Posted on 03/10/2017 10:48:26 AM PST by Lorianne
These files reveal that the CIA can and has hacked devices that were supposedly secure iPhones, iPads, and Android devices.
The documents further reveal that the CIA is deliberately infecting personal computers with spyware, including Windows, Mac OS/X, Solaris, Linux, and other operating systems.
Theyre also hacking WiFi routers to deploy software that monitors Internet activity, and have even figured out how to bypass anti-virus software so that their spyware cannot be detected.
Theyve also managed to make the rest of the world believe that Russian hackers, not the CIA, are behind all this malware and spyware.
Its like a restatement of that old Mission: Impossible line Should any of your IM force be caught or killed well blame Russia.
The CIA is pretty shameless about its activities, nicknaming its various hacking programs Assassin, Medusa, and Brutal Kangaroo.
(Excerpt) Read more at sovereignman.com ...
AS much as I detest the CIA’s spying on Americans, this is the kind of sh*t I expect them to do... but not to US!
If they are this good, why can’t they protect their own information?
> If they are this good, why cant they protect their own information?
There are always some disgruntled employees and other people who just have a need to brag.
So, that phone-unlock kerfuffle was all smoke and mirrors?
Truman created the CIA to “centralize” the many streams of intelligence he was getting from 9 different government agencies.
60 years later, Bush had to create “Homeland Security” to do exactly the same thing from dozens of both intelligence, and law-enforcment agencies.
Unchecked growth is the nature of all bureaucracies
Judge Napolitano made great comments re this issue on Bret Baier show yesterday.
“These files reveal that the CIA can and has hacked devices that were supposedly secure iPhones, iPads, and Android devices.”
OMGWTFBBQ some people don’t seem to grasp the concept of context & semantics. A casual conversation about iPhone security is, unless we’re talking national secrets et al, about mundane individual citizens preventing idiots, criminals, and police from snooping & abusing contents. OF COURSE all bets are off when you’re talking a superpower’s unlimited-funding agency that literally has the right to sneak into your house at night and replace your iPhone with a compromised clone, or throw endless funds at finding/abusing extremely obscure flaws - if not just plain tie you up and literally beat the information out of you.
Yes, iOS & Android devices have flaws to varying degrees, and Apple in particular is quite good at either building near-flawless security or fixing flaws when found - though of course not everything is perfect. By “security” we’re usually talking about a device bricking itself when stolen, or otherwise being generally impervious to what 99.999% of criminals will have to breach security. When you’re talking CIA, we’re talking agencies that can, and do, throw millions of dollars at a SINGLE infiltration; groups which have technology to wirelessly observe radio-noise transmissions from the device and deduce likely passcodes from obscurities like watching variations in power consumption.
When Swordmaker comes on FR and declares the iPhone X “secure”, he’s NOT talking about “from the CIA if they’re he11-bent on reading the contents”. I don’t understand how people think a casual 2-paragraph comment in an unofficial social forum is supposed to be of peer-reviewed encyclopedic completeness. OF COURSE general commercial computing/telecom tools aren’t perfectly “secure”.
I have a rule of thumb about planning for home security: If the attackers are several in number, have advanced CQB training, have a near-unlimited arms-and-armor budget, are using night vision, etc - then I concede they’ll win. Likewise, if pretty much everyone I meet is completely unable to access my private data, I’m secure - and if the CIA decides to throw $10M at finding my secrets, they’re welcome to ‘em.
The FBI can’t use CIA tools or techniques for investigations or they can’t use the evidence at trial. Just because the CIA and NSA have capabilities does not mean the FBI has them as well, or if they did it doesn’t mean they can use them legally.
Oh and I forgot to add, that’s assuming the CIA would tell the FBI their capabilities and let them use them.
I was a member of an IT support team for a very large High School.. with over 500 computers. We were on a network for a school district which was supported by the State Dept of Education.
I got a call one day from state, telling me that they/we were being infected by a BOT that was migrating across the network very fast.
We shut down our local server/ to await a fix from state.
WE discovered that the BOT was using the combined computing power of the network to do some sort of calculations
I never found out where the BOT came from, I now wonder if it was the CIA
I think people are worried aboutv”The Lives of Others” scenario...and frankly I have felt that many in Congress have been scared witless by info on THEM.
Lets just say when Bush put all the spy agencies under one roof, he let the CIA spy on Americans. I know there are supposed to be rules to stop it. I know its not legal. But the CIA never follows laws. They treat America like any other country they deal with. They are very dangerous to democracy.
That and to give out of work Nazi paper clippers a job.
Yup.
Not to worry, with $10M they can find anything on your system.
Anything...
FBI Used Best Buys Geek Squad To Increase Secret Public Surveillance
http://www.ocweekly.com/news/fbi-used-best-buys-geek-squad-to-increase-secret-public-surveillance-7950030
#11 it was using all the computing power to figure out the pensions for the state workers.... : )
The FBI cant use CIA tools or techniques for investigations or they cant use the evidence at trial.
**************
BS They will simply lie and say they got the info from another source or in another way but they will use the illegally obtained intel.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.