• If you are having problems logging in please use the Contact Us in the lower right hand corner of the forum page for assistance.

Wikileaks strikes CIA

Tam

Well-known member
Just read part of the latest wikileaks release on "Year Zero" developed under Obama CIA

The CIA has developed a way to turn on your smart phone and smart TV's and use them as a microphone to tape your conversations in the privacy of your home or office. They are now in competition with the NSA for spying on EVERYONE. They have made their new hacking program unclassified so they do not have to get warrants to use it. If they classified the program they could not use it without risking being charged with placing classified info on the internet. That is how they use it in certain appilcations they install it on internet servers to spy on text messages, emails and voice messaging. They did not even patent the hacking programs so if somebody steals it and sells it to enemy nothing will be done about it. They figured out through NSA mistakes how to hack foreign and possibly domestic servers without leaving a trace of the hacking. Couple of clips from long doc.

Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA). The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force — its own substantial fleet of hackers. The agency's hacking division freed it from having to disclose its often controversial operations to the NSA (its primary bureaucratic rival) in order to draw on the NSA's hacking capacities.

By the end of 2016, the CIA's hacking division, which formally falls under the agency's Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other "weaponized" malware. Such is the scale of the CIA's undertaking that by 2016, its hackers had utilized more code than that used to run Facebook. The CIA had created, in effect, its "own NSA" with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.

As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.

The CIA's Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones. Infected phones can be instructed to send the CIA the user's geolocation, audio and text communications as well as covertly activate the phone's camera and microphone.

"Year Zero" documents show that the CIA breached the Obama administration's commitments. Many of the vulnerabilities used in the CIA's cyber arsenal are pervasive and some may already have been found by rival intelligence agencies or cyber criminals.

As an example, specific CIA malware revealed in "Year Zero" is able to penetrate, infest and control both the Android phone and iPhone software that runs or has run presidential Twitter accounts. The CIA attacks this software by using undisclosed security vulnerabilities ("zero days") possessed by the CIA but if the CIA can hack these phones then so can everyone else who has obtained or discovered the vulnerability. As long as the CIA keeps these vulnerabilities concealed from Apple and Google (who make the phones) they will not be fixed, and the phones will remain hackable

The CIA made these systems unclassified.

Why the CIA chose to make its cyberarsenal unclassified reveals how concepts developed for military use do not easily crossover to the 'battlefield' of cyber 'war'.

To attack its targets, the CIA usually requires that its implants communicate with their control programs over the internet. If CIA implants, Command & Control and Listening Post software were classified, then CIA officers could be prosecuted or dismissed for violating rules that prohibit placing classified information onto the Internet. Consequently the CIA has secretly made most of its cyber spying/war code unclassified. The U.S. government is not able to assert copyright either, due to restrictions in the U.S. Constitution. This means that cyber 'arms' manufactures and computer hackers can freely "pirate" these 'weapons' if they are obtained. The CIA has primarily had to rely on obfuscation to protect its malware secrets.

CIA hackers developed successful attacks against most well known anti-virus programs. These are documented in AV defeats, Personal Security Products, Detecting and defeating PSPs and PSP/Debugger/RE Avoidance. For example, Comodo was defeated by CIA malware placing itself in the Window's "Recycle Bin". While Comodo 6.x has a "Gaping Hole of DOOM".

CIA hackers discussed what the NSA's "Equation Group" hackers did wrong and how the CIA's malware makers could avoid similar exposure.

https://wikileaks.org/ciav7p1/

Scary crap things are way out of control.
 

Tam

Well-known member
Another point they made is the CIA can Cloak a hack to make it look like someone else did it. So did they hack Podesta and cloak it to make it LOOK LIKE RUSSIA. they have that capabilities according to this leak. And it also makes a bit of sense when you consider the video of the soft coup that I posted on here back in Nov. saying that retired and current Intel agents were behind the leaks to Wikileaks as they did not want Hillary anywhere close to classified info ever again.
 

Brad S

Well-known member
Greatest peril to liberty comes from within our borders - not from other countries. Wiki leaks certainly is operating outside the law, but these legal infractions are trivial when compared to secret government overreach
 

Steve

Well-known member
Brad S said:
Greatest peril to liberty comes from within our borders - not from other countries. Wiki leaks certainly is operating outside the law, but these legal infractions are trivial when compared to secret government overreach

I totally agree, if the goverment itself can conspire to take down an elected President, then we are all in trouble..

It was only a matter of time before Homeland security reared it's ugly head.
 

Traveler

Well-known member
So why would we think this capability is something only the CIA or the US government, for that matter, is capable of?
 

Tam

Well-known member
How many people went out and bought new TV's today when it was broadcast that the CIA can use your SAMSUNG Smart TV to spy on you. I think Samsung is going to have a tough time selling anyone a TV if the CIA can use them to spy. I'm sure anyone breaking the law will be running out to buy a Sony by night fall. If you have stock in Samsung dump it now and buy Sony stock.
 

Tam

Well-known member
Well here is the video that proves who is behind the CIA leaks

https://www.youtube.com/watch?v=k-YtOT3Uh2k


How far are they going to go before they stop and think about what they are doing to National Security.
 
Top