Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

WikiLeaks release shows how the CIA uses code to hide the origins of its hacking attacks
Daily Mail ^ | 3/31/17

Posted on 03/31/2017 4:58:44 AM PDT by Enlightened1

WikiLeaks has published hundreds more files today which it claims show the CIA went to great lengths to disguise its own hacking attacks and point the finger at Russia, China, North Korea and Iran.

The 676 files released today are part of WikiLeaks' Vault 7 tranche of files and they claim to give an insight into the CIA's Marble software, which can forensically disguise viruses, trojans and hacking attacks.

WikiLeaks says the source code suggests Marble has test examples in Chinese, Russian, Korean, Arabic and Farsi (the Iranian language).

It says: 'This would permit a forensic attribution double game, for example by pretending that the spoken language of the malware creator was not American English, but Chinese.'

This could lead forensic investigators into wrongly concluding that CIA hacks were carried out by the Kremlin, the Chinese government, Iran, North Korea or Arabic-speaking terror groups such as ISIS.

WikiLeaks, whose founder Julian Assange remains holed up in the Ecuadorean Embassy in London, said Vault 7 was the most comprehensive release of US spying files ever made public.

Earlier this month WikiLeaks published thousands of documents claiming to reveal top CIA hacking secrets, including the agency's ability to infiltrate encrypted apps like Whatsapp, break into smart TVs and phones and program self-driving cars.

It also claims the CIA can bypass the encryption of Whatsapp, Signal, Telegram, Wiebo, Confide and Cloakman by hacking the smart phones the applications run on.

The CIA was also looking at hacking the vehicle control systems used in modern cars and trucks, WikiLeaks claims.

(Excerpt) Read more at dailymail.co.uk ...


TOPICS: Constitution/Conservatism; Crime/Corruption; Government; News/Current Events
KEYWORDS: cia; ciacode; ciahacking; code; hack; russian

1 posted on 03/31/2017 4:58:44 AM PDT by Enlightened1
[ Post Reply | Private Reply | View Replies]

To: Enlightened1

CIA is a bunch of liars


2 posted on 03/31/2017 5:06:03 AM PDT by yldstrk (My heroes have always been cowboys)
[ Post Reply | Private Reply | To 1 | View Replies]

To: yldstrk

Maybe McCain, Rubio and Graham will now stop their, it’s the Russians” game and wake up. Not likely since it gives them power over Trump. Personal power is what those three in the Senate are hanging on to.

They are dividing the party for their own petty purposes......

Pence and Pompeo can reign this in......


3 posted on 03/31/2017 5:11:38 AM PDT by blackberry1
[ Post Reply | Private Reply | To 2 | View Replies]

To: Enlightened1

It wouldn’t surprise me if muzzie Brennen was hacking on behalf of obama. Obama and Hillary really don’t like each other. Obama only gave the appearance of supporting Hillary.

Obama and his goons (like Brennan) spied on Hillary and Trump.

Hillary lost because of obama. She was unable to critize anything that obama did because he had the goods on her that could have brought her down at any time. He could have at any time derailed her campaign. Hillary couldn’t even critize the lame economy under obama. She had to steer clear of any issues that were critical of obama.

Obama had his muzzie pal spying on Trump, Hillary, Merkel, the Japanese, and so many others except for our greatest threats ..... their Muslim pals.


4 posted on 03/31/2017 5:13:49 AM PDT by boycott
[ Post Reply | Private Reply | To 1 | View Replies]

To: Enlightened1

Why would Russia not want Hillary to win?

Pray America woke


5 posted on 03/31/2017 5:37:08 AM PDT by bray (Pray for President Trump)
[ Post Reply | Private Reply | To 1 | View Replies]

To: bray

Because Hillary won’t be satiated becoming Queen of the US. She would want the world and Russia would just get in her way.

When Hillary has a more realistic moment, realizing she won’t have the power of the Presidency, she now feels threatened that others might think the way she thinks and come after her, to imprison her for her criminal activity. Since she can manipulate US intelligence, FBI and CIA, among several others, the Russians are likely the only intel source she can’t control. If she can’t control them, she chooses to demonize them to lessen their potential attacks on her.


6 posted on 03/31/2017 5:43:47 AM PDT by Cvengr ( Adversity in life & death is inevitable; Stress is optional through faith in Christ.)
[ Post Reply | Private Reply | To 5 | View Replies]

To: Enlightened1

Just shared on Facebook. Globalist Traitors everywhere! Pray for President Trump.


7 posted on 03/31/2017 5:58:13 AM PDT by cowboyusa
[ Post Reply | Private Reply | To 1 | View Replies]

To: Cvengr
to imprison her for her criminal activity

I think she deserve better than American prison. Lubyanka must be a proper place for her incarceration. So there is something Putin can do for Trump after all.

8 posted on 03/31/2017 5:58:35 AM PDT by TigerLikesRooster (dead parakeet + lost fishing gear = freep all day)
[ Post Reply | Private Reply | To 6 | View Replies]

To: Enlightened1

Can some one explain to me how Russia tried to subvert the 2016 election?


9 posted on 03/31/2017 6:03:35 AM PDT by Chgogal (I will NOT submit, therefore, Jihadists hate me.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Enlightened1

It begs the question of whether or not what the private security firm identified as “Russian” signatures in the DNC hacking was actually CIA hacking made to look as if it was from a Russian source - Obama spying on the DNC and Billary, Inc.


10 posted on 03/31/2017 6:07:16 AM PDT by Wuli
[ Post Reply | Private Reply | To 1 | View Replies]

To: Enlightened1
Maybe the CIA's too unethical for their own good. Maybe being unethical - and getting away with it - is part of the reason the world's NOT done much to solve their problems. The more we know - the less impressed we are... Shine some sunlight on them...
11 posted on 03/31/2017 8:29:05 AM PDT by GOPJ (Democrats lost because Hillary was so unpopular a dead dog could have beaten her. Roger Daltrey)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Enlightened1

Just wondering? Is it possible there might be a white hat that has done some of the (fake Russian)hacking and feeding it to WikiLeaks?

Maybe that is where Anonymous and WikiLeaks got their info on the DNC and Podesta?

Wouldn’t it be wonderful if the white hats have a mole in the shadow government....


12 posted on 03/31/2017 8:46:43 AM PDT by Ms Mable
[ Post Reply | Private Reply | To 1 | View Replies]

To: Enlightened1
You can't trust the government about anything. They lie habitually. Even when the truth will suffice, they will lie just out of habit.

I'd just as soon trust a random biker dude, as anyone from the FBI, NSA, CIA, DEA, or BATF.

13 posted on 03/31/2017 9:35:58 AM PDT by zeugma (The Brownshirts have taken over American Universities.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Enlightened1
"CIA went to great lengths to disguise its own hacking attacks and point the finger at Russia, China, North Korea and Iran.

Did Google and/or Crowdstrike have contracts with the CIA?

Was Crowdstrike made aware of this CIA capability either directly or illegally?

Did Crowdstrike in fact, plant a Russian signature through a false-flag Phishing scam against the DNC for possible later use against candidate Trump in the event that he won?

I wouldn't be surprised to find out that the answer is 'Yes' to all three.
14 posted on 03/31/2017 10:22:47 AM PDT by indthkr
[ Post Reply | Private Reply | To 1 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson