#Login Register


  • 2 Vote(s) - 5 Average
Home 


WikiLeaks exposes the U.S. Central Intelligence Agency.
03-07-2017, 06:06 PM #1
Adde Member
Posts:444 Threads:37 Joined:Apr 2012
Quote:The first full part of the series, "Year Zero", comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA's Center for Cyber Intelligence in Langley, Virgina.

Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized "zero day" exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

"Year Zero" introduces the scope and direction of the CIA's global covert hacking program, its malware arsenal and dozens of "zero day" weaponized exploits against a wide range of U.S. and European company products, include Apple's iPhone, Google's Android and Microsoft's Windows and even Samsung TVs, which are turned into covert microphones.

More: wikileaks.org

This is a big deal, the article says "Once a single cyber 'weapon' is 'loose' it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike."
03-07-2017, 06:34 PM #2
JayRodney ⓐⓛⓘⓔⓝ
Posts:31,617 Threads:1,567 Joined:Feb 2011
(03-07-2017, 06:06 PM)Adde Wrote:  This is a big deal, the article says "Once a single cyber 'weapon' is 'loose' it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike."

Oh ƒück . bored.gif Now that that's out of the bag, it's up to Unix, Linux, Apple, Windows to patch those backdoors, or the internet is toast. This is some scary shït for website owners. 13.gif

wonder.gif
03-07-2017, 07:36 PM #3
Gumby AKA Chtumby
Posts:1,394 Threads:161 Joined:Mar 2013
Quote:The CIA's Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones. Infected phones can be instructed to send the CIA the user's geolocation, audio and text communications as well as covertly activate the phone's camera and microphone.

Despite iPhone's minority share (14.5%) of the global smart phone market in 2016, a specialized unit in the CIA's Mobile Development Branch produces malware to infest, control and exfiltrate data from iPhones and other Apple products running iOS, such as iPads.

https://wikileaks.org/ciav7p1/
03-07-2017, 07:45 PM #4
JayRodney ⓐⓛⓘⓔⓝ
Posts:31,617 Threads:1,567 Joined:Feb 2011
yup.gif Let's hope they get these holes patched, otherwise things could get dicey real quick.

wonder.gif
03-07-2017, 07:56 PM #5
Gumby AKA Chtumby
Posts:1,394 Threads:161 Joined:Mar 2013
I had something freaky happen a few years back.

I was on my laptop. My son was in the room and I was telling him he needed to mow the grass. We talked about getting a new Lawn mower,

About 10 minutes later I started getting pop up adds about lawn mowers and lawn services.

I turned my laptop off. Opened the case and physically cut the speaker, camera and microphone out of it.

I think this is why a lot of the New Phones now have batteries that can't be removed. so they can never 'Really " be turned off
03-07-2017, 08:10 PM #6
Gumby AKA Chtumby
Posts:1,394 Threads:161 Joined:Mar 2013
Quote:One document detailing notes of an October 2014 meeting of the “embedded development branch” says a potential target is “vehicle systems.” WikiLeaks wrote in a press release, “the purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.”

Read more: http://dailycaller.com/2017/03/07/cia-so...z4af2hT2NS
03-07-2017, 08:57 PM #7
Adde Member
Posts:444 Threads:37 Joined:Apr 2012
(03-07-2017, 08:10 PM)Gumby Wrote:  
Quote:One document detailing notes of an October 2014 meeting of the “embedded development branch” says a potential target is “vehicle systems.” WikiLeaks wrote in a press release, “the purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.”

Read more: http://dailycaller.com/2017/03/07/cia-so...z4af2hT2NS

İmage
Well, look, it's Michael Hastings and Valerie Jarrett at Barack Obama's victory party, 2012 https://en.wikipedia.org/wiki/Michael_Ha...ournalist)
He was reporting on the CIA and NSA http://heavy.com/news/2013/06/michael-ha...s-cia-fbi/
03-07-2017, 11:01 PM #8
Gumby AKA Chtumby
Posts:1,394 Threads:161 Joined:Mar 2013
From Vault 7 Press release-

Quote:The CIA's Remote Devices Branch's UMBRAGE group collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation.

With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the "fingerprints" of the groups that the attack techniques were stolen from.

The Russians Did It !
03-08-2017, 11:15 AM #9
JayRodney ⓐⓛⓘⓔⓝ
Posts:31,617 Threads:1,567 Joined:Feb 2011
<blockquote class="twitter-tweet" data-lang="en"><p lang="en" dir="ltr">If you're writing about the CIA/<a href="https://twitter.com/wikileaks">@Wikileaks</a> story, here's the big deal: first public evidence USG secretly paying to keep US software unsafe. <a href="https://t.co/kYi0NC2mOp">pic.twitter.com/kYi0NC2mOp</a></p>&mdash; Edward Snowden (@Snowden) <a href="https://twitter.com/Snowden/status/839168025517522944">March 7, 2017</a></blockquote>

The govt pays Windows for the backdoors and telemetry... this is not news, we all knew windows 10 is spyware but now it's confirmed.

wonder.gif
Random German Guy Show this Post
03-08-2017, 11:35 AM #10
Random German Guy Incognito Anonymous
 
I guess buying that Windows Phone was a pretty good choice after all. :D
03-08-2017, 02:14 PM #11
DaJavoo If looks could kilt
Posts:1,854 Threads:43 Joined:Mar 2011
Only the naive would expect any privacy whatsoever in the digital world.

Remember that hullabaloo about the gov pleading with Apple to fork over the encryption key so they could have a lookieloo at the Sacramento killers' iPhone? Hogwash ~ they were in that bitch as soon as they phoned home with it.

Once the deeper dots in this data dump are dug out folks are gonna' see how pervasive the rat hole is. Heads will roll in a show trial. The genie is outta' the bottle. This is an all-out last call to every wanker in a basement to rogue state to open a can of whoop-ass on the world.

I suspect the world of intelligence to take a large step backwards and go old school ~ that shït can't be hacked. At least, Wikileaks did agents the large favor of blacking out the names of agents. shït gets too real when more or less innocent people die.
03-08-2017, 05:38 PM #12
JayRodney ⓐⓛⓘⓔⓝ
Posts:31,617 Threads:1,567 Joined:Feb 2011
Bust out the old 386, install Windows 95 first edition and your worries are over... aside from the bluescreen of death and a lot of broken websites. chuckle.gif

wonder.gif
Anonymous Kritter Show this Post
03-08-2017, 06:34 PM #13
Anonymous Kritter Incognito Anonymous
 
WikiLeaks ✔ @wikileaks
WikiLeaks has released less than 1% of its #Vault7 series in its part one publication yesterday 'Year Zero'.
8:59 AM - 8 Mar 2017
3,405 3,405 Retweets 4,739 4,739 likes

popcorn2.gif
Anonymous Kritter Show this Post
03-08-2017, 06:40 PM #14
Anonymous Kritter Incognito Anonymous
 
Revenge is best served via @Wikileaks
Anonymous Kritter Show this Post
03-08-2017, 07:04 PM #15
Anonymous Kritter Incognito Anonymous
 





Home 




 



DISCLAIMER / Terms of Service (TOS):
Kritterbox.com - Socialize anonymously, commentary, discussion, oddities, technology, music and more!  This website is provided "as is" without warranty of any kind, either expressed or implied. kritterbox.com shall not be liable for any damages whatsoever, including, without limitation, those resulting from loss of use, data or profits, whether or not advised of the possibility of damage, and on any theory of liability, arising out of or in connection with the use or performance of this site or other documents which are referenced by or linked to this site.
This website exists solely for the purposes of exchange of information, communication and general entertainment. Opinions from posters are in no way endorsed by kritterbox.com. All posts on this website are the opinion of the authors and are not to be taken as statements of fact on behalf of kritterbox.com. This site may contain coarse language or other material that kritterbox.com is in no way responsible for. Material deemed to be offensive or pornographic at the discretion of kritterbox.com shall be removed. kritterbox.com reserves the right to modify, or remove posts and user accounts on this website at our discretion. kritterbox.com disclaims all liability for damages incurred directly or indirectly as a result of any material on this website. Fictitious posts and any similarity to any person living or dead is coincidental.
All users shall limit the insertion of any and all copyrighted material to portions of the article that are relevant to the point being made, with no more than 50%, and preferably less of the original source material. A link shall be visible in text format, embedded directly to the original source material without exception.
No third party links, i.e. blogs or forums will be accepted under any circumstances, and will be edited by staff in order to reflect the original source of copyrighted material, or be removed at the sole discretion of kritterbox.com.
Fair Use Notice:
This site may contain copyrighted material the use of which has not always been specifically authorized by the copyright owner. Users may make such material available in an effort to advance awareness and understanding of issues relating to economics, individual rights, international affairs, liberty, science, and technology. This constitutes a 'fair use' of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C.Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for educational and/or research purposes.
This Disclaimer is subject to change at any time at our discretion.
Copyright © 2011 - 2017 kritterbox.com