Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Vault 7: CIA Hacking Tools Revealed (Wikileaks unveils the CIA)
Wikileaks ^ | 3/7/2017 | Wikileaks

Posted on 03/07/2017 6:12:05 AM PST by Ultra Sonic 007

Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named "Vault 7" by WikiLeaks, it is the largest ever publication of confidential documents on the agency.

The first full part of the series, "Year Zero", comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA's Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election.

Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized "zero day" exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

"Year Zero" introduces the scope and direction of the CIA's global covert hacking program, its malware arsenal and dozens of "zero day" weaponized exploits against a wide range of U.S. and European company products, include Apple's iPhone, Google's Android and Microsoft's Windows and even Samsung TVs, which are turned into covert microphones.

Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA). The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force — its own substantial fleet of hackers. The agency's...

(Excerpt) Read more at wikileaks.org ...


TOPICS: Breaking News; Constitution/Conservatism; Crime/Corruption; Government
KEYWORDS: brennan; brennancia; cci; cia; ciahacking; ciahackingarsenal; crowdstrike; deepstate; dmitrialperovitch; dncemailhack; dnchack; obama; obamagate; shadowgovernment; trump; vault7; vault7graphic; wiki; wikileaks
Navigation: use the links below to view more comments.
first previous 1-20 ... 141-160161-180181-200201-211 next last
To: Art in Idaho

Chips in planes with assassination potential?

Potentially every plane crash ever, but how about...
http://www.foxnews.com/us/2013/12/12/hawaii-health-official-killed-in-plane-crash.html

or JFK Jr, front runner for US Senate Seat in NY, which then opened up for Cankles


161 posted on 03/07/2017 3:52:49 PM PST by ReaganGeneration2
[ Post Reply | Private Reply | To 131 | View Replies]

To: Art in Idaho; MinuteGal; LucyT; Tilted Irish Kilt; Whenifhow; WildHighlander57; Fedora; ...

Meaning Snowdon was RIGHT !!!


162 posted on 03/07/2017 4:32:08 PM PST by danamco
[ Post Reply | Private Reply | To 131 | View Replies]

To: allendale; MinuteGal; LucyT; Whenifhow; WildHighlander57; Fedora; null and void

Oh NO. Needs to go HIGHER: = Barry Soetoro, Klintonistas, Nazi Pelosi, etc. Then noosing in public square or like Saddam Hussein !!!


163 posted on 03/07/2017 4:37:39 PM PST by danamco
[ Post Reply | Private Reply | To 3 | View Replies]

To: Art in Idaho
Hopefully, this will be the start of roping in the rogue agency.

Hopefully, with all the potential corruption coming to the surface, from many angles, I hope it brings down the democrat party, its rino supporters and the whole supporting structure, including the media.

I just got through running some errands in the car. The CBS news come on the radio and they are still reporting there is no supporting evidence from President Trump's tweets from over the weekend. The enemedia is doubling down on the lies (see my tagline).

Of course I remembered CBS News is run by Ben Rhodes brother, David, and where Sharyl Attkisson worked when she was hacked, while she was investigating negative issues with the 0bama administration. Ben Rhodes former national security advisor for the 0bama administration so it's all adding up with this Wikileaks release today.

Justice needs to be done to help restore our Constitutional Republic.

CGato

164 posted on 03/07/2017 4:39:43 PM PST by Conservative Gato (There are NOW 4 kind of LIES; Lies, Damned Lies, Statistics, and the Media.)
[ Post Reply | Private Reply | To 150 | View Replies]

To: dynoman
This is so bad, CIA creates hacking tools that probably are cutting edge. But their management and security sucks so bad they lose the tools to who knows who, and ultimately to Wikileaks. Who’s faults is this? Wikileaks?? No It’s the CIA’s fault, 100%.

What if the purpose of the easy hackability is to provide information to the enemy bloc, or to deliberately defang the U.S.?

165 posted on 03/07/2017 4:43:28 PM PST by Albion Wilde ("We will be one people, under one God, saluting one American flag." --Donald Trump)
[ Post Reply | Private Reply | To 7 | View Replies]

To: Red Badger

+...

166 posted on 03/07/2017 4:52:53 PM PST by Albion Wilde ("We will be one people, under one God, saluting one American flag." --Donald Trump)
[ Post Reply | Private Reply | To 24 | View Replies]

To: Albion Wilde

That’s a possibility. Especially with Obama.


167 posted on 03/07/2017 4:55:32 PM PST by dynoman (Objectivity is the essence of intelligence. - Marilyn vos Savant)
[ Post Reply | Private Reply | To 165 | View Replies]

Facebook announced ban on Vault 7 Wikileaks

http://thevictoryreport.org/breaking-live-facebook-announces-ban-on-vault-7wikileaks-news/


168 posted on 03/07/2017 5:02:39 PM PST by Kalamata
[ Post Reply | Private Reply | To 167 | View Replies]

To: virgil

When I was a kid, one of the electrical whizzes in our family would take the Princess telephone apart and put it back together again, and it would still work. Likewise, many teenagers repaired their own cars. Boys built ham radio sets from kits from the “five and dime” (look it up, young people). My oldest male relative built his entire house by hand before the age of power tools. Now, you have to spend a fortune to upgrade your computer every couple of years, the government made everyone get rid of analog tvs, you pay more in real estate taxes and HOA fees than it costs to rent an apartment, and it costs $100 to $250 to replace a burned out headlight bulb on a late-model car. It’s almost impossible to go off the grid; and now they’re even trying to get rid of cash.

I’m glad I’m old.


169 posted on 03/07/2017 5:11:10 PM PST by Albion Wilde ("We will be one people, under one God, saluting one American flag." --Donald Trump)
[ Post Reply | Private Reply | To 107 | View Replies]

To: Ultra Sonic 007

FU CIA.

Enemy of a Free America, a Free People, A Free Republic.

Let the response to you, eliminate you.

Asshle traitors.


170 posted on 03/07/2017 6:26:32 PM PST by Mr. M.J.B.
[ Post Reply | Private Reply | To 1 | View Replies]

To: LouisianaJoanof Arc
Eagles - We are all just prisoner’s here - of our own device.

Ahh... My favorite song.

171 posted on 03/07/2017 6:30:19 PM PST by rdb3 (I'm worthless to one, but priceless to two. What am I?)
[ Post Reply | Private Reply | To 65 | View Replies]

To: LucyT

thanks for the ping!


172 posted on 03/07/2017 7:01:32 PM PST by bitt (The most insidious power that the media has, is the power to ignore - Chris Plante, WMAL)
[ Post Reply | Private Reply | To 133 | View Replies]

To: Conservative Gato
Justice needs to be done to help restore our Constitutional Republic.

Let's hope for the future of our Sacred Republic, Justice happens now. Go Jeff Sessions! Line em' up and prosecute em' all!

173 posted on 03/07/2017 10:55:40 PM PST by Art in Idaho (Conservatism is the only Hope for Western Civilization.)
[ Post Reply | Private Reply | To 164 | View Replies]

To: Fedora; LucyT; danamco; MinuteGal; Tilted Irish Kilt; Whenifhow; WildHighlander57; ...
Thanks for the summary of the release! The last item on there grabbed my attention.

It sure did me too:

"CIA deliberately mimics the hacking protocols of Russia to obfuscate their own hacks."

Which brings us back to Hillary at Lame Cherry:

VAULT 7: Was Hillary Clinton the Russian Hacker Oh My. . It all fits.

From Lame Cherry: "This brings us to the reality of the question in Hillary Clinton with her off server to hide Clinton crimes, and to gain a door into the US computer structure for her spies and donors, was Russian hacking all James Clapper in the CIA for the Obama regime to install Hillary Clinton."

"Which brings up the question of did James Clapper provide CIA Deep State hacking to blame the Russians or did Mrs. Clinton contract this out so her hackers would leave Russian fingerprints and feed these bizarre rants from CIA and FBI about Russian hacking which WERE DEMOCRATIC TALKING POINTS as Chuck Schumer has been driving them with Maxine Waters ever since to impede President Trump making America Great Again."

"The evidence points to a CIA operation was conducted by the Obama regime for Mrs. Clinton in complete collusion, and Obama Clinton were the source for the Russian hacking in a major frame up of Russia and Vladimir Putin."

Time for Grand Juries and Special Prosecutors. Go Jeff Sessions! America is 100% behind you!

174 posted on 03/07/2017 11:36:46 PM PST by Art in Idaho (Conservatism is the only Hope for Western Civilization.)
[ Post Reply | Private Reply | To 159 | View Replies]

To: Art in Idaho; null and void; aragorn; EnigmaticAnomaly; TWhiteBear; WildHighlander57; Velveeta; ...
”Image

Ping to # 174 .

Thanks, Art in Idaho.

175 posted on 03/07/2017 11:44:11 PM PST by LucyT
[ Post Reply | Private Reply | To 174 | View Replies]

To: LucyT

Wonder if that was something Seth found? Or if the IT ( Brian P) who worked for HER knows something about?
Would her server show that someone was using it as a base to hack into other computers.
Thought. Had she created the Russian/Trump scenerio and Bill was delivering it on the Tarmac Providing evidence for the FISA request


176 posted on 03/07/2017 11:51:04 PM PST by hoosiermama (When you open your heart to patriotism, there is no room for prejudice.DJT)
[ Post Reply | Private Reply | To 175 | View Replies]

To: LucyT

Wonder if that was something Seth found? Or if the IT ( Brian P) who worked for HER knows something about?
Would her server show that someone was using it as a base to hack into other computers.
Thought. Had she created the Russian/Trump scenerio and Bill was delivering it on the Tarmac Providing evidence for the FISA request he had for her signature.


177 posted on 03/07/2017 11:57:04 PM PST by hoosiermama (When you open your heart to patriotism, there is no room for prejudice.DJT)
[ Post Reply | Private Reply | To 175 | View Replies]

To: Art in Idaho; All
Thanks for the link. I looked at Clappers Wiki page and found this sourced article from ABC News.

http://abcnews.go.com/US/china-leading-suspect-massive-hack-us-government-networks/story?id=32036222

China Is 'Leading Suspect' in Massive Hack of US Government Networks

The nation’s top intelligence official said today what other U.S. officials have so far been unwilling to say publicly: China is “the leading suspect” in the massive theft of sensitive U.S. government records.

Speaking at a forum in Washington, Director of National Intelligence James Clapper warned of the danger posed by a capable adversary like the Chinese government.

“You have to kind of salute the Chinese for what they did,” Clapper said.

At least 18 million people -- and potentially tens of millions more around the world, including relatives, friends and associates of those who had background checks conducted by the U.S. government -- may have had their personal information stolen when hackers broke into the systems of the Office of Personnel Management, authorities have said.

“The problem for us, frankly, is until such time as we can create both the substance and the psychology of deterrence, this is going to go on,” Clapper said.

He noted “unintended consequences and other related policy issues” need to be considered when the U.S. government decides how to respond.

The question of just how big the breach was now focuses on files associated with background investigations, particularly forms known as SF-86s.

The forms require applicants to provide personal information not only about themselves but also relatives, friends and “associates” spanning several years. The forms also ask applicants about past drug use, financial history, mental health history and personal relationships.

That type of information could be exploited to pressure or trick employees into further compromising their agencies, sources have told ABC News.

---------------------------

With what we understand now how they can operate, was the Chinese used as an excuse to spy on Americans? Especially how they were looking for dirt on government employees for possible future coercion. Any of these hacks that were blamed on others needs further scrutiny now.

CGato

178 posted on 03/08/2017 12:38:53 AM PST by Conservative Gato (There are NOW 4 kind of LIES; Lies, Damned Lies, Statistics, and the Media.)
[ Post Reply | Private Reply | To 174 | View Replies]

To: Art in Idaho
Reminds me of this thread where we tied Crowdstrike's DNC "hack" investigator Dmitri Alperovitch to the FBI and CIA and determined that he had a prior history of issuing warnings about Russian hacking:

http://www.freerepublic.com/focus/f-news/3514036/posts

Crowdstrike also received funding from the CapitalG arm of Alphabet, the parent company of Google: DNC ‘Russian Hacking’ Conclusion Comes from Google-Linked Firm

179 posted on 03/08/2017 2:09:45 AM PST by Fedora
[ Post Reply | Private Reply | To 174 | View Replies]

To: Ultra Sonic 007; gandalftb; TigerLikesRooster; nuconvert

The CIA didn’t remotely hack a TV. The docs are clear that they can update the software running on the TV using a USB drive. There’s no evidence of them doing so remotely over the Internet. If you aren’t afraid of the CIA breaking in an installing a listening device, then you should’t be afraid of the CIA installing listening software.

The CIA didn’t defeat Signal/WhattsApp encryption. The CIA has some exploits for Android/iPhone. If they can get on your phone, then of course they can record audio and screenshots. Technically, this bypasses/defeats encryption — but such phrases used by Wikileaks arehighly misleading, since nothing related to Signal/WhatsApp is happening. What’s happening is the CIA is bypassing/defeating the phone. Sometimes. If they’ve got an exploit for it, or can trick you into installing their software.

http://blog.erratasec.com/2017/03/some-comments-on-wikileaks-ciavault7.html

More comments at the liked site.


180 posted on 03/08/2017 2:18:39 AM PST by AdmSmith (GCTGATATGTCTATGATTACTCAT)
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-20 ... 141-160161-180181-200201-211 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson