Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Vault 7: CIA Hacking Tools Revealed (Wikileaks unveils the CIA)
Wikileaks ^ | 3/7/2017 | Wikileaks

Posted on 03/07/2017 6:12:05 AM PST by Ultra Sonic 007

Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named "Vault 7" by WikiLeaks, it is the largest ever publication of confidential documents on the agency.

The first full part of the series, "Year Zero", comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA's Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election.

Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized "zero day" exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

"Year Zero" introduces the scope and direction of the CIA's global covert hacking program, its malware arsenal and dozens of "zero day" weaponized exploits against a wide range of U.S. and European company products, include Apple's iPhone, Google's Android and Microsoft's Windows and even Samsung TVs, which are turned into covert microphones.

Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA). The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force — its own substantial fleet of hackers. The agency's...

(Excerpt) Read more at wikileaks.org ...


TOPICS: Breaking News; Constitution/Conservatism; Crime/Corruption; Government
KEYWORDS: brennan; brennancia; cci; cia; ciahacking; ciahackingarsenal; crowdstrike; deepstate; dmitrialperovitch; dncemailhack; dnchack; obama; obamagate; shadowgovernment; trump; vault7; vault7graphic; wiki; wikileaks
Navigation: use the links below to view more comments.
first previous 1-20 ... 81-100101-120121-140 ... 201-211 next last
To: Fair Paul

Or given away , to cover the tracks of using them illegally...


101 posted on 03/07/2017 9:32:34 AM PST by Triple (Socialism denies people the right to the fruits of their labor, and is as abhorrent as slavery)
[ Post Reply | Private Reply | To 78 | View Replies]

To: kevao

Think about this:
https://www.nytimes.com/2016/12/13/us/politics/russia-hack-election-dnc.html?_r=1

“The D.N.C. immediately hired CrowdStrike, a cybersecurity firm, to scan its computers, identify the intruders and build a new computer and telephone system from scratch. Within a day, CrowdStrike confirmed that the intrusion had originated in Russia, Mr. Sussmann said.
The work that such companies do is a computer version of old-fashioned crime scene investigation, with fingerprints, bullet casings and DNA swabs replaced by an electronic trail that can be just as incriminating. And just as police detectives learn to identify the telltale methods of a veteran burglar, so CrowdStrike investigators recognized the distinctive handiwork of Cozy Bear and Fancy Bear.
Those are CrowdStrike’s nicknames for the two Russian hacking groups that the firm found at work inside the D.N.C. network.”

Now that you know the CIA can use subsets of hacking techniques to effectively frame third parties for attacks; saying that the hacking techniques are like ‘fingerprints’.

http://i.magaimg.net/img/6f7.png

This shows that its very possible that the CIA pretended to be Russia hacking Podesta/DNC/Hillary.


102 posted on 03/07/2017 9:35:13 AM PST by BlackSeal
[ Post Reply | Private Reply | To 98 | View Replies]

To: BlackSeal

Meant to also add this is why supposedly “17 intelligence agencies” said the DNC hacks were work of the Russians...when it was actually done by the CIA themselves.


103 posted on 03/07/2017 9:38:24 AM PST by BlackSeal
[ Post Reply | Private Reply | To 102 | View Replies]

To: Enlightened1

Do you want to link that?


104 posted on 03/07/2017 9:41:24 AM PST by Stentor (A day without illegals is like a day without food poisoning.--Salamander)
[ Post Reply | Private Reply | To 59 | View Replies]

To: Ultra Sonic 007

105 posted on 03/07/2017 9:42:19 AM PST by dragnet2 (Diversion and evasion are tools of deceit)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Whenifhow

Bookmarking


106 posted on 03/07/2017 9:51:12 AM PST by SueRae (An administration like no other.)
[ Post Reply | Private Reply | To 16 | View Replies]

To: Red Badger

Should have kept my bag phone.


107 posted on 03/07/2017 9:54:40 AM PST by virgil (The evil that men do lives after them.)
[ Post Reply | Private Reply | To 38 | View Replies]

To: Enlightened1

Please let it be true!


108 posted on 03/07/2017 9:57:24 AM PST by MagnoliaB (You can't always get what you want but if you try sometime you might find, you get what you need.)
[ Post Reply | Private Reply | To 59 | View Replies]

To: virgil

I don’t think they would even work with today’s systems.......


109 posted on 03/07/2017 9:59:47 AM PST by Red Badger (If "Majority Rule" was so important in South Africa, why isn't it that way here?.......)
[ Post Reply | Private Reply | To 107 | View Replies]

To: Ultra Sonic 007

The CIA, without a warrant, is bugging your television. When it shows “off” it is listening to your every word. They are in your car control systems. This capability has now been leaked to bad actors and the CIA has totally lost control. This is a national emergency. CIA directors that knew this should be arrested .


110 posted on 03/07/2017 10:00:38 AM PST by WENDLE (The CIA is bugging your TV to listen to you without a warrant.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Magnatron

It might be his Facebook Account posted on March 5th at 2:09pm. Just scroll down and you will see it.

https://www.facebook.com/Steve-Bannon-364097883961282/?hc_ref=PAGES_TIMELINE&fref=nf


111 posted on 03/07/2017 10:01:42 AM PST by Enlightened1
[ Post Reply | Private Reply | To 86 | View Replies]

To: WildHighlander57

Vault 7: CIA Hacking Tools Revealed

https://wikileaks.org/ciav7p1/


112 posted on 03/07/2017 10:02:02 AM PST by COUNTrecount
[ Post Reply | Private Reply | To 93 | View Replies]

To: Stentor

It might be his Facebook Account posted on March 5th at 2:09pm. Just scroll down and you will see it.

https://www.facebook.com/Steve-Bannon-364097883961282/?hc_ref=PAGES_TIMELINE&fref=nf


113 posted on 03/07/2017 10:02:39 AM PST by Enlightened1
[ Post Reply | Private Reply | To 104 | View Replies]

To: TigerClaws

I know it might be unpopular here, but I wonder how much control Obama or GWB had over these rogues? Are they running these operations independently of the Executive?


114 posted on 03/07/2017 10:04:42 AM PST by virgil (The evil that men do lives after them.)
[ Post Reply | Private Reply | To 67 | View Replies]

To: Fhios

http://www.freerepublic.com/focus/f-news/3532402/posts?page=5#5


115 posted on 03/07/2017 10:13:32 AM PST by dynoman (Objectivity is the essence of intelligence. - Marilyn vos Savant)
[ Post Reply | Private Reply | To 83 | View Replies]

To: Enlightened1

Thanks much.


116 posted on 03/07/2017 10:15:55 AM PST by Stentor (A day without illegals is like a day without food poisoning.--Salamander)
[ Post Reply | Private Reply | To 113 | View Replies]

To: Magnatron

I read over at the Last Refuge that these are not likely Bannon’s tweets. There were a series of 3 and appear to be fake. I can’t find the reference to this at this time....so such much going on and so much to read. I will see if I can find it.


117 posted on 03/07/2017 10:17:43 AM PST by pugmama (Ports Moon.)
[ Post Reply | Private Reply | To 86 | View Replies]

To: ifinnegan
It’ll be cool when Brennon, Snowden and Assange are all in prison.

Brennan yes. He is one of the architects of our intended totalitarian enslavement.

Disagree on Snowden and Assange. Without them we would not even know what is happening to us.

The technology envisioned in 1984 was tame compared to what has actually happened. But the warning was dead on.

If the wrong people have their way, the tools we now know exist can and will usher in a dark age of totalitarianism the human race may never escape.

It is hard to see how this can be defeated, but at least we now have a shot. I just hope and pray it is not already too late.

118 posted on 03/07/2017 10:18:27 AM PST by EternalHope (Something wicked this way comes. Be ready.)
[ Post Reply | Private Reply | To 43 | View Replies]

bkmk


119 posted on 03/07/2017 10:27:41 AM PST by lonevoice (diagonally parked in a parallel universe)
[ Post Reply | Private Reply | To 118 | View Replies]

To: COUNTrecount

Just.... wow.


120 posted on 03/07/2017 10:29:00 AM PST by AFreeBird
[ Post Reply | Private Reply | To 112 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-20 ... 81-100101-120121-140 ... 201-211 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson