Image Source: The Intercept.
This morning at 9 a.m. Eastern, WikiLeaks released the biggest intelligence information dump in history (here). The dump of 8,761 documents, dating from 2013 to 2016, and entitled 'Vault 7' reveals how the US Central Intelligence Agency spies on citizens through almost all consumer technology. The CIA hacks, and can control, modern cars and trucks, iPhones, iPads, and Android phones.
Weeping angels, from Doctor Who, the source of the name of one of the CIA/MI5 invasive computer programs which spies on citizens. Image Source: Doctor Who TV.
A malware program called 'Weeping Angel,' named for a race of characters in the Doctor Who science fiction universe, was co-created with British intelligence. Weeping Angel can commandeer smart televisions, transforming them into covert microphone bugs when they appear to be turned off.
Another program, HIVE, hacks mainstream operating systems (HIVE manuals are here and here). The CIA can also bypass anti-virus software, computer recycle bins, and proxies and encryption (by gathering information prior to encryption). The WikiLeaks press release also states that the US consultate in Frankfurt, Germany is a computer hacking base, a vulnerable cyberwarfare launch pad. Even worse, CIA has mimicked foreign intelligence agencies, and hoarded and lost control of much of its malware.
#Vault7 reveals classified manuals for CIA malware to infest Windows, Linux + more— WikiLeaks (@wikileaks) March 7, 2017
1) https://t.co/7P5oWn8KGl
2) https://t.co/T3nl8ARF1Z pic.twitter.com/Dod8eTp0j4
WikiLeaks has been plugging this dump for over a month with mysterious graphic tweets about who, what, when, where, why, and how is Vault 7. This created viral buzz among the alt-right and alt-journalists on Youtube. It also created concern among Internet conspiracy theorists, because WikiLeaks has never before plugged a release with sensational, cryptic tweets in this fashion. Alt-researchers concluded, based on underground rumours and conjecture, that Vault 7 is a sealed, bomb-proof room with an isolated server where the FBI keeps its most sensitive evidence in criminal investigations, high and low. (Today, WikiLeaks claimed the documents came from an "isolated, high-security network situated inside the CIA's Center for Cyber Intelligence in Langley, Virginia.") There was also talk of the 7th Floor Group, a shadow group in the US State Department. According to rumours, then, the source of this leak about the CIA is - the FBI? Some on the fringe say that the New York Police Department (NYPD) were one of the FBI's original sources, and they leaked some information to the Internet prior to handing it over to the FBI, to protect themselves from the so-called 'deep state.'
The famous John F. Kennedy portrait by Aaron Shikler (1969-1970). Image Source: Periodic Table of Presidents.
Why would this happen? Underground rumours state that America's intelligence community is divided into internecine factions, with the CIA associated with the Bush family and the old establishment; but in recent times, the organization has also been pro-Clinton Democrat. For decades, conspiracy theorists have depicted the CIA as the true 'deep state,' the state-inside-the-state, which channels public money for black ops, drugs, human trafficking, and arms deals. One origin of this reputation is likely John F. Kennedy's 'secret societies' speech from 1961, below. Among conspiracy theorists, the ill-fated President's famous comments are known as the 'speech that killed JFK.' Those who research Kennedy's assassination, who do not believe its official story, assert that Kennedy was assassinated because he tried to dismantle the CIA. This is all unconfirmed chatter from the Internet; but in this view, Julian Assange is the journalist who has today taken up the challenge from Kennedy's secret societies speech.
John F. Kennedy, remarks to the American Newspaper Publishers Association (27 April 1961). Video Source: Youtube.
By contrast, the National Security Agency (NSA) - supposedly revealed in this leak to have weaker computing capability than the CIA - is rumoured to house a younger generation, mixed with ex-military personnel. These are rebellious computer hackers, with Batman and Star Trek dolls on their desks. For example, Edward Snowden is an ex-NSA contractor, and a member of Generation Y. Incidentally, Snowden, working through this dump this morning, claimed it "looks authentic."
How a cashed up, expanding #CIA built its "own #NSA" https://t.co/K7wFTdlC82 #Vault7 pic.twitter.com/1pE0BEj0Gc— WikiLeaks (@wikileaks) March 7, 2017
The Federal Bureau of Investigation (FBI) are imagined as top tier Ivy League graduates with old school, middle American values, a national police force whose agents confront the darkest aspects of American domestic culture. Think of the FBI's weird 1990s' vogue: X-Files's Mulder and Scully, or David Lynch's Agent Dale Cooper. A similar understanding of the FBI appeared in the striving character, Clarice Starling, in the Hannibal Lechter films, based on novels by Thomas Harris.
At the same time, the truly paranoid on sites like Reddit and 4chan/pol believe that WikiLeaks is, or was, compromised by the CIA, so that in effect, WikiLeaks is a mouthpiece of the CIA.
As for the establishment view, today's leak bolsters Donald Trump's recent accusations about being wire-tapped by Obama. Trump's claims have been widely dismissed in the mainstream press. Trump's critics would say that this is a grand orchestration, a national-fascist-populist assault on legitimate government, akin to events which led up to Hitler's burning of the Reichstag on 27 February 1933. In this light, consider that Edward Snowden is sitting in Moscow, and Assange and Trump have also been accused of succumbing to Russian influence.
RELEASE: Vault 7 Part 1 "Year Zero": Inside the CIA's global hacking force https://t.co/h5wzfrReyy pic.twitter.com/N2lxyHH9jp— WikiLeaks (@wikileaks) March 7, 2017
RELEASE: CIA Vault 7 Year Zero decryption passphrase:— WikiLeaks (@wikileaks) March 7, 2017
SplinterItIntoAThousandPiecesAndScatterItIntoTheWinds
The first Vault 7 torrent (you can download it here) was released last night and the key to open the trove was released this morning: SplinterItIntoAThousandPiecesAndScatterItIntoTheWinds. This was part 1, or 'Year Zero,' of this release. There are more Vault 7 documents to follow. Above all, this incredible information dump reveals an ongoing, naked power contest over who can and will claim legitimacy in future governments.
ADDENDUM (9 March 2017): On 9 March, Julian Assange held a press conference and Q & A on Vault 7, Year Zero and the CIA, which was broadcast to the Internet. Assange claimed this CIA Vault 7 leak (of which only the smallest first portion has been released) proved that cyberweapons are uncontrollable and echoed Microsoft's call for a digital Geneva Convention. Assange suggested that WikiLeaks can function as a new digital Switzerland. UK politician Nigel Farage visited Assange at the Ecuadorian embassy in London on the same day.
Video Source: Youtube.
ADDENDUM (11 March 2017):
Ex-CIA director: Leak 'has to be an inside job' #Vault7 https://t.co/or6ZXIgQ5C— WikiLeaks (@wikileaks) March 11, 2017
ADDENDUM (23 March 2017):
— WikiLeaks (@wikileaks) March 23, 2017
ADDENDUM (31 March 2017; see my related post here):
RELEASE: CIA Vault 7 Part 3 "Marble" -- thousands of CIA viruses and hacking attacks could now be attributed https://t.co/MfNtlwEoZS #Vault7 pic.twitter.com/2SVNR3v7Ll— WikiLeaks (@wikileaks) March 31, 2017
ADDENDUM (7 April 2017; concerning CIA attacks on Microsoft Windows):
RELEASE: CIA malware for Windows "Grasshopper" -- which includes its own language https://t.co/cuNOq3lH4N pic.twitter.com/VEgd8YhyGY— WikiLeaks (@wikileaks) April 7, 2017
ADDENDUM (8 April 2017; Shadow Brokers are back):
Today's #ShadowBrokers NSA dump shows hacking attacks on EU states, LatAm, Russia, China, Japan & South East Asia https://t.co/Gtz4JFst8O— WikiLeaks (@wikileaks) April 8, 2017
#ShadowBrokers are conspicuously & intentionally trying to suggest that they are Russian and aligned with Russian foreign policy. Why?— Julian Assange (@JulianAssange) April 8, 2017
ADDENDUM (10 April 2017; Shadow Brokers are back):
CIA medical experimentation & coersion MKULTRA documents— Julian Assange (@JulianAssange) April 10, 2017
1. https://t.co/5nSFcj5GMq
2. https://t.co/ehv89jXoLfhttps://t.co/gJpABf6n2C
ADDENDUM (14 April 2017; HIVE release here and Shadow Brokers' dump implications (see my related post here)):
'Cyberwar' programs are a serious proliferation risk #ShadowBrokershttps://t.co/K7wFTdlC82 pic.twitter.com/PJOq7J3rOj— WikiLeaks (@wikileaks) April 15, 2017
ADDENDUM (16 April 2017):
Trump CIA chief calls WikiLeaks an “enemy,” says Assange has “no First Amendment freedoms” -- good piece by London.https://t.co/RSbLU8fwXw pic.twitter.com/kVq7f7mlJB— Julian Assange (@JulianAssange) April 16, 2017
ADDENDUM (21 April 2017):
Encrypted backup pre-release: CIA Vault 7 part B Media Ops torrent [use a 'torrent' download tool] https://t.co/LCwyjQ3q5h— WikiLeaks (@wikileaks) April 21, 2017
RELEASE: MI5/CIA's smart TV malware bug manual classified UK EYES ONLY SECRET STRAP 2 #Vault7 https://t.co/OO59OGbrgx pic.twitter.com/9wLZ6cO0ae— WikiLeaks (@wikileaks) April 21, 2017
PRE-RELEASE: CIA Vault 7 part B Media Ops torrent [use a 'torrent' download tool] https://t.co/LCwyjQ3q5h— WikiLeaks (@wikileaks) April 21, 2017
PRE-RELEASE: CIA Vault 7 Part B Media Ops [4GB zip] https://t.co/k9oqqXlrrB— WikiLeaks (@wikileaks) April 21, 2017
ADDENDUM (28 April 2017):
RELEASE: "Scribble" the CIA's secret system to track leakers. Full source code and documentation included. #vault7 https://t.co/Mgph7jQkFC pic.twitter.com/5WZTYfG7pZ— WikiLeaks (@wikileaks) April 28, 2017
ADDENDUM (5 May 2017):
RELEASE: CIA '#Archimedes' system for exfiltration and browser hijacking. Includes manuals and binary signatures. https://t.co/XWr33GMGDN pic.twitter.com/TEyhABJvbO— WikiLeaks (@wikileaks) May 5, 2017
ADDENDUM (12 May 2017):
RELEASE: CIA remote control & subversion malware systems 'After Midnight' and 'Assassin' https://t.co/S64RmEsHYl #Vault7 pic.twitter.com/5fMTeqW007— WikiLeaks (@wikileaks) May 12, 2017
ADDENDUM (19 May 2017):
RELEASE: CIA malware system Athena https://t.co/pqCWCRrqHy #Vault7— WikiLeaks (@wikileaks) May 19, 2017
ADDENDUM (23 May 2017):
#Vault7 ‘#Athena’: WikiLeaks publishes new CIA leaks as case against #Assange dropped https://t.co/ka4H156Kwd— MediaMonarchy.com (@mediamonarchy) May 23, 2017
“Wikileaks Hints At What Media Ops #Vault7 May Contain MISOC Psychological Operations?” by @An0nKn0wledge https://t.co/ATl0a5BFhy— Kathy Wilson (@kitten_nc) May 23, 2017
The coolest chart of @CIA by @wikileaks. Several gaps to be filled though. #WIKILEAKS #Vault7 pic.twitter.com/YFAe37vPLY— Raghavendra S (@raghuarr) May 23, 2017
.@CIA hacking tool #Athena affects Windows XP - 10 w/#malware latest #Wikileaks dump reveals @ZDnet @LiamT https://t.co/zZHHDKHlVl #Vault7 pic.twitter.com/q9m9jxLzco— Menlo Security (@menlosecurity) May 23, 2017
Wikileaks #Vault7: CIA's UMBRAGE & 'False Flag' Cyber Attacks | MPN+ https://t.co/FF2SrgLKph via @YouTube— Erik Husoe (@EFHusoe) May 23, 2017
Apple reveals it received a secret national security letter #Apple #DeepState #NSA #Vault7 https://t.co/8gRqRPnBKx pic.twitter.com/X0hT4SxcqL— The Deep State (@The_DeepState) May 23, 2017
ADDENDUM (1 June 2017):
RELEASE: CIA 'Pandemic' Windows infection malware documentation #Vault7 https://t.co/YfxAKT1pog pic.twitter.com/HhmmvUBupi— WikiLeaks (@wikileaks) June 1, 2017
— WikiLeaks (@wikileaks) June 2, 2017
ADDENDUM (15 June 2017):
RELEASE: CIA 'CherryBlossom' & 'CherryBomb' have been infecting #DLink, #Belkin & #Linksys WiFi routers for years https://t.co/uCQLaaRwrO pic.twitter.com/gEfD84RKlX— WikiLeaks (@wikileaks) June 15, 2017
ADDENDUM (22 June 2017):
Linksys issues security advisory following discovery of CIA exploitation https://t.co/hCwmJf12Zi— WikiLeaks (@wikileaks) June 22, 2017
More: https://t.co/uCQLaazV3e pic.twitter.com/gfjNKqfj4T
RELEASE: CIA 'Brutal Kangaroo' and 'Emotional Simian' USB air gap jumping viruses https://t.co/dHDfcHQWIv pic.twitter.com/xU6e3ucPB6— WikiLeaks (@wikileaks) June 22, 2017
ADDENDUM (13 July 2017):
RELEASE: CIA Android phone SMS proxy 'HighRise' which masquerades as 'TideCheck' to form a covert messaging network https://t.co/wyNM6dOgnp pic.twitter.com/fMIrKbFhpG— WikiLeaks (@wikileaks) July 13, 2017
ADDENDUM (19 July 2017):
RELEASE: Classified CIA-Raytheon documents on Regin covert malware #Vault7 https://t.co/jutqkdf8JF pic.twitter.com/tuH4D8ePAG— WikiLeaks (@wikileaks) July 19, 2017
RELEASE: Classified CIA-Raytheon docs on suspected Chinese state malware #EmmissaryPanda #Vault7 https://t.co/BLUNsalisM pic.twitter.com/CkFX8eEPtb— WikiLeaks (@wikileaks) July 19, 2017
RELEASE: CIA-Rayethon analysis of #FireEye report on Twitter powered suspected Russian state malware #HammerToss https://t.co/RNJnNGo4c0 pic.twitter.com/wPN2XFl0h8— WikiLeaks (@wikileaks) July 19, 2017
ADDENDUM (27 July 2017):
RELEASE: CIA project 'Imperial'. Trojans targetting Macs, Debian, RHEL, Solaris, FreeBSD, Centos #Vault7— WikiLeaks (@wikileaks) July 27, 2017
https://t.co/imhSKG2vHG
RELEASE: CIA 'Achilles' tool to infect Mac OS X disk images (".dmg") #vault7 https://t.co/QbA8rdlIwS pic.twitter.com/VxX3WzwRVa— WikiLeaks (@wikileaks) July 27, 2017
RELEASE: CIA 'rootkit' to hide CIA activities on the Apple Macs it infiltrates #Seapea #Vault7 https://t.co/JtLYguEEWL pic.twitter.com/3w407N8eVv— WikiLeaks (@wikileaks) July 27, 2017
RELEASE: CIA project 'Imperial'. Trojans targeting Macs, Debian, Red Hat, Solaris, FreeBSD, Centos #Vault7 #Imperial https://t.co/Bsoxd7LdiC pic.twitter.com/iACdXnaOle— WikiLeaks (@wikileaks) July 27, 2017
ADDENDUM (31 July 2017):
RELEASE: CIA 'Aeris' implant targeting Debian, Red Hat, Solaris, FreeBSD and Centos users #imperial #Vault7 https://t.co/eM5PAJqwMx pic.twitter.com/2iekyiLozI— WikiLeaks (@wikileaks) July 27, 2017
ADDENDUM (3 August 2017):
'Dumbo' — A Tool CIA Agents Use to Disable Surveillance Cameras & Mics During Hollywood-Style Covert Operations https://t.co/zr6WegokLC pic.twitter.com/w7XikmHKwt— The Hacker News (@TheHackersNews) August 3, 2017
RELEASE: CIA project 'Dumbo' to switch off security webcams and corrupt recordings to hide physical intrusions https://t.co/XucsNTcJO6 pic.twitter.com/5xFl28eEKZ— WikiLeaks (@wikileaks) August 3, 2017
ADDENDUM (10 August 2017):
RELEASE: CIA system for intercepting video chat and security camera streams. Uses CIA "Fire and Collect" framework. https://t.co/EDqsoZKgTo pic.twitter.com/t7nR8v8qMJ— WikiLeaks (@wikileaks) August 10, 2017
ADDENDUM (22 August 2017):
After #Vault7 series on CIA hackers Senate draws up law against @WikiLeaks https://t.co/T7LalgOWag— WikiLeaks (@wikileaks) August 22, 2017
Background: https://t.co/kih8vqAqUz pic.twitter.com/skaqpmUTWk
ADDENDUM (24 August 2017):
RELEASE: CIA 'Express Lane' system for stealing the biometric databases of its 'partner' agencies around the world. https://t.co/8FefOS2Ljl pic.twitter.com/LPwlAd0Tgr— WikiLeaks (@wikileaks) August 24, 2017
Is your government using the "Cross Match" biometric system? For years CIA has used it to suck out all the records https://t.co/8FefOS2Ljl pic.twitter.com/9tgon09TTu— WikiLeaks (@wikileaks) August 24, 2017
ADDENDUM (31 August 2017):
RELEASE: CIA 'Angelfire' covert Windows malware system https://t.co/Kctemz9XfT #vault7 pic.twitter.com/aajwOLDQ5H— WikiLeaks (@wikileaks) August 31, 2017
ADDENDUM (7 September 2017):
RELEASE: CIA suspected assassination module for GPS guided missile system 'Protego' #vault7 https://t.co/0UDmiNFRhP pic.twitter.com/keDLl8oOqZ— WikiLeaks (@wikileaks) September 7, 2017
ADDENDUM (19 September 2017):
RELEASE: Spy Files #Russia: PETER SERVICE https://t.co/MI4GBGrIGU #SORM #FSB sotrm.j pic.twitter.com/Xe35jY4TJM— WikiLeaks (@wikileaks) September 19, 2017
RELEASE: Spy Files #Russia https://t.co/CJMQVrNXef #SORM #FSB #SpyFilesRU pic.twitter.com/4nYOcpvgGv— WikiLeaks (@wikileaks) September 19, 2017
RELEASE: Russian mass surveillance system PETER-SERVICE: "the most lucrative business of manipulating minds" https://t.co/MI4GBGrIGU pic.twitter.com/8AA4eZ7hRH— WikiLeaks (@wikileaks) September 19, 2017
Plot twist: @Wikileaks publishes details on Russia's increasingly oppressive internet surveillance industry. https://t.co/bPZKh5npIK pic.twitter.com/EhxdW2ZRdG— Edward Snowden (@Snowden) September 19, 2017
WikiLeaks s’attaque à l’industrie de la surveillance russe https://t.co/7JjEBXMW5t— Mediapart (@mediapart) September 19, 2017
"Spy Files Russia": WikiLeaks veröffentlicht Dokumente aus Russland... https://t.co/rFHnxgcJav— SPIEGEL Netzwelt (@SPIEGEL_Netz) September 19, 2017
— WikiLeaks (@wikileaks) September 19, 2017
— WikiLeaks (@wikileaks) September 19, 2017
ADDENDUM (9 November 2017):
RELEASE: Vault 8 part 1: CIA master infrastructure source code + logs for malware control system 'Hive' https://t.co/EvE8GdyAmM #vault8 #cia #hive pic.twitter.com/W95Xah5Thr— WikiLeaks (@wikileaks) November 9, 2017
ADDENDUM (1 March 2018):
With the CIA now 9 months into its efforts to "take down" @WikiLeaks after our #Vault7 publications on CIA hacking we look back at an earlier @WikiLeaks attack plan by Palantir & HBGray Federal (for the Bank of America).https://t.co/8ST4DzFN8p
— WikiLeaks (@wikileaks) December 27, 2017
PDF: https://t.co/ijRgQWiuTf pic.twitter.com/B5IiU8iSwK
No comments:
Post a Comment