Moderators: Elvis, DrVolin, Jeff


Postby aimdrained » Tue Jan 09, 2007 7:33 pm

Keep your eyes on this one folks, Deepthroat goes wiki!


from the site:
WikiLeaks is developing an uncensorable version of WikiPedia for untraceable mass document leaking and analysis. Our primary targets are highly oppressive regimes in China, Russia, central eurasia, the middle east and sub-saharan Africa, but we also expect to be of assistance to those in the west who wish to reveal unethical behavior in their own governments and corporations. We aim for maximum political impact; this means our interface is identical to Wikipedia and usable by non-technical people. We have received over 1.1 million documents so far. We plan to numerically eclipse the content the english wikipedia with leaked documents.
Posts: 46
Joined: Thu Dec 21, 2006 2:00 pm
Blog: View Blog (0)

Re: WikiLeaks

Postby seemslikeadream » Sat Jul 13, 2013 9:29 am

thanks Luther Blissett

I thought this needed a bump

where are you aimdrained? Come back and say hi
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: WikiLeaks

Postby seemslikeadream » Tue Mar 07, 2017 1:30 pm

Vault 7: CIA Hacking Tools Revealed

New Wikileaks Series Details CIA's 'Specialized Unit' Dedicated to Creating iOS Exploits
Tuesday March 7, 2017 8:37 am PST by Mitchel Broussard
In a new series of leaks focusing on the United States Central Intelligence Agency, code named "Vault 7," Wikileaks has revealed 8,761 documents discovered within an isolated network in Langley, Virginia that "amounts to more than several hundred million lines of code." The code contains what Wikileaks referred to as a "hacking arsenal" of malware, viruses, trojans, and weaponized "zero day" exploits for iOS devices, that could give anyone in possession of the code "the entire hacking capacity of the CIA."

This "Year Zero" release is the first in the full Vault 7 series by Wikileaks, and is said to act as an introduction to the capacity and means of the CIA's covert hacking program. The agency's abilities can take aim at a number of popular consumer products from companies like Apple, Google, Samsung, and Microsoft, turning everything from an iPhone to a smart TV into a "covert microphone."

In its analysis of the released documents, Wikileaks looked at how iPhones and iPads have been targeted by the CIA in the past, and how they can continue to be exploited in the future. Although Android remains a dominant force in the global smartphone market, Wikileaks argued that a "disproportionate focus" has been placed on iOS devices by the CIA, most likely due to the Apple-branded phone's popularity.

Because of this, the agency has a specialized unit in place within the Mobile Development Branch that creates and executes malware to infiltrate, take control of, and exfiltrate sensitive information from iOS products. The MDB's methods are said to include a collection of zero day exploits, which are vulnerabilities in a piece of software unknown by the software's creator and subsequently exploitable by hackers.

Including the iOS malware, Wikileaks claimed that the CIA has recently "lost control" of the majority of its hacking arsenal.
Despite iPhone's minority share (14.5%) of the global smart phone market in 2016, a specialized unit in the CIA's Mobile Development Branch produces malware to infest, control and exfiltrate data from iPhones and other Apple products running iOS, such as iPads. CIA's arsenal includes numerous local and remote "zero days" developed by CIA or obtained from GCHQ, NSA, FBI or purchased from cyber arms contractors such as Baitshop. The disproportionate focus on iOS may be explained by the popularity of the iPhone among social, political, diplomatic and business elites.
Wikileaks noted that in the wake of Edward Snowden's NSA leaks, a group of technology companies convinced the Obama administration to disclose any zero day exploits and bugs to each company, rather than hoard the information. The Vulnerabilities Equities Process underlined this agreement in 2010, and the U.S. government said it would reveal any vulnerabilities discovered to the company in question.

Documents in Year Zero paint a further negative image for the CIA, which is said to not have abided by the agreement between the technology companies and the U.S. government. An example was given by Wikileaks centering on one malware that can control both the Android phone and iPhone software "that runs or has run presidential Twitter accounts." The government is said to not have brought the information forward to Apple or Google in the time it has had the hacking data.
As long as the CIA keeps these vulnerabilities concealed from Apple and Google (who make the phones) they will not be fixed, and the phones will remain hackable.

The same vulnerabilities exist for the population at large, including the U.S. Cabinet, Congress, top CEOs, system administrators, security officers and engineers. By hiding these security flaws from manufacturers like Apple and Google the CIA ensures that it can hack everyone at the expense of leaving everyone hackable.
The scope of the new Wikileaks documents includes detailed information on the iOS exploits, hacks that could potentially infest vehicle control systems, and even attacks against Samsung smart TV sets. This last point, dubbed "Weeping Angel," was said to have been developed by the CIA in conjunction with the United Kingdom's MI5 as a way to convert turned-off television sets into secret microphones.

The full list of the Year Zero documents can be found on Wikileaks, and complete analysis of the documents by independent security experts will take some time in order for the impact of the release to be determined. ... -exploits/

Trifecta » Wed Jan 17, 2007 6:02 am wrote:What is Why "wikify" leaking?

WikiLeaks is an uncensorable version of wikipedia for untraceable mass document leaking and analysis. It combines the protection and anonymity of cutting-edge cryptographic technologies with the transparency and simplicity of a wiki interface.
Principled leaking has changed the course of history for the better; it can alter the course of history in the present; it can lead us to a better future.
Consider Daniel Ellsberg, working within the US government during the Vietnam War. He comes into contact with the Pentagon Papers, a meticulously kept record of military and strategic planning throughout the war. Those papers reveal the depths to which the US government has sunk in deceiving the population about the war. Yet the public and the media know nothing of this urgent and shocking information. Indeed, secrecy laws are being used to keep the public ignorant of gross dishonesty practiced by their government. In spite of those secrecy laws and at great personal risk, Ellsberg manages to disseminate the Pentagon papers to journalists and to the world. Despite facing criminal charges, eventually dropped, the release of the Pentagon papers shocks the world, exposes the government, and helps to shorten the war and save thousands of lives.

The power of principled leaking to embarrass governments, corporations and institutions is amply demonstrated through recent history. Public scrutiny of otherwise unaccountable and secretive institutions pressures them to act ethically. What official will chance a secret, corrupt transaction when the public is likely to find out? What repressive plan will be carried out when it is revealed to the citizenry, not just of its own country, but the world? When the risks of embarrassment through openness and honesty increase, the tables are turned against conspiracy, corruption, exploitation and oppression. Open government answers injustice rather than causing it. Open government exposes and undoes corruption. Open governance is the most cost effective method of promoting good governance.
Today, with authoritarian governments in power around much of the world, increasing authoritarian tendencies in democratic governments, and increasing amounts of power vested in unaccountable corporations, the need for openness and democratization is greater than ever.

WikiLeaks is a tool to satisfy that need.

WikiLeaksreduces the risk to potential leakers and improves the analysis and dissemination of leaked documents.

WikiLeaks provides simple and straightforward means for anonymous and untraceable leaking of documents.
At the same time, WikiLeaks opens leaked documents up to a much more exacting scrutiny than any media organization or intelligence agency could provide: the scrutiny of a worldwide community of informed wiki editors.
Instead of a couple of academic specialists, WikiLeaks will provide a forum for the entire global community to examine any document relentlessly for credibility, plausibility, veracity and falsifiability. They will be able to interpret documents and explain their relevance to the public. If a document is leaked from the Chinese government, the entire Chinese dissident community can freely scrutinize and discuss it; if a document is leaked from Somalia, the entire Somali refugee community can analyze it and put it in context. And so on.

WikiLeaks may become the most powerful "intelligence agency" on earth -- an intelligence agency of the people. It will be an open source, democratic intelligence agency. But it will be far more principled, and far less parochial than any governmental intelligence agency; consequently, it will be more accurate, and more relevant. It will have no commercial or national interests at heart; its only interests will be truth and freedom of information. Unlike the covert activities of state intelligence agencies, WikiLeaks will rely upon the power of overt fact to inform citizens about the truths of their world.

WikiLeaks will be the outlet for every government official, every bureaucrat, every corporate worker, who becomes privy to embarrassing information which the institution wants to hide but the public needs to know. What conscience cannot contain, and institutional secrecy unjustly conceals, WikiLeaks can broadcast to the world.

WikiLeaks will be a forum for the ethical defection of unaccountable and abusive power to the people.
How will WikiLeaks operate?
To the user, WikiLeaks will look very much like wikipedia. Anybody can post to it, anybody can edit it. No technical knowledge is required. Leakers can post documents anonymously and untraceably. Users can publicly discuss documents and analyze their credibility and veracity. Users can discuss interpretations and context and collaboratively formulate collective publications. Users can read and write explanatory articles on leaks along with background material and context. The political relevance of documents and their verisimilitude will be revealed by a cast of thousands.

WikiLeaks will also incorporate advanced cryptographic technologies for anonymity and untraceability. Those who provide leaked information may face severe risks, whether of political repercussions, legal sanctions or physical violence. Accordingly, extremely sophisticated mathematical and cryptographic techniques will be used to secure privacy, anonymity and untraceability.
For the technically minded, WikiLeaks integrates technologies including modified versions of FreeNet, , PGP and software of our own design.

WikiLeaks will be deployed in a way that makes it impervious to political and legal attacks. In this sense it is uncensorable.
Who is behind WikiLeaks?

WikiLeaks was founded by Chinese dissidents, mathematicians and startup company technologists, from the US, Taiwan, Europe, Australia and South Africa.
Our advisory board, which is still forming, includes representatives from expatriate Russian and Tibetan refugee communities, reporters, a former US intelligence analyst and cryptographers.
There are currently 22 people directly involved in the project and counting.
What is your relationship to wikipedia?

WikiLeaks has no formal relationship to wikipedia. However both employ the same wiki interface and technology. Both share the same radically democratic philosophy that allowing anyone to be an author or editor leads to a vast and accurate collective intelligence and knowledge. Both place their trust in an informed community of citizens. What wikipedia is to the encyclopedia, WikiLeaks will be to leaks.
Wikipedia provides a positive example on which WikiLeaks is based. The success of wikipedia in providing accurate and up-to-date information has been stunning and surprising to many. Wikipedia shows that the collective wisdom of an informed community of users may produce massive volumes of accurate knowledge in a rapid, democratic and transparent manner. WikiLeaks aims to harness this phenomenon to provide fast and accurate dissemination, verification, analysis, interpretation and explanation of leaked documents, for the benefit of people all around the world.
What is WikiLeakss present stage of development?

WikiLeaks has developed a prototype which has been successful in testing, but there are still many demands required before we have the scale required for a full public deployment. We require additional funding, the support of further dissident communities, human rights groups, reporters and media representative bodies (as consumers of leaks), language regionalization, volunteer editors/analysts and server operators.
We have received over 1.1 million documents so far. We plan to numerically eclipse the content of the English wikipedia with leaked documents.
Anyone interested in helping us out with any of the above should contact us by email at [insert address here].
When will WikiLeaks go live?
We cannot yet give an exact date. We estimate February or March 2007.
Couldnt leaking involve invasions of privacy? Couldnt mass leaking of documents be irresponsible? Arent some leaks deliberately false and misleading?
Providing a forum for freely posting information involves the potential for abuse, but measures can be taken to minimize any potential harm. The simplest and most effective countermeasure is a worldwide community of informed users and editors who can scrutinize and discuss leaked documents.
Concerns about privacy, irresponsibility and false information also arise with wikipedia. On wikipedia, irresponsible posting or editing of material, or posting of false material, can be reversed by other users, and the results have been extremely satisfying and reassuring. There is no reason to expect any different from WikiLeaks . Indeed, as discovered with wikipedia to the surprise of many, the collective wisdom of an informed community of users may provide rapid and accurate dissemination, verification and analysis.
Furthermore, misleading leaks and misinformation are already well placed in the mainstream media, as recent history shows, an obvious example being the lead-up to the Iraq war. Peddlers of misinformation will find themselves undone by WikiLeaks , equipped as it is to scrutinize leaked documents in a way that no mainstream media outlet is capable of. An analogus example is this excellent unweaving of the British government's politically motivated additions to an intelligence dossier on Iraq. The dossier was cited by Colin Powell in his address to the United Nations the same month to justify the pending US invasion of Iraq.
In any case, our overarching goal is to provide a forum where embarrassing information can expose injustice. All policy will be formulated with this goal in mind.
Is WikiLeaks concerned about any legal consequences?
Our roots are in dissident communities and our focus is on non-western authoritarian regimes. Consequently we believe a politically motivated legal attack on us would be seen as a grave error in western administrations. However, we are prepared, structurally and technically, to deal with all legal attacks. We design the software, and promote its human rights agenda, but the servers are run by anonymous volunteers. Because we have no commercial interest in the software, there is no need to restrict its distribution. In the very unlikely event that we were to face coercion to make the software censorship friendly, there are many others who will continue the work in other jurisdictions.
Is leaking ethical?
We favour, and uphold, ethical behavior in all circumstances. Every person is the ultimate arbiter of justice in their own conscience. Where there is a lack of freedom and injustice is enshrined in law, there is a place for principled civil disobedience. Where the simple act of distributing information may embarrass a regime or expose crime, we recognize a right, indeed a duty, to perform that act. Such whistleblowing normally involves major personal risk. Just like whistleblower protection laws in some jurisdictions, WikiLeaks provides means and opportunity to minimize such risks.
We propose that every authoritarian government, every oppressive institution, and even every corrupt corporation, be subject to the pressure, not merely of international diplomacy or freedom of information laws, not even of quadrennial elections, but of something far stronger: the individual consciences of the people within them.


WikiLeaks Personnel Are Under Physical Surveillance
Postby surfaceskimmer » Wed Mar 24, 2010 11:14 pm

Wikileaks temporarily shuts down
Postby chiggerbit » Sat Jan 30, 2010 1:20 pm

Wikileaks to publish hacked neo-Nazi membership lists, etc.

WikiLeaks to release over half a million 9/11 intercepts
Postby justdrew » Wed Nov 25, 2009 1:08 am

German Wikileaks domain owner raided
Postby jingofever » Wed Mar 25, 2009 1:50 pm

Wikileaks _My life in child porn_ by Mr X
Postby marmot » Sat Feb 28, 2009 7:20 am

Wikileaks cracks NATO's Master Narrative for Afghanistan
Postby jingofever » Fri Feb 27, 2009 4:14 pm

Could Bank of America be the next WikiLeaks target?
Postby seemslikeadream » Tue Nov 30, 2010 8:57 pm

Wikileaks releases 6,780 Congressional reports
Postby KeenInsight » Sun Feb 08, 2009 12:35 pm

Germany: Head of BND Threatens Wikileaks
Postby vigilant » Tue Dec 23, 2008 8:33 pm

Will Wikileaks Work?
Postby American Dream » Tue Oct 21, 2008 12:52 pm

Wikileaks:Guantanamo facility caught editing Wiki
Postby chiggerbit » Thu Dec 13, 2007 11:44 am

Gitmo SOP manual posted at wikileaks
Postby professorpan » Mon Nov 12, 2007 5:01 pm

US violates chemical weapons convention in Iraq (WikiLeaks)
Postby American Dream » Fri Nov 09, 2007 10:26 am

Fact-free accusations about WikiLeaks
Postby seemslikeadream » Wed Aug 25, 2010 8:49 am

WikiLeaks founder hires star lawyer over Swedish claims
Postby seemslikeadream » Tue Aug 24, 2010 5:24 pm

Pentagon to Troops: Taliban Can Read WikiLeaks, You Can’t
Postby hanshan » Thu Aug 12, 2010 11:31 am

3False Criticisms of Wikileaks & Rush to Irrelevance & Error
Postby seemslikeadream » Wed Aug 11, 2010 1:40 pm

Wikileaks Cointelpro Wizard of Oz or 'Whistleblower'?
Postby Montag » Sun Aug 08, 2010 1:33 pm

The political spinning of the WikiLeaks exposé
Postby Montag » Sun Aug 01, 2010 2:49 pm

Wikileaks Afghanistan: former Pakistani general blames US
Postby Montag » Wed Jul 28, 2010 4:29 pm

Secret Archive Grim View of Afghan War - Wikileaks ONLINE
Postby seemslikeadream » Sun Jul 25, 2010 6:22 pm

Wikileaks founder Julian Assange is 'annoyed' by 9/11 truth
Postby elfismiles » Fri Jul 23, 2010 8:25 am

WikiLeaks founder drops 'mass spying' hint
Postby jingofever » Tue Jun 22, 2010 7:57 pm

Pentagon Manhunt For Wikileaks Founder Julian Assange
Postby elpuma » Fri Jun 11, 2010 1:26 pm

Wikileaks founder has his passport confiscated
Postby sunny » Wed May 19, 2010 9:33 am

WikiLeaks guy on AntiWar Radio now
Postby elfismiles » Thu Apr 15, 2010 12:31 pm

Wikileaks is who?
Postby wintler2 » Wed Apr 07, 2010 3:29 am

Yet Another Wikileaks Thread (UFO Disclosures)
Postby AhabsOtherLeg » Fri Dec 03, 2010 9:32 am

Dyncorp hired Afghan 'dancing boys' (WikiLeaks)
Postby Jeff » Fri Dec 03, 2010 12:50 am

Could Bank of America be the next WikiLeaks target?
Postby seemslikeadream » Tue Nov 30, 2010 8:57 pm

New York Times Left Out by Wikileaks
Postby seemslikeadream » Mon Nov 29, 2010 8:55 am

Israelis see PR windfall in WikiLeaks tips on Iran
Postby seemslikeadream » Mon Nov 29, 2010 6:15 am

The Wikileaks Question
Postby JackRiddler » Sun Nov 28, 2010 4:10 pm

Wikileaks is Israel.
Postby seemslikeadream » Sat Nov 27, 2010 1:59 pm

UK govt gets ready to censor media over Wikileaks
Postby 2012 Countdown » Fri Nov 26, 2010 2:09 pm

Questioning WikiLeaks Thread
Postby Montag » Mon Oct 25, 2010 1:50 pm

"WikiLeaks and 9/11: What if?"
Postby Nordic » Sat Oct 16, 2010 5:24 am

WikiLeaks to Release 400,000 Secret Documents Monday
Postby seemslikeadream » Fri Oct 15, 2010 10:28 pm

Financial Warfare on WikiLeaks
Postby seemslikeadream » Thu Oct 14, 2010 12:10 pmf=8&t=29812&p=360912&hilit=Wikileaks#p360912

WikiLeaks moves servers to nuclear bunker
Postby seemslikeadream » Tue Oct 12, 2010 9:02 pm


Wikileaks releases CIA 'exporter of terrorism' report
Postby seemslikeadream » Wed Aug 25, 2010 6:19 pm


Wikileaks: US fought to lower minimum wages in Haiti
Postby Jeff » Sat Jun 04, 2011 7:07 am


Benazir Bhutto sought US security but was denied: WikiLeaks
Postby seemslikeadream » Mon May 23, 2011 9:17 pm

WikiLeaks cables show that it was all about the oil

Postby wintler2 » Thu May 19, 2011 7:47 pm

FBI question distressed WikiLeaks mother at Welsh home

Postby fruhmenschen » Wed Apr 13, 2011 8:08 pm

WikiLeaks nominated for 2011 Nobel Peace Prize

Postby seemslikeadream » Wed Feb 02, 2011 11:44 am

What Might Be Lurking in WikiLeaks' "Thermonuclear Device"?
Postby seemslikeadream » Sun Jan 23, 2011 8:05 pm

Zahir Ebrahim: WOW – Israel Shamir Works for Wikileaks!

Postby seemslikeadream » Sat Jan 22, 2011 10:00 pm

Wikileaks Finally Releases Some Long-Awaited Israel Cables
Postby AlicetheKurious » Thu Jan 20, 2011 1:33 pm

The other wikileaks questions.
Postby Joe Hillshoist » Thu Dec 30, 2010 1:48 am

WikiLeaks makes diplomacy difficult, says UN head
Postby lupercal » Sat Dec 18, 2010 1:22 pm

Postby Twyla LaSarc » Fri Dec 17, 2010 8:47 pm

Anonymous hackers hit Visa Mastercard in WikiLeaks revenge
Postby seemslikeadream » Wed Dec 08, 2010 5:54 pm

Cryptome founder:"Wikileaks is a fraud"
Postby lupercal » Wed Dec 08, 2010 5:19 am

Greg Palast: Manning Real Hero of Wikileaks
Postby Montag » Sat Dec 04, 2010 4:03 pm

WikiLeaks chief: Expect UFO talk in future files
Postby fruhmenschen » Fri Dec 03, 2010 10:02 pm

WikiLeaks Confirms North American Integration Scheme
Postby seemslikeadream » Thu Jun 09, 2011 1:51 pm

Wikileaks Haiti: The Aristide Files
Postby Jeff » Sun Aug 07, 2011 7:02 am

WikiLeaks: Iraqi children in U.S. raid shot in head
Postby seemslikeadream » Thu Sep 01, 2011 5:44 pm

WikiLeaks Attorney Wants Obama/Clinton To Tesify
Postby seemslikeadream » Mon Dec 05, 2011 10:55 am

WikiLeaks Email: Bin Laden’s Corpse Not Dumped at Sea
Postby seemslikeadream » Mon Mar 05, 2012 3:23 pm

Wikileaks – Syria Files
Postby vanlose kid » Thu Jul 05, 2012 12:07 pm

Wikileaks under attack- TrapWire
Postby MayDay » Sun Aug 12, 2012 4:15 pm

Alexa O'Brien interviewed on Manning, Wikileaks, Occupy
Postby JackRiddler » Sat Oct 13, 2012 11:18 pm

Welcome to WikiLeaks Party News
Postby seemslikeadream » Mon Jun 24, 2013 3:54 pm

WikiLeaks Volunteer Was a Paid Informant for the FBI
Postby MinM » Thu Jun 27, 2013 12:43 pm

Trailer For Dreamworks Assange Wikileaks film
Postby 8bitagent » Sat Jul 20, 2013 9:43 pm

Future of Civilization Is Battle Between Google & Wikileaks
Postby seemslikeadream » Fri Oct 10, 2014 4:17 pm

Wikileaks Syria Docs Exclude Email $2B Transfer to Russia
Postby seemslikeadream » Fri Sep 09, 2016 3:48 pm

WikiLeaks: Assange's internet link 'severed' by state actor
Postby seemslikeadream » Mon Oct 17, 2016 6:55 am
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: WikiLeaks

Postby seemslikeadream » Tue Mar 07, 2017 3:34 pm

The CIA is using your TVs, smartphones and cars for spying
By Craig Timberg, Ellen Nakashima and Elizabeth Dwoskin March 7 at 1:54 PM

(David Berkowitz)
The latest revelations about U.S. government’s powerful hacking tools potentially takes surveillance right into the homes and hip pockets of billions of users worldwide, showing how a remarkable variety of every day devices can be turned to spy on their owners.

Televisions, smartphones and Internet-connected vehicles are all vulnerable to CIA hacking, according to the Wikileaks documents released Tuesday. The capabilities described include recording the sounds, images and the private text messages of users, even when they use encrypted apps to communicate. Vehicles, meanwhile, are vulnerable to a remote hacker gaining control, allowing “nearly undetectable assassinations.”

In the case of a tool called “Weeping Angel” for attacking Samsung SmartTVs, Wikileaks wrote, “After infestation, Weeping Angel places the target TV in a 'Fake-Off' mode, so that the owner falsely believes the TV is off when it is on, In 'Fake-Off' mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.”

The documents, which The Washington Post has not independently confirmed, list supposed tools for cracking into such widely popular devices as Apple’s iPhone or the Android smartphones whose operating system is made by Google, but there are marked differences from the 2013 revelations by the National Security Agency’s former contractor Edward Snowden.

His documents largely described mass surveillance of Internet-based communications systems, more often than the individual devices that appear to have been the focus of the CIA. By targeting devices, the CIA could gain access to even well-encrypted communications, on such popular apps as Signal and WhatsApp, without having to crack the encryption itself. The Wikileaks reports appears to acknowledge that difference by saying the CIA “bypassed” as opposed to defeated encryption technologies.

Privacy say experts the CIA may have been forced into focusing on vulnerable devices because the Internet overall has become more secure through more widespread deployment of encryption. In this new world, devices have become the most vulnerable link.

“The idea that the CIA and NSA can hack into devices is kind of old news,” said Johns Hopkins cryptography expert Matthew Green. “Anyone who though they couldn’t was living in a fantasy world.”

Snowden’s revelations and the backlash made strong encryption a major, well-funded cause for both privacy advocates and, perhaps more importantly, technology companies that had the engineering expertise and budgets to protect data as it flowed across the world.

Google, Microsoft, Facebook, Yahoo and many other companies announced major new initiatives, in part to protect their brands against accusations by some users that they had made it too easy for the NSA to collect information from their systems. Many Web sites, meanwhile, began encrypting their data flows to users to prevent snooping. Encryption tools such as Tor were strengthened. Encrypting apps for private messaging, such as Signal, were developed.

U.S. government authorities complained loudly that the new wave of encryption was undermining their ability to investigate serious crimes, such as terrorism and child pornography. The FBI sued Apple in hopes of forcing it to unlock an iPhone used by the San Bernadino killers before announcing it had other ways to crack the device amid heavy public criticism.

Against that backdrop, many privacy advocates argued that devices — often called “endpoints” for their place on chains of communications that can criss-cross continents — were the best available target left in a world with widespread online encryption. The Wikileaks documents suggests that the CIA may have reached the same conclusion.

“It would certainly be consistent with the hypothesis that we’ve made real progress in the encryption we’ve been introducing,” said Peter Eckersley, technology projects director for the Electronic Frontier Foundation, a San Francisco-based civil liberties group. “It’s impossible to be 100 percent certain, but reading the tea leaves, it’s plausible.”

The Wikileaks revelations also will serve as a reminder that, for whatever the political backlash to revelations about digital spying, it is not going away and probably will continue to grow. The focus on hacking into individual devices -- rather than the messages traveling between them -- is likely to increase pressure on companies to make those devices safer because, as experts have long said, they are the most vulnerable target in a long chain of digital interactions.

That could be especially important for U.S. tech companies, such as Google, Apple and Facebook, that have worked to rebuild their reputations as stewards of their users’ privacy in recent years.

"The question for companies is how can I keep or grow my customer base when my brand is built around privacy?” Justin Somaini, chief security officer of SAP. "Tech companies are going to cite this and other situations as reasons to employ ever more sophisticated encryption to quote on quote, go dark.”
Cybersecurity experts, meanwhile, reacted with alarm to the news of the Wikileaks release.

“This is explosive,” said Jake Williams, founder of Rendition Infosec, a cybersecurity firm. The material highlights specific antivirus products that can be defeated, going further than a release of NSA hacking tools last year, he said.

The CIA hackers, according to WikiLeaks, even “discussed what the NSA’s …hackers did wrong and how the CIA’s malware makers could avoid similar exposure.”

Hackers who worked at NSA’s Tailored Access Operations unit said the CIA’s library of tools looked comparable. The description of the implants, which are software that enable a hacker to remotely control a compromised device, and other attack tools appear to be “very, very complex” and “at least on par with the NSA,” said one former TAO hacker who spoke on condition his name not be used.

The Switch newsletter
The day's top stories on the world of tech.
Sign up
The WikiLeaks release revealed that they have sophisticated “stealth” capabilities that enable hackers not only to infiltrate systems, but evade detection, as well as abilities to “escalate privileges” or move inside a system as if they owned it.

“The only thing that separates NSA from commodity malware in the first place is their ability to remain hidden,” the former TAO hacker said. “So when you talk about the stealth components, it’s huge that you’re seeing a tangible example here of them using and researching stealth.”

Computer security experts noted that the release includes no actual tools or exploits, “so we don’t know if WikiLeaks did not get them or is just not choosing to publish them,” Nicholas Weaver, a computer security researcher at the University of California at Berkeley. “However we should assume that whoever stole this data has access to the exploits and tools.”

He noted that the dates in the files suggest the tools were taken in February or March 2016 and that there are at least two documents marked Top Secret, “which suggests that somebody in early 2016 managed to compromise a Top Secret CIA development system and is willing to say that they did.”

One internal CIA document listed a set of Apple iPhone “exploits” — or tools that can be used to compromise the device by taking advantage of software flaws. Some of the tools are based on “zero-days,” which are software vulnerabilities that have not been shared with the manufacturer. So “some of these descriptions will allow Apple to fix the vulnerabilities,” Weaver said. “But at the same time, they’re out in the public and whoever stole this data could use them against U.S. interests.” ... 24d005c254
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: WikiLeaks

Postby Elvis » Tue Mar 07, 2017 3:41 pm

seemslikeadream wrote:The CIA is using your TVs, smartphones and cars for spying

Good thing I don't have a TV, smartphone or car!

(I have a TV set but it's not connected to anything but a DVD player)
"Frankly, I don't think it's a good idea but the sums proposed are enormous."
User avatar
Posts: 6658
Joined: Fri Apr 11, 2008 7:24 pm
Blog: View Blog (0)

Re: WikiLeaks

Postby Luther Blissett » Tue Mar 07, 2017 3:59 pm

It is way more common now for meetings to take place with phones and computers left in the car I've noticed. Luckily not too many people I know own a smart tv. That used to be a rarity.
The Rich and the Corporate remain in their hundred-year fever visions of Bolsheviks taking their stuff - JackRiddler
User avatar
Luther Blissett
Posts: 4951
Joined: Fri Jan 02, 2009 1:31 pm
Location: Philadelphia
Blog: View Blog (0)

Re: WikiLeaks

Postby Cordelia » Tue Mar 07, 2017 6:55 pm

Elvis » Tue Mar 07, 2017 6:41 pm wrote:
seemslikeadream wrote:The CIA is using your TVs, smartphones and cars for spying

Good thing I don't have a TV, smartphone or car!

(I have a TV set but it's not connected to anything but a DVD player)

Ditto on all the have-nots (but also take it for granted that spying is done anyway, via laptops, landlines, etc........)
The greatest sin is to be unconscious. ~ Carl Jung

We may not choose the parameters of our destiny. But we give it its content. ~ Dag Hammarskjold 'Waymarks'
User avatar
Posts: 3608
Joined: Sun Oct 11, 2009 7:07 pm
Location: USA
Blog: View Blog (0)

Re: WikiLeaks

Postby Elvis » Wed Mar 08, 2017 12:22 am

Cordelia » Tue Mar 07, 2017 3:55 pm wrote:
Elvis » Tue Mar 07, 2017 6:41 pm wrote:
seemslikeadream wrote:The CIA is using your TVs, smartphones and cars for spying

Good thing I don't have a TV, smartphone or car!

(I have a TV set but it's not connected to anything but a DVD player)

Ditto on all the have-nots (but also take it for granted that spying is done anyway, via laptops, landlines, etc........)

No land line, my only phone is an ancient little slab cell phone, it doesn't even have a camera. I suppose it can be used as a listening device (no idea about that, really), and of course its location is tracked unless I take out the battery. I have no laptop, smartphone or other Internet-capable device besides this average desktop PC, which I assume is wide open to Homestyle Security.
"Frankly, I don't think it's a good idea but the sums proposed are enormous."
User avatar
Posts: 6658
Joined: Fri Apr 11, 2008 7:24 pm
Blog: View Blog (0)

Re: WikiLeaks

Postby Grizzly » Wed Mar 08, 2017 12:46 am

Image ... 0317565952


If Barthes can forgive me, “What the public wants is the image of passion Justice, not passion Justice itself.”
User avatar
Posts: 3073
Joined: Wed Oct 26, 2011 4:15 pm
Blog: View Blog (0)

Re: WikiLeaks

Postby Elvis » Wed Mar 08, 2017 1:15 am

Thanks Grizzly. Note that last item:


And why wouldn't they?
"Frankly, I don't think it's a good idea but the sums proposed are enormous."
User avatar
Posts: 6658
Joined: Fri Apr 11, 2008 7:24 pm
Blog: View Blog (0)

Re: WikiLeaks

Postby Nordic » Wed Mar 08, 2017 1:25 am

Today was a pretty good day, with this coming out.

"He who wounds the ecosphere literally wounds God" -- Philip K. Dick
Posts: 14182
Joined: Fri Nov 10, 2006 3:36 am
Location: California USA
Blog: View Blog (6)

Re: WikiLeaks

Postby Joao » Wed Mar 08, 2017 3:41 am

That list has a bit of a Chinese Whispers / trending tweets feeling about it. Seems a little slapdash even if mostly accurate.

"Obama gave unlimited power to the CIA to gain favors and not end up like JFK." Any source? I suspect this is editorializing.

Both "CIA coders in major US tech companies" and "Skype voice conversations are converted into text" are unsubstantiated tweets from Kim Dotcom. Maybe they're true but I'd like to see the documentation.
Posts: 522
Joined: Wed Jun 26, 2013 11:37 pm
Blog: View Blog (0)

Re: WikiLeaks

Postby Grizzly » Wed Mar 08, 2017 3:08 pm

If Barthes can forgive me, “What the public wants is the image of passion Justice, not passion Justice itself.”
User avatar
Posts: 3073
Joined: Wed Oct 26, 2011 4:15 pm
Blog: View Blog (0)

Re: WikiLeaks

Postby Luther Blissett » Wed Mar 08, 2017 4:13 pm

Yeah, oops!

So It Turns Out The CIA Collects Programs For Forging Russian Hacking Fingerprints…

If you needed any more reason to doubt the completely unproven claims of the US intelligence community that the Russian government manipulated the 2016 US elections by hacking American political parties, now you have it. WikiLeaks has released a trove of data from an anonymous insider whose effort to reveal the US government’s Orwellian domestic espionage upon its citizens may end up paralleling Edward Snowden’s 2013 NSA leaks in terms of impact and importance, or perhaps even greater. WikiLeaks reports that, like Snowden, its source wanted to give the public a chance to discuss and debate whether it was appropriate for America’s intelligence community to be doing what it’s been secretly doing, and “whether the CIA's hacking capabilities exceed its mandated powers and the problem of public oversight of the agency.”

Before we proceed, let me remind my readers that WikiLeaks has a decade-long 100% perfect record of accurately vetting its sources and documents for authenticity. Though today’s headlines are full of equivocations making sure to inform readers that WikiLeaks “claims” these documents come from inside the intelligence community, there is absolutely no reason to doubt this. As we discussed in the last article, WikiLeaks is extremely strict with its publishing standards because its reputation of authenticity is its chief weapon against government opacity, so it never publishes anything unless it is certain of its veracity.

WikiLeaks’ much-hyped Vault 7 documents dropped Tuesday morning, and they did not disappoint. People all over the world are still analyzing the contents of the drop, but the press release that accompanied it gives readers a breakdown of some of what it contains. It reports that the CIA’s Center for Cyber Intelligence has “lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized ‘zero day’ exploits, malware remote control systems and associated documentation,” that the CIA has violated an agreement that it made with the US tech industry to disclose any serious vulnerabilities it discovers in the systems of US-based manufacturers, and that the CIA has an extensive program for hacking standard household “smart” technology and turning them into surveillance equipment or even untraceable weapons that can be used for vehicular assassinations.

This and so much more will doubtless be the subject of rigorous debate for a long time, but right now, in light of a pressing threat I’ve been writing about a lot lately, I’d like to point out one specific part of WikiLeaks’ press release that definitely needs a whole, whole lot of attention drawn to it, namely that the CIA “collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation.” With this collection, WikiLeaks reports, the CIA's Remote Devices Branch's UMBRAGE group is able to “misdirect attribution by leaving behind the ‘fingerprints' of the groups that the attack techniques were stolen from.”

If you’ve been paying attention to the media coverage on the irritatingly opaque government accusations of Russian election meddling, you’ll know right away why this is a big deal. Here’s a CBS News report from July of last year titled “Russian ‘fingerprints' left behind on DNC hack,” which reports that “The U.S. believes that people working for the Russian government are behind the hack of internal emails at the Democratic National Committee,” because “A U.S. intelligence official told CBS News that the signature of the breach is Russian and the U.S. government has identified methods and techniques used by Russia in past hacks that mirror those used in the DNC incursion.” Many mainstream media outlets covered this story, and in the following months new reports citing Russian hacking “fingerprints” have surfaced. Here’s one from December by the New York Times. Here’s another by Fox 6 News from January. Here’s an interesting one from February by The Hill titled “Ukraine: Russian fingerprints all over power grid hack,” detailing another Russian hacking allegation made by the US-backed Ukrainian government.

Remember, it was anonymous sources in the CIA that originally leaked the allegation that Russia worked to hack information with the intention to manipulate the election for Trump’s benefit to the CIA-funded Washington Post.

Back in December, John Bolton drew controversy with a surprisingly prescient argument in an appearance on Fox’s America’s Election HQ that the alleged Russian hacks could have been a CIA-fabricated “false flag,” citing some gaping plot holes in the “hacking fingerprint” narrative.

As I never grow tired of reminding everyone, the CIA has an extensive history of lying to the American people. WikiLeaks, with its unbroken record of perfect accuracy, has the exact opposite. There are many arguments to be made for why the CIA appears to be pushing for a conflict with Russia, possibly to conduct another of its notorious regime changes and install a more pliable Yeltsin-like president who won’t challenge the hegemony of the US dollar or make bold interventions in strategic areas like Syria, but it’s anyone’s guess. Right now all we know is that they’re liars, and we have even more reason than ever to distrust them.

"The CIA has begun providing raw intelligence documents to members of Congress who are investigating Russia’s meddling in the presidential election," Politico reports. Watch closely.

I think this is all to help maintain the hegemony of the deep state under Trump, which was really only ever barely under threat.
The Rich and the Corporate remain in their hundred-year fever visions of Bolsheviks taking their stuff - JackRiddler
User avatar
Luther Blissett
Posts: 4951
Joined: Fri Jan 02, 2009 1:31 pm
Location: Philadelphia
Blog: View Blog (0)

Re: WikiLeaks

Postby 82_28 » Wed Mar 08, 2017 4:34 pm

Speaking of fingerprints, I noticed in the footage that the guy (Christopher Steele) who went into hiding or something due to the Wiki Leak used his thumb to get into his joint. Don't know if that matters a bit but I noticed it. He just put his hand up and the door opened or unlocked or something. No key or FOB.
There is no me. There is no you. There is all. There is no you. There is no me. And that is all. A profound acceptance of an enormous pageantry. A haunting certainty that the unifying principle of this universe is love. -- Propagandhi
User avatar
Posts: 11194
Joined: Fri Nov 30, 2007 4:34 am
Location: North of Queen Anne
Blog: View Blog (0)


Return to General Discussion

Who is online

Users browsing this forum: Google [Bot] and 5 guests