Jump to content
  • Welcome to AngelsWin.com

    AngelsWin.com - THE Internet Home for Angels fans! Unraveling Angels Baseball ... One Thread at a Time.

    Register today to comment and join the most interactive online Angels community on the net!

    Once you're a member you'll see less advertisements. If you become a Premium member and you won't see any ads! 

     

IGNORED

Wikileaks Vault 7


Recommended Posts

https://wikileaks.org/ciav7p1/

Vault 7: CIA Hacking Tools Revealed

UMBRAGE
The CIA's hand crafted hacking techniques pose a problem for the agency. Each technique it has created forms a "fingerprint" that can be used by forensic investigators to attribute multiple different attacks to the same entity.

This is analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible. As soon one murder in the set is solved then the other murders also find likely attribution.

The CIA's Remote Devices Branch's UMBRAGE group collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation.

With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the "fingerprints" of the groups that the attack techniques were stolen from.

UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.

Link to comment
Share on other sites

2 hours ago, Jay said:

https://wikileaks.org/ciav7p1/

Vault 7: CIA Hacking Tools Revealed

UMBRAGE
The CIA's hand crafted hacking techniques pose a problem for the agency. Each technique it has created forms a "fingerprint" that can be used by forensic investigators to attribute multiple different attacks to the same entity.

This is analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible. As soon one murder in the set is solved then the other murders also find likely attribution.

The CIA's Remote Devices Branch's UMBRAGE group collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation.

With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the "fingerprints" of the groups that the attack techniques were stolen from.

UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.

So from what I'm getting in all that.  Is the CIA stole from the North Koreans, to blame the Russians.  When it was probably a 12 year old in Kansas that was behind everything.

Link to comment
Share on other sites

52 minutes ago, Lawrence said:

This should make everyone feel warm and fuzzy. 

"Wikileaks further claims that the CIA recently ‘lost control’ of the majority of the malware used to attack iPhones and iPads …"

https://9to5mac.com/2017/03/07/cia-ios-malware-wikileaks/

"Year Zero" introduces the scope and direction of the CIA's global covert hacking program, its malware arsenal and dozens of "zero day" weaponized exploits against a wide range of U.S. and European company products, include Apple's iPhone, Google's Android and Microsoft's Windows and even Samsung TVs, which are turned into covert microphones.

Link to comment
Share on other sites

1 hour ago, fan_since79 said:

Having them listen to you through your TV set is so 1984.

 

I wonder if the yungins know what 1984 is?  I'm really being serious, because outside of actually going to school during 1984, is it still a book that would be assigned in school?

Link to comment
Share on other sites

The CIA has been investigating ways to manipulate the control systems of modern cars and trucks that could be used for covert assassinations, WikiLeaks said on Tuesday as part of its dump of more than 8,700 documents that it claims are from the CIA's Center for Cyber Intelligence.

"As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks," WikiLeaks said in a statement. "The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations."

http://www.washingtonexaminer.com/wikileaks-warns-cia-can-hack-cars-for-undetectable-assassinations/article/2616661

 

(Google search: Michael Hastings accident)

Link to comment
Share on other sites

10 minutes ago, fan_since79 said:

The CIA has been investigating ways to manipulate the control systems of modern cars and trucks that could be used for covert assassinations, WikiLeaks said on Tuesday as part of its dump of more than 8,700 documents that it claims are from the CIA's Center for Cyber Intelligence.

"As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks," WikiLeaks said in a statement. "The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations."

http://www.washingtonexaminer.com/wikileaks-warns-cia-can-hack-cars-for-undetectable-assassinations/article/2616661

 

(Google search: Michael Hastings accident)

 

Pfft.  Like Felix would need such crude methods.  James either.

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...