WikiLeaks Vault 7 Reveals CIA Can Disguise Hacks, Malware As Russian Or Chinese


Source: ActivistPost.com
Matt Agorist
March 31, 2017

Moments ago, WikiLeaks released another set of data from the Vault 7 CIA documents which, believe it or not, paints an even more ominous picture of the world’s most unscrupulous spy agency. The latest leak consists of 676 source code files from the CIA’s anti-forensic “Marble” framework — which allows the CIA to covertly create malware, trojans, and hacking attacks — while attributing them to foreign entities.

With each release from these Vault 7 leaks, it becomes more apparent that everything we thought the CIA might get in this 1984-esque world — they already have.

According to WikiLeaks, Marble is able to hide or cloak their virus signature by “by hiding (“obfuscating”) text fragments used in CIA malware from visual inspection. This is the digital equivalent of a specialized CIA tool to place covers over the English language text on U.S. produced weapons systems before giving them to insurgents secretly backed by the CIA.”

Marble is “[D]esigned to allow for flexible and easy-to-use obfuscation” as “string obfuscation algorithms (especially those that are unique) are often used to link malware to a specific developer or development shop.”

Over the course of the last 4 months, the deep state has claimed — without evidence — that Russia has interfered in US elections. With this technology, the CIA could theoretically present the evidence it needs to “prove” Russian meddling.

According to WikiLeaks, this blame game is possible due to the fact that the source code shows that Marble has test examples not just in English but also in Chinese, Russian, Korean, Arabic and Farsi. This would permit a forensic attribution double game, for example by pretending that the spoken language of the malware creator was not American English, but Chinese, but then showing attempts to conceal the use of Chinese, drawing forensic investigators even more strongly to the wrong conclusion, — but there are other possibilities, such as hiding fake error messages.

According to Marble, the CIA could create a virus that would potentially devastate entire systems — and then blame it on anyone they want.

As Leak of Nations reports, in the second batch of ‘Vault 7’ documents, WikiLeaks released a user guide for Sonic Screwdriver – an implant on the Apple Thunderbolt-to-USB converter that allows code to be booted onto an attached device, even if the device is password-protected.

What this means is that the CIA can infect the firmware of Macs at the core of the system with a trojan horse. Having a proverbial ocean of computers to choose from, the CIA could then pick one of those infected computers, launch an attack, use Marble to cover it up and blame it on whomever they wish.

It is no wonder Ubuntu founder Mark Shuttleworth called this “a trojan horse of monumental proportions.”

For now, however, the only one to be caught hacking US elections is the Department of Homeland Security. As the Free Thought Project previously reported, the Department of Homeland Security, under the Obama administration, attempted to hack the Indiana State electoral system nearly 15,000 times.

Prior to the hacks in Indiana, it was the State of Georgia to expose DHS meddling in their elections.

While these…

Read More At: ActivistPost.com

Advertisements

WikiLeaks Reveals “Marble”: Proof CIA Disguises Their Hacks As Russian, Chinese, Arabic…

Source: ZeroHedge.com
March 31, 2017

WikiLeaks’ latest Vault 7 release contains a batch of documents, named ‘Marble’, which detail CIA hacking tactics and how they can misdirect forensic investigators from attributing viruses, trojans and hacking attacks to their agency by inserted code fragments in foreign languages.  The tool was in use as recently as 2016.  Per the WikiLeaks release:

“The source code shows that Marble has test examples not just in English but also in Chinese, Russian, Korean, Arabic and Farsi. This would permit a forensic attribution double game, for example by pretending that the spoken language of the malware creator was not American English, but Chinese, but then showing attempts to conceal the use of Chinese, drawing forensic investigators even more strongly to the wrong conclusion, — but there are other possibilities, such as hiding fake error messages.”

 

The latest release is said to potentially allow for ‘thousands‘ of cyber attacks to be attributed to the CIA which were originally blamed on foreign governments.

WikiLeaks said Marble hides fragments of texts that would allow for the author of the malware to be identified. WikiLeaks stated the technique is the digital equivalent of a specialized CIA tool which disguises English language text on US produced weapons systems before they are provided to insurgents.

 

It’s “designed to allow for flexible and easy-to-use obfuscation” as “string obfuscation algorithms” often link malware to a specific developer, according to the whistleblowing site.

 

The source code released reveals Marble contains test examples in Chinese, Russian, Korean, Arabic and Farsi.

 

“This would permit a forensic attribution double game, for example by pretending that the spoken language of the malware creator was not American English, but Chinese, but then showing attempts to conceal the use of Chinese, drawing forensic investigators even more strongly to the wrong conclusion,” WikiLeaks explains, “But there are other possibilities, such as hiding fake error messages.”

 

The code also contains a ‘deobfuscator’ which allows the CIA text obfuscation to be reversed. “Combined with the revealed obfuscation techniques, a pattern or signature emerges which can assist forensic investigators attribute previous hacking attacks and viruses to the CIA.”

 

Previous Vault7 releases have referred to the CIA’s ability to mask its hacking fingerprints.

 

WikiLeaks claims the latest release will allow for thousands of viruses and hacking attacks to be attributed to the CIA.

And the rabbit hole just got even deeper.

* * *

Full release from WikiLeaks:

Today, March 31st 2017, WikiLeaks releases Vault 7 “Marble” — 676 source code files for the CIA’s secret anti-forensic Marble Framework. Marble is used to hamper forensic investigators and anti-virus companies from attributing viruses, trojans and hacking attacks to the CIA.

Marble does this by hiding (“obfuscating”) text fragments used in CIA malware from visual inspection. This is the digital equivallent of a specalized CIA tool to place covers over the english language text on U.S. produced weapons systems before giving them to insurgents secretly backed by the CIA.

Marble forms part of the CIA’s anti-forensics approach and the CIA’s Core Library of malware code. It is “[D]esigned to allow for flexible and easy-to-use obfuscation” as “string obfuscation algorithms (especially those that are unique) are often used to link malware to a specific developer or development shop.

The Marble source code also includes a deobfuscator to reverse CIA text obfuscation. Combined with the revealed obfuscation techniques, a pattern or signature emerges which can assist forensic investigators attribute previous hacking attacks and viruses to the CIA. Marble was in use at the CIA during 2016. It reached 1.0 in 2015.

The source code shows that Marble has test examples not just in English but also in Chinese, Russian, Korean, Arabic and Farsi. This would permit a forensic attribution double game, for example by pretending that the spoken language of the malware creator was not American English, but Chinese, but then showing attempts to conceal the use of Chinese, drawing forensic investigators even more strongly to the wrong conclusion, — but there are other possibilities, such as hiding fake error messages.

The Marble Framework is used for obfuscation only and does not contain any vulnerabilties or exploits by itself.

Read More At: ZeroHedge..com

What Is The Deep State? James Corbett on Financial Survival

Source: TheCorbettReport
James Corbett
March 20, 2017

SHOW NOTES AND MP3 AUDIO: https://www.corbettreport.com/?p=22193

James Corbett joins Alfred Adask for his bi-monthly appearance on Financial Survival. This time they discuss the #Vault7 documents, the surveillance state and the deep state. What is the deep state? Who are its members? How does it operate? Find out in this in-depth conversation.

CIA planned on hacking cars to murder people with “undetectable assassinations”

CIA Spying
Source: NaturalNews.com
Jayson Veley
March 10, 2017

The measure of any successful society is the level of trust that is maintained between those in positions of power and the people. When the government and its various agencies are disciplined and transparent, then the country thrives. On the contrary, when that power is abused and the laws are ignored, the people’s trust, and the country as a whole, collapses.

In America, the people are justifiably growing more and more weary of the government. Secret meetings and backroom deals have practically become commonplace, and corruption has reached unprecedented levels. Take the IRS scandal for example, where the Internal Revenue Service was caught explicitly targeting conservative organizations and denying them tax-exempt status. This was not only a blatant example of corruption and federal overreach, but also a devastating blow to the trust level between the people and the government.

Similarly, in 2013, Edward Snowden famously revealed the unconstitutional spying and surveillance that was taking place within the National Security Agency. At first, the NSA attempted to cover their tracks by telling the public that the data collection only involved phone numbers and email addresses, not the actual content of those emails or phone conversations. It was soon revealed, however, that this was not true.

And so it goes.

In their latest information dump, WikiLeaks has revealed that the CIA was allegedly planning to carry out assassinations by hacking into cars and trucks. (RELATED: Read what a CIA whistleblower said about climate engineering and vaccine damage). The hacking is made possible by utilizing the phone’s geolocation software to gain control over the vehicle’s control system. WikiLeaks claims that the Central Intelligence Agency has been participating in a global hacking initiative involving the United States and European nations.

WikiLeaks alleges that the CIA was “looking at infecting the vehicle control systems used by modern cars and trucks” so that they could carry out secretive and “nearly undetectable assassinations.” They claim that “infected phones can be instructed to send the CIA the user’s geolocation, audio and text communications as well as covertly activate the phone’s camera and microphone.” These phones include both iPhones and Android devices.

After the CIA obtains this information, Wikileaks claims, it could then “bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the ‘smart’ phones that they run on and collecting audio and message traffic before encryption is applied.”

In addition to the hacking of vehicles, WikiLeaks also claims that the Central Intelligence Agency is capable of gaining control over Microsoft Windows users and Smart TVs.

WikiLeaks has dubbed the information stolen from the CIA as “Vault 7,” the contents of which will gradually be revealed to the public over the next few weeks. As you may recall, a similar method was used when WikiLeaks released the information regarding the DNC and John Podesta, Hillary Clinton’s campaign manager. Shockingly, the thousands of pages of information that have already been released account for only 1 percent of the total information inside Vault 7.

In response to all of the information that has already been released and will continue to be released over the coming weeks, the CIA has reportedly stated that it has “no comment” on the matter. Further, the spy agency explained, “The CIA’s mission is to aggressively collect foreign intelligence overseas to protect America from terrorists, hostile nation states and other adversaries. It is CIA’s job to be innovative, cutting-edge, and the first line of defense in protecting this country from enemies abroad. America deserves nothing less.”

There is no telling what will further be revealed about the CIA, but based on what we have already learned from the hacking organization WikiLeaks, much of it will most certainly be damning.

Read More At: NatuarlNews.com

Sources

Mirror.co.uk

Breitbart.com

DailyCaller.com

Spy Ops: Yes, your smart TV really is spying on you: Leaked docs reveal CIA secretly turned Samsung TVs into microphones that spy on your conversations

Image: Yes, your smart TV really is spying on you: Leaked docs reveal CIA secretly turned Samsung TVs into microphones that spy on your conversations
Source: NaturalNews.com
J.D. Heyes
March 9, 2017

For years Deep State insiders and others familiar with the federal government’s spy agencies have been sounding the alarm about the development of technology that enables constant, real-time electronic surveillance of anyone, anywhere, anytime (President Donald Trump, something to consider as you delve into who ordered it against you and why.)

Now, thanks to another whistleblower following in the footsteps for former NSA contractor Edward Snowden, WikiLeaks has provided the proof that these insiders weren’t kooks or conspiracy theorists – they were spot-on. (RELATED: Is Your TV Spying On You? For Millions Of Viewers, The Answer Is YES!)

According to a treasure trove of newly released documents known collectively as “Vault 7” in the “Year Zero” series, not only does the CIA conduct improper electronic surveillance, it does through using technology that can tap into smart TVs, iPhones, Android devices, and other wireless handheld technology.

“The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell’s 1984, but ‘Weeping Angel,’ developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization,” said a press release from WikiLeaks.

“The attack against Samsung smart TVs was developed in cooperation with the United Kingdom’s MI5/BTSS. After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server,” it added.

So in other words, even if you’ve turned your TV and devices “off,” the CIA’s technology, via wireless connections, can still transform them into listening devices, which records conversations and data and sends them to a remote CIA server for later downloading and analysis.

The government’s spy agencies, then, can literally steal any and all data they want, thereby giving them the power to create false narratives, phony email traffic, fake communiques and anything else they want in an effort to blackmail or destroy anyone they choose.

A journalist getting too close to Deep State activities? No problem – the CIA has the ability to bug their homes remotely, through smart devices, or steal their data and other information that may incriminate them, forcing them into silence.

A politician who opposes expansion of the Deep State’s power? No problem – just a few months’ worth of bugging his or her devices, and the nation’s premier spy agency has all it needs to coerce said problematic politician into playing ball.

“The CIA’s Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones,” said the Wikileaks press release. “Infected phones can be instructed to send the CIA the user’s geolocation, audio and text communications, as well as covertly activate the phone’s camera and microphone.” (RELATED: Amazon Echo devices spy on you in your own home… police are now trying to acquire those recordings.)

And even though iPhone held a minority share (14.5 percent) of the global market, a specialized CIA unit within the agency’s Mobile Development Branch produced malware that infects, controls and then extracts data from iPhones and other Apple products that are running iOS, like iPads and, presumably, iMacs and Macbook Pro laptops.

A similar unit is said to have targeted Google’s Android devices, which runs the vast majority of the world’s smart phones (about 85 percent, roughly).

“’Year Zero’ shows that as of 2016 the CIA had 24 ‘weaponized’ Android ‘zero days’ which it has developed itself and obtained from GCHQ, NSA and cyber arms contractors,” said the press release.

“These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the ‘smart’ phones that they run on and collecting audio and message traffic before encryption is applied.”

Feel violated yet? You should.

Read More at: NaturalNews.com
__________________________________________________________

J.D. Heyes is a senior writer for NaturalNews.com and NewsTarget.com, as well as editor of The National Sentinel.

Sources:

WikiLeaks.org

NaturalNews.com

Newstarget.com