by Wuli
[ Post Reply | Private Reply | To 1 | View Replies]

To: maggief

Any claim that Russia hacked Trump’s computers is null and void.


14 posted on 03/31/2017 6:04:54 AM PDT by buffaloguy
[ Post Reply | Private Reply | To 1 | View Replies]

To: maggief
It seem our Intelligence Communities are not that intelligent. They are way too much in the news.
15 posted on 03/31/2017 6:07:47 AM PDT by Chgogal (I will NOT submit, therefore, Jihadists hate me.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Pollster1
-- These leaks are not helpful. --

The tools disclosed here are perhaps not uncommon. And the worry you have swings both ways, it makes it harder for the Russians to blame the US for Russian international instigation. Same goes for self-serving instigation by any other country's agents.

16 posted on 03/31/2017 6:12:36 AM PDT by Cboldt
[ Post Reply | Private Reply | To 6 | View Replies]

To: maggief

I was just thinking that we should be more specific when referring to the intelligence community that was hacking. Those hackers should be named “democrat appointed intelligence agents.” I wonder how many true patriots quit or were canned. The purge was probably the same as the military leader purge. I wonder what they would do if asked to serve again (both intelligence and those conservative military leaders).

While the swamp needs to be drained, the sludge needs to be replaced with unpolluted water.


17 posted on 03/31/2017 6:29:42 AM PDT by huldah1776 ( Vote Pro-life! Allow God to bless America before He avenges the death of the innocent.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Lady Heron

Amen

And everyone is misslng the point


18 posted on 03/31/2017 6:42:12 AM PDT by old curmudgeon
[ Post Reply | Private Reply | To 11 | View Replies]

To: maggief

Pre teens and teens use ghost apps to hide their online activity, if you kid has 2 calculators on their smart phone, you can bet they are using a ghost app to hide what they are doing online. News piece from last night local news Memphis. Needs a code to open the hidden real app that hides their activity.


19 posted on 03/31/2017 6:50:46 AM PDT by GailA (Ret. SCPO wife: suck it up buttercups it's President Donald Trump!)
[ Post Reply | Private Reply | To 1 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson