Posted on 03/07/2017 6:12:05 AM PST by Ultra Sonic 007
Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named "Vault 7" by WikiLeaks, it is the largest ever publication of confidential documents on the agency.
The first full part of the series, "Year Zero", comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA's Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election.
Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized "zero day" exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.
"Year Zero" introduces the scope and direction of the CIA's global covert hacking program, its malware arsenal and dozens of "zero day" weaponized exploits against a wide range of U.S. and European company products, include Apple's iPhone, Google's Android and Microsoft's Windows and even Samsung TVs, which are turned into covert microphones.
Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA). The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force — its own substantial fleet of hackers. The agency's...
(Excerpt) Read more at wikileaks.org ...
Chips in planes with assassination potential?
Potentially every plane crash ever, but how about...
http://www.foxnews.com/us/2013/12/12/hawaii-health-official-killed-in-plane-crash.html
or JFK Jr, front runner for US Senate Seat in NY, which then opened up for Cankles
Meaning Snowdon was RIGHT !!!
Oh NO. Needs to go HIGHER: = Barry Soetoro, Klintonistas, Nazi Pelosi, etc. Then noosing in public square or like Saddam Hussein !!!
Hopefully, with all the potential corruption coming to the surface, from many angles, I hope it brings down the democrat party, its rino supporters and the whole supporting structure, including the media.
I just got through running some errands in the car. The CBS news come on the radio and they are still reporting there is no supporting evidence from President Trump's tweets from over the weekend. The enemedia is doubling down on the lies (see my tagline).
Of course I remembered CBS News is run by Ben Rhodes brother, David, and where Sharyl Attkisson worked when she was hacked, while she was investigating negative issues with the 0bama administration. Ben Rhodes former national security advisor for the 0bama administration so it's all adding up with this Wikileaks release today.
Justice needs to be done to help restore our Constitutional Republic.
CGato
What if the purpose of the easy hackability is to provide information to the enemy bloc, or to deliberately defang the U.S.?
+...
That’s a possibility. Especially with Obama.
Facebook announced ban on Vault 7 Wikileaks
http://thevictoryreport.org/breaking-live-facebook-announces-ban-on-vault-7wikileaks-news/
When I was a kid, one of the electrical whizzes in our family would take the Princess telephone apart and put it back together again, and it would still work. Likewise, many teenagers repaired their own cars. Boys built ham radio sets from kits from the “five and dime” (look it up, young people). My oldest male relative built his entire house by hand before the age of power tools. Now, you have to spend a fortune to upgrade your computer every couple of years, the government made everyone get rid of analog tvs, you pay more in real estate taxes and HOA fees than it costs to rent an apartment, and it costs $100 to $250 to replace a burned out headlight bulb on a late-model car. It’s almost impossible to go off the grid; and now they’re even trying to get rid of cash.
I’m glad I’m old.
FU CIA.
Enemy of a Free America, a Free People, A Free Republic.
Let the response to you, eliminate you.
Asshle traitors.
Ahh... My favorite song.
thanks for the ping!
Let's hope for the future of our Sacred Republic, Justice happens now. Go Jeff Sessions! Line em' up and prosecute em' all!
It sure did me too:
"CIA deliberately mimics the hacking protocols of Russia to obfuscate their own hacks."
Which brings us back to Hillary at Lame Cherry:
VAULT 7: Was Hillary Clinton the Russian Hacker Oh My. . It all fits.
From Lame Cherry: "This brings us to the reality of the question in Hillary Clinton with her off server to hide Clinton crimes, and to gain a door into the US computer structure for her spies and donors, was Russian hacking all James Clapper in the CIA for the Obama regime to install Hillary Clinton."
"Which brings up the question of did James Clapper provide CIA Deep State hacking to blame the Russians or did Mrs. Clinton contract this out so her hackers would leave Russian fingerprints and feed these bizarre rants from CIA and FBI about Russian hacking which WERE DEMOCRATIC TALKING POINTS as Chuck Schumer has been driving them with Maxine Waters ever since to impede President Trump making America Great Again."
"The evidence points to a CIA operation was conducted by the Obama regime for Mrs. Clinton in complete collusion, and Obama Clinton were the source for the Russian hacking in a major frame up of Russia and Vladimir Putin."
Time for Grand Juries and Special Prosecutors. Go Jeff Sessions! America is 100% behind you!
Wonder if that was something Seth found? Or if the IT ( Brian P) who worked for HER knows something about?
Would her server show that someone was using it as a base to hack into other computers.
Thought. Had she created the Russian/Trump scenerio and Bill was delivering it on the Tarmac Providing evidence for the FISA request
Wonder if that was something Seth found? Or if the IT ( Brian P) who worked for HER knows something about?
Would her server show that someone was using it as a base to hack into other computers.
Thought. Had she created the Russian/Trump scenerio and Bill was delivering it on the Tarmac Providing evidence for the FISA request he had for her signature.
http://abcnews.go.com/US/china-leading-suspect-massive-hack-us-government-networks/story?id=32036222
China Is 'Leading Suspect' in Massive Hack of US Government Networks
The nations top intelligence official said today what other U.S. officials have so far been unwilling to say publicly: China is the leading suspect in the massive theft of sensitive U.S. government records.
Speaking at a forum in Washington, Director of National Intelligence James Clapper warned of the danger posed by a capable adversary like the Chinese government.
You have to kind of salute the Chinese for what they did, Clapper said.
At least 18 million people -- and potentially tens of millions more around the world, including relatives, friends and associates of those who had background checks conducted by the U.S. government -- may have had their personal information stolen when hackers broke into the systems of the Office of Personnel Management, authorities have said.
The problem for us, frankly, is until such time as we can create both the substance and the psychology of deterrence, this is going to go on, Clapper said.
He noted unintended consequences and other related policy issues need to be considered when the U.S. government decides how to respond.
The question of just how big the breach was now focuses on files associated with background investigations, particularly forms known as SF-86s.
The forms require applicants to provide personal information not only about themselves but also relatives, friends and associates spanning several years. The forms also ask applicants about past drug use, financial history, mental health history and personal relationships.
That type of information could be exploited to pressure or trick employees into further compromising their agencies, sources have told ABC News.
---------------------------
With what we understand now how they can operate, was the Chinese used as an excuse to spy on Americans? Especially how they were looking for dirt on government employees for possible future coercion. Any of these hacks that were blamed on others needs further scrutiny now.
CGato
http://www.freerepublic.com/focus/f-news/3514036/posts
Crowdstrike also received funding from the CapitalG arm of Alphabet, the parent company of Google: DNC Russian Hacking Conclusion Comes from Google-Linked Firm
The CIA didn’t remotely hack a TV. The docs are clear that they can update the software running on the TV using a USB drive. There’s no evidence of them doing so remotely over the Internet. If you aren’t afraid of the CIA breaking in an installing a listening device, then you should’t be afraid of the CIA installing listening software.
The CIA didn’t defeat Signal/WhattsApp encryption. The CIA has some exploits for Android/iPhone. If they can get on your phone, then of course they can record audio and screenshots. Technically, this bypasses/defeats encryption — but such phrases used by Wikileaks arehighly misleading, since nothing related to Signal/WhatsApp is happening. What’s happening is the CIA is bypassing/defeating the phone. Sometimes. If they’ve got an exploit for it, or can trick you into installing their software.
http://blog.erratasec.com/2017/03/some-comments-on-wikileaks-ciavault7.html
More comments at the liked site.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.