#Login Register


  • 2 Vote(s) - 5 Average
Home 


WikiLeaks exposes the U.S. Central Intelligence Agency.
03-07-2017, 06:06 PM #1
Adde Member
Posts:372 Threads:31 Joined:Apr 2012
Quote:The first full part of the series, "Year Zero", comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA's Center for Cyber Intelligence in Langley, Virgina.

Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized "zero day" exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

"Year Zero" introduces the scope and direction of the CIA's global covert hacking program, its malware arsenal and dozens of "zero day" weaponized exploits against a wide range of U.S. and European company products, include Apple's iPhone, Google's Android and Microsoft's Windows and even Samsung TVs, which are turned into covert microphones.

More: wikileaks.org

This is a big deal, the article says "Once a single cyber 'weapon' is 'loose' it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike."
03-07-2017, 06:34 PM #2
JayRodney ⓐⓛⓘⓔⓝ
Posts:31,012 Threads:1,557 Joined:Feb 2011
(03-07-2017, 06:06 PM)Adde Wrote:  This is a big deal, the article says "Once a single cyber 'weapon' is 'loose' it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike."

Oh ƒück . bored.gif Now that that's out of the bag, it's up to Unix, Linux, Apple, Windows to patch those backdoors, or the internet is toast. This is some scary shït for website owners. 13.gif

wonder.gif
03-07-2017, 07:36 PM #3
Gumby AKA Chtumby
Posts:1,252 Threads:146 Joined:Mar 2013
Quote:The CIA's Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones. Infected phones can be instructed to send the CIA the user's geolocation, audio and text communications as well as covertly activate the phone's camera and microphone.

Despite iPhone's minority share (14.5%) of the global smart phone market in 2016, a specialized unit in the CIA's Mobile Development Branch produces malware to infest, control and exfiltrate data from iPhones and other Apple products running iOS, such as iPads.

https://wikileaks.org/ciav7p1/
03-07-2017, 07:45 PM #4
JayRodney ⓐⓛⓘⓔⓝ
Posts:31,012 Threads:1,557 Joined:Feb 2011
yup.gif Let's hope they get these holes patched, otherwise things could get dicey real quick.

wonder.gif
03-07-2017, 07:56 PM #5
Gumby AKA Chtumby
Posts:1,252 Threads:146 Joined:Mar 2013
I had something freaky happen a few years back.

I was on my laptop. My son was in the room and I was telling him he needed to mow the grass. We talked about getting a new Lawn mower,

About 10 minutes later I started getting pop up adds about lawn mowers and lawn services.

I turned my laptop off. Opened the case and physically cut the speaker, camera and microphone out of it.

I think this is why a lot of the New Phones now have batteries that can't be removed. so they can never 'Really " be turned off
03-07-2017, 08:10 PM #6
Gumby AKA Chtumby
Posts:1,252 Threads:146 Joined:Mar 2013
Quote:One document detailing notes of an October 2014 meeting of the “embedded development branch” says a potential target is “vehicle systems.” WikiLeaks wrote in a press release, “the purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.”

Read more: http://dailycaller.com/2017/03/07/cia-so...z4af2hT2NS
03-07-2017, 08:57 PM #7
Adde Member
Posts:372 Threads:31 Joined:Apr 2012
(03-07-2017, 08:10 PM)Gumby Wrote:  
Quote:One document detailing notes of an October 2014 meeting of the “embedded development branch” says a potential target is “vehicle systems.” WikiLeaks wrote in a press release, “the purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.”

Read more: http://dailycaller.com/2017/03/07/cia-so...z4af2hT2NS

İmage
Well, look, it's Michael Hastings and Valerie Jarrett at Barack Obama's victory party, 2012 https://en.wikipedia.org/wiki/Michael_Ha...ournalist)
He was reporting on the CIA and NSA http://heavy.com/news/2013/06/michael-ha...s-cia-fbi/
03-07-2017, 11:01 PM #8
Gumby AKA Chtumby
Posts:1,252 Threads:146 Joined:Mar 2013
From Vault 7 Press release-

Quote:The CIA's Remote Devices Branch's UMBRAGE group collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation.

With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the "fingerprints" of the groups that the attack techniques were stolen from.

The Russians Did It !
03-08-2017, 11:15 AM #9
JayRodney ⓐⓛⓘⓔⓝ
Posts:31,012 Threads:1,557 Joined:Feb 2011
<blockquote class="twitter-tweet" data-lang="en"><p lang="en" dir="ltr">If you're writing about the CIA/<a href="https://twitter.com/wikileaks">@Wikileaks</a> story, here's the big deal: first public evidence USG secretly paying to keep US software unsafe. <a href="https://t.co/kYi0NC2mOp">pic.twitter.com/kYi0NC2mOp</a></p>&mdash; Edward Snowden (@Snowden) <a href="https://twitter.com/Snowden/status/839168025517522944">March 7, 2017</a></blockquote>

The govt pays Windows for the backdoors and telemetry... this is not news, we all knew windows 10 is spyware but now it's confirmed.

wonder.gif
Random German Guy Show this Post
03-08-2017, 11:35 AM #10
Random German Guy Incognito Anonymous
 
I guess buying that Windows Phone was a pretty good choice after all. :D
03-08-2017, 02:14 PM #11
DaJavoo If looks could kilt
Posts:1,830 Threads:43 Joined:Mar 2011
Only the naive would expect any privacy whatsoever in the digital world.

Remember that hullabaloo about the gov pleading with Apple to fork over the encryption key so they could have a lookieloo at the Sacramento killers' iPhone? Hogwash ~ they were in that bitch as soon as they phoned home with it.

Once the deeper dots in this data dump are dug out folks are gonna' see how pervasive the rat hole is. Heads will roll in a show trial. The genie is outta' the bottle. This is an all-out last call to every wanker in a basement to rogue state to open a can of whoop-ass on the world.

I suspect the world of intelligence to take a large step backwards and go old school ~ that shït can't be hacked. At least, Wikileaks did agents the large favor of blacking out the names of agents. shït gets too real when more or less innocent people die.
03-08-2017, 05:38 PM #12
JayRodney ⓐⓛⓘⓔⓝ
Posts:31,012 Threads:1,557 Joined:Feb 2011
Bust out the old 386, install Windows 95 first edition and your worries are over... aside from the bluescreen of death and a lot of broken websites. chuckle.gif

wonder.gif
Anonymous Kritter Show this Post
03-08-2017, 06:34 PM #13
Anonymous Kritter Incognito Anonymous
 
WikiLeaks ✔ @wikileaks
WikiLeaks has released less than 1% of its #Vault7 series in its part one publication yesterday 'Year Zero'.
8:59 AM - 8 Mar 2017
3,405 3,405 Retweets 4,739 4,739 likes

popcorn2.gif
Anonymous Kritter Show this Post
03-08-2017, 06:40 PM #14
Anonymous Kritter Incognito Anonymous
 
Revenge is best served via @Wikileaks
Anonymous Kritter Show this Post
03-08-2017, 07:04 PM #15
Anonymous Kritter Incognito Anonymous
 


03-08-2017, 08:08 PM #16
Cynicalabsurdance Member
Posts:7,230 Threads:167 Joined:Feb 2011
Somewhere out there on a Horizon seen only by the few
who have the sight of a critical mindset ,
can be viewed to what extant our lives shall be controlled ,
by a Government without Pride .

Myself , as one individual Targeted for decades by the U.S. Intelligence
Community , There is little left for me to become aware of ,,,
concerning Their invasive actions .


We suffer what we allow , we pay to allow it , we sink
our own ships ,,,
We end , by those means , that we support .
Kreeper nli Show this Post
03-09-2017, 01:02 PM #17
Kreeper nli Incognito Anonymous
 
http://www.youtube.com/watch?v=o8qEkXOC-7U

This is getting better and better. The Dems are imploding.
03-09-2017, 06:09 PM #18
JayRodney ⓐⓛⓘⓔⓝ
Posts:31,012 Threads:1,557 Joined:Feb 2011
It's just awesome CNN, and all the other major networks have been spreading fake news for a very long time.
Trump wins AGAIN!

wonder.gif
03-09-2017, 09:37 PM #19
DaJavoo If looks could kilt
Posts:1,830 Threads:43 Joined:Mar 2011
(03-09-2017, 06:09 PM)JayRodney Wrote:  It's just awesome CNN, and all the other major networks have been spreading fake news for a very long time.
Trump wins AGAIN!

Reminds me of the dog who caught the car he was chasing ~ wtf is he gonna' do now?
03-10-2017, 01:34 AM #20
Kreeper Griobhtha
Posts:9,719 Threads:602 Joined:Feb 2011
(03-09-2017, 09:37 PM)DaJavoo Wrote:  
(03-09-2017, 06:09 PM)JayRodney Wrote:  It's just awesome CNN, and all the other major networks have been spreading fake news for a very long time.
Trump wins AGAIN!

Reminds me of the dog who caught the car he was chasing ~ wtf is he gonna' do now?

Or the time Wiley E. Coyote actually caught the Road Runner?

İmage
And the people bowed and prayed
To the neon god they made
Anonymous Kritter Show this Post
03-10-2017, 06:29 AM #21
Anonymous Kritter Incognito Anonymous
 
(03-10-2017, 01:34 AM)Kreeper Wrote:  
(03-09-2017, 09:37 PM)DaJavoo Wrote:  
(03-09-2017, 06:09 PM)JayRodney Wrote:  It's just awesome CNN, and all the other major networks have been spreading fake news for a very long time.
Trump wins AGAIN!

Reminds me of the dog who caught the car he was chasing ~ wtf is he gonna' do now?

Or the time Wiley E. Coyote actually caught the Road Runner?

Ironic that Trump cannot accuse the CIA of bugging him, as it would verify the Wikileaks story his administration is wanting to deny.
03-10-2017, 12:18 PM #22
Kreeper Griobhtha
Posts:9,719 Threads:602 Joined:Feb 2011
(03-10-2017, 06:29 AM)Anonymous Kritter Wrote:  
(03-10-2017, 01:34 AM)Kreeper Wrote:  
(03-09-2017, 09:37 PM)DaJavoo Wrote:  
(03-09-2017, 06:09 PM)JayRodney Wrote:  It's just awesome CNN, and all the other major networks have been spreading fake news for a very long time.
Trump wins AGAIN!

Reminds me of the dog who caught the car he was chasing ~ wtf is he gonna' do now?

Or the time Wiley E. Coyote actually caught the Road Runner?

Ironic that Trump cannot accuse the CIA of bugging him, as it would verify the Wikileaks story his administration is wanting to deny.

Why would he have accused the CIA? They were not supposed to be surveilling ANYONE in the US. Their actions are supposed to be in foreign countries. The FBI is tasked with domestic surveillance. That has obviously changed somewhere along the way which is part of what makes the new leaks important.

İmage
And the people bowed and prayed
To the neon god they made
03-10-2017, 01:41 PM #23
Kreeper Griobhtha
Posts:9,719 Threads:602 Joined:Feb 2011
http://www.youtube.com/watch?v=ag5-98IVoAY

Down the rabbit hole we go...

İmage
And the people bowed and prayed
To the neon god they made
03-10-2017, 02:20 PM #24
DaJavoo If looks could kilt
Posts:1,830 Threads:43 Joined:Mar 2011
(03-10-2017, 12:18 PM)Kreeper Wrote:  
(03-10-2017, 06:29 AM)Anonymous Kritter Wrote:  >snip<

Ironic that Trump cannot accuse the CIA of bugging him, as it would verify the Wikileaks story his administration is wanting to deny.

Why would he have accused the CIA? They were not supposed to be surveilling ANYONE in the US. Their actions are supposed to be in foreign countries. The FBI is tasked with domestic surveillance. That has obviously changed somewhere along the way which is part of what makes the new leaks important.

Exactly. He accused Obama/administration which covers the whole stinking lot of them. That said however, Obama was just a puppet with many strings. The CIA, as part of Deep State was prolly doing its bit regardless of O's wishes. I suspect there were more than a few separate listening posts with multiple agendas.

The power/control/$$ runs too deep and in too many directions. These bastards don't even like each other. They've played the game for decades under switching umbrellas of politics all the while serving their own ends.

Thing is politicians can be bought and sold ~ to wit: The Obamacare Repeal/Replace. Not a damn thing will change until we throw all politicians out or at least put term limits on their asses. We need people that aren't beholden to anyone, or at least will not be able to entrench for the long haul to corner the market on $$/control/power.

I've been saying for years to make government service in Congress like jury duty.

In the next breath ~ make a U.S. passport the voter ID.
03-10-2017, 02:37 PM #25
Gumby AKA Chtumby
Posts:1,252 Threads:146 Joined:Mar 2013
Nigel Farage visited Ecuadorian Embassy to meet Julian Assange

http://www.independent.co.uk/news/uk/pol...20921.html

İmage
03-10-2017, 06:35 PM #26
dclements Member
Posts:108 Threads:9 Joined:Jan 2017
(03-08-2017, 11:15 AM)JayRodney Wrote:  <blockquote class="twitter-tweet" data-lang="en"><p lang="en" dir="ltr">If you're writing about the CIA/<a href="https://twitter.com/wikileaks">@Wikileaks</a> story, here's the big deal: first public evidence USG secretly paying to keep US software unsafe. <a href="https://t.co/kYi0NC2mOp">pic.twitter.com/kYi0NC2mOp</a></p>&mdash; Edward Snowden (@Snowden) <a href="https://twitter.com/Snowden/status/839168025517522944">March 7, 2017</a></blockquote>

The govt pays Windows for the backdoors and telemetry... this is not news, we all knew windows 10 is spyware but now it's confirmed.
I pretty sure that in the Big Book of Conspiracies, it has one of the conspiracies where a company that had gone bankrupt (or something else) had it's OS or application software seized by the US government and than sold/gave the rights to such software to some else for next to nothing. The reasoning was either this OS or inventory/accounting software was expected to be used by nearly every agency in the world and by the US government including it's own back-doors into it, they wouldn't have to bother with ever having to 'hack' into any system that had it since the software would allow the US government into such system through the back doors which allowed them to have superuser privileges. I also believe that there it mentioning that such software would even 'phone home', since the systems existed before common use of the Internet and LAN networks.

If the story is true then it really isn't anything new since the story in the Big Book of Conspiracies takes place somewhere between the 70's and 80's and talks about it being used in the FIRST Iraq war (early 90's); making backdoor privileges/access a tactic used since the home PC was available and people started really thinking about exploiting computers put on networks.
03-10-2017, 07:38 PM #27
dclements Member
Posts:108 Threads:9 Joined:Jan 2017
I don't know if this is the correct story, but 60 minutes did an episode where the US government felt threaten by a a competitor to Cisco (who builds that networking devices that more or less are the backbone of the Internet) who is set up in China and gets funding by the Chinese government.

Chinese telecom giant eyed as security threat
http://www.cbsnews.com/news/chinese-tele...ty-threat/

Part of the reason the why the Chinese government set up the company was because they believed that the US government itself had planted back doors in Cisco and other US companies coming from the US and they wanted a means to be sure 'that there wasn't any hidden back doors that they didn't know and had to worry about'. Of course, the US government sees such actions as a threat to their own IT security (as well as overall national security) and says that the company is merely a front for the Chinese government and their attempts to gain access any machine that uses such networks. In a kind of strange part of the episode, it was asked why we have to be worried more about a Chinese company installing back doors if they go through the same quality assurance process as Cisco and/or other US based companies, and a representative from the US government said that we don't put any 'unnecessary' back doors in software and devices but kind of went on and said that they know from 'experience' that it can be done in a way that is virtually impossible for anyone to detect if it is embedded in either hardware firmware and/or the kernel of an operating system (that isn't open source such as Windows).

I'm not trying to say anything that bad about the Chinese government but I think they found out what the US government is doing and wanted in on the action too.



Home 




DISCLAIMER / Terms of Service (TOS)
Kritterbox.com - Socialize anonymously, commentary, discussion, oddities, technology, music and more!  This website is provided "as is" without warranty of any kind, either expressed or implied. kritterbox.com shall not be liable for any damages whatsoever, including, without limitation, those resulting from loss of use, data or profits, whether or not advised of the possibility of damage, and on any theory of liability, arising out of or in connection with the use or performance of this site or other documents which are referenced by or linked to this site.
This website exists solely for the purposes of exchange of information, communication and general entertainment. Opinions from posters are in no way endorsed by kritterbox.com. All posts on this website are the opinion of the authors and are not to be taken as statements of fact on behalf of kritterbox.com. This site may contain coarse language or other material that kritterbox.com is in no way responsible for. Material deemed to be offensive or pornographic at the discretion of kritterbox.com shall be removed. kritterbox.com reserves the right to modify, or remove posts and user accounts on this website at our discretion. kritterbox.com disclaims all liability for damages incurred directly or indirectly as a result of any material on this website. Fictitious posts and any similarity to any person living or dead is coincidental.
All users shall limit the insertion of any and all copyrighted material to portions of the article that are relevant to the point being made, with no more than 50%, and preferably less of the original source material. A link shall be visible in text format, embedded directly to the original source material without exception.
No third party links, i.e. blogs or forums will be accepted under any circumstances, and will be edited by staff in order to reflect the original source of copyrighted material, or be removed at the sole discretion of kritterbox.com.
Fair Use Notice:
This site may contain copyrighted material the use of which has not always been specifically authorized by the copyright owner. Users may make such material available in an effort to advance awareness and understanding of issues relating to economics, individual rights, international affairs, liberty, science, and technology. This constitutes a 'fair use' of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C.Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for educational and/or research purposes.
This Disclaimer is subject to change at any time at our discretion.
Copyright © 2011 - 2017 kritterbox.com