WELCOME TO CRISISFORUMS.ORG!
(1) Please swing by our "HELP CENTER" to view our forum rules prior to commenting.
(2) Acknowledge that by commenting or posting, you take full responsibility for the content and message of the information you put forth, which do not necessarily reflect the opinions of this website.
(3) If you would like to post your own discussion threads, just contact one of the staff so we can verify you as a human.

CIA can & does hack almost EVERY device, even take over self-driving cars can be programmed to kill

WikiLeaks published 8,761 documents and files claiming to be from the CIA's Center for Cyber Intelligence on TuesdayLeak details information on how CIA-developed malware can target iPhones, Android phones and smart TVsWikiLeaks alleges some remote hacking programs can turn electronic devices into recording and transmitting stations to spy on targetsDocuments also claims the CIA can bypass encryption of Whatsapp, Signal, Telegram, Wiebo, Confide and Cloakman by hacking smartphonesCIA investigated hacking control systems in cars and trucks, which would allow agency to engage in nearly undetectable assassinations 

WikiLeaks has published thousands of documents claiming to reveal top CIA hacking secrets, including the agency's ability to infiltrate encrypted apps like Whatsapp, break into smart TVs and phones and program self-driving cars.

WikiLeaks said the files released on Tuesday - mysteriously dubbed ' Vault 7' - are the most comprehensive release of U.S. spying files ever made public. 

The leak purportedly includes 8,761 documents and files from an isolated, high-security network situated inside the CIA's Center for Cyber Intelligence in Langley, Virgina. 

It details intelligence information on CIA-developed software intended to hack iPhones, Android phones, smart TVs and Microsoft, Mac and Linux operating systems.

WikiLeaks alleges that some of the remote hacking programs can turn these electronic devices into recording and transmitting stations to spy on their targets.

It also claims the CIA can bypass the encryption of Whatsapp, Signal, Telegram, Wiebo, Confide and Cloakman by hacking the smart phones the applications run on. 

The CIA was also looking at hacking the vehicle control systems used in modern cars and trucks, WikiLeaks claims.



http://www.dailymail.co.uk/news/article-4289942/WikiLeaks-publish-1000s-says-CIA-documents.html

"Before you embark on a Journey of Revenge, Dig Two Graves" Confucius (504 bc)
“The darkest places in hell are reserved for those who maintain their neutrality in times of moral crisis.”
"If angry, count to ten. This will give you time to find a weapon." - Will Spencer

Comments

  • mrpops09_CMOD_mrpops09_CMOD_ Chief Moderator
    Unfortunately, we really have no one to blame for this but ourselves. We let this happen, and traded it for: convenience, tech, and gadgets  
    Ephesians 6:12 For we wrestle not against flesh and blood, but against principalities, against powers, against the rulers of the darkness of this world, against spiritual wickedness in high places.
  • Lynsey_ADMIN_Lynsey_ADMIN_ Administrator

    Apple, Samsung, Microsoft: WikiLeaks blows lid on scale of CIA’s hacking arsenal


    The major takeaway from the latest WikiLeaks dump centers around the terrifying, ‘all-seeing-eye’ surveillance project codenamed ‘Weeping Angel.’ The CIA appears to have taken espionage to a whole new level if WikiLeaks’ initial analysis is accurate.

    According to the preliminary release, the CIA has the capability to hack, record and even control everyday technology used by billions of people around the world.

    These include smartphones, tablets, smart TVs and even vehicles with remote control navigation systems.

    On these devices themselves, the CIA can allegedly hack into some of the world’s most heavily encrypted social media and communications platforms such as WhatsApp, Weibo, Confide, Signal and Telegram before any encryption can even be applied.

    For example, WhatsApp’s end-to-end encryption means that only the direct participants in a conversation can read messages; not even WhatsApp is capable of reading them.

    The CIA, however, was able to hack into individual private WhatsApp messages before encryption could even be applied.

    “Your messages are secured with a lock, and only the recipient and you have the special key needed to unlock and read your message,” the company writes on their website.


    https://www.rt.com/news/379757-your-whole-life-is-hacked/

    "Before you embark on a Journey of Revenge, Dig Two Graves" Confucius (504 bc)
    “The darkest places in hell are reserved for those who maintain their neutrality in times of moral crisis.”
    "If angry, count to ten. This will give you time to find a weapon." - Will Spencer
  • Rosie_MOD_Rosie_MOD_ Moderator
    edited March 7

    Wikileaks Unveils 'Vault 7': "The Largest Ever Publication Of Confidential CIA Documents"; Another Snowden Emerges

    Tyler Durdens picture
    Mar 7, 2017 4:05 PM
    12.6K
    SHARES

    WikiLeaks has published what it claims is the largest ever release of confidential documents on the CIA. It includes more than 8,000 documents as part of ‘Vault 7’, a series of leaks on the agency, which have allegedly emerged from the CIA's Center For Cyber Intelligence in Langley, and which can be seen on the org chart below, which Wikileaks also released:

    A total of 8,761 documents have been published as part of ‘Year Zero’, the first in a series of leaks the whistleblower organization has dubbed ‘Vault 7.’ WikiLeaks said that ‘Year Zero’ revealed details of the CIA’s “global covert hacking program,” including “weaponized exploits” used against company products including “Apple's iPhone, Google's Android and Microsoft's Windows and even Samsung TVs, which are turned into covert microphones.”

    WikiLeaks tweeted the leak, which it claims came from a network inside the CIA’s Center for Cyber Intelligence in Langley, Virginia.

    Among the more notable disclosures which, if confirmed, "would rock the technology world", the CIA had managed to bypass encryption on popular phone and messaging services such as Signal, WhatsApp and Telegram. According to the statement from WikiLeaks, government hackers can penetrate Android phones and collect “audio and message traffic before encryption is applied.”

    Another profound revelation is that the CIA can engage in "false flag" cyberattacks which portray Russia as the assailant. Discussing the CIA's Remote Devices Branch's UMBRAGE group, Wikileaks' source notes that it "collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation.

    "With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the "fingerprints" of the groups that the attack techniques were stolen from. UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques."

    As Kim Dotcom summarizes this finding, "CIA uses techniques to make cyber attacks look like they originated from enemy state. It turns DNC/Russia hack allegation by CIA into a JOKE"

    CIA uses techniques to make cyber attacks look like they originated from enemy state. It turns DNC/Russia hack allegation by CIA into a JOKE

    — Kim Dotcom (@KimDotcom) March 7, 2017

    But perhaps what is most notable is the purported emergence of another Snowden-type whistleblower: the source of the information told WikiLeaks in a statement that they wish to initiate a public debate about the “security, creation, use, proliferation and democratic control of cyberweapons.”  Policy questions that should be debated in public include “whether the CIA's hacking capabilities exceed its mandated powers and the problem of public oversight of the agency,” WikiLeaks claims the source said.

    The FAQ section of the release, shown below, provides further details on the extent of the leak, which was “obtained recently and covers through 2016”. The time period covered in the latest leak is between the years 2013 and 2016, according to the CIA timestamps on the documents themselves. Secondly, WikiLeaks has asserted that it has not mined the entire leak and has only verified it, asking that journalists and activists do the leg work.

    read more:

    http://www.zerohedge.com/news/2017-03-07/wikileaks-hold-press-conference-vault-7-release-8am-eastern



    "We are shaped by our thoughts; we become what we think. When the mind is pure, joy follows like a shadow that never leaves."

  • Matt_ADMIN_Matt_ADMIN_ Administrator
    Unfortunately, we really have no one to blame for this but ourselves. We let this happen, and traded it for: convenience, tech, and gadgets  
    The good news though is that we can undo this by changing the way we live
    -------------------
    "...Say, 'GOD is sufficient for me.' In Him the trusters shall trust." (Quran 39:38)
  • Farmer_Sean_DEP_Farmer_Sean_DEP_ Member, Moderator
    I read an interesting point - this means the CIA has now lost control of their cyberweapons, meaning anyone who gets ahold of this information could potentially do the same things.  It was suggested this is the thing we should all be worried about now.
  • Rosie_MOD_Rosie_MOD_ Moderator
    Doing my best to keep wifi out of my home which includes smart meters!  We are definitely trading our freedoms for convenience.

    "We are shaped by our thoughts; we become what we think. When the mind is pure, joy follows like a shadow that never leaves."

  • Lynsey_ADMIN_Lynsey_ADMIN_ Administrator

    Watched by the 'Weeping Angels': How Samsung TV viewers were 'recorded via their sets by British and US spies who hacked into devices with a virus named after eerie Doctor Who villains' 

    • Site published 8,761 secret US government files detailing hacking techniques
    • It was called 'Weeping Angel' -  after stone statue killer monsters from Dr Who
    • WikiLeaks claims documents show CIA can bug your TV and control your car
    • Among files was US-UK operation which showed how to turn TV into spy device
    • Instructions said TV could be switched off but actually used to monitor targets


    British spies helped the CIA find a way to convert 'smart' TVs into secret microphones using a codename inspired by Doctor Who killer monsters called 'Weeping Angels'.

    MI5 worked with their US counterparts to develop software that convinced people their sets were switched off when in fact they were on and recording every word they say.

    British spies has been central to developing the hack of TVs connected to the internet, according to WikiLeaks.

    The spooks also chose to name it after to Weeping Angels from Doctor Who - monsters who pretended to be stone statues before creeping up on unsuspecting victims.

    US intelligence has also devised a method of remotely controlling cars and crashing them, leaked data claims. 


    http://www.dailymail.co.uk/news/article-4290926/British-spies-linked-CIA-WikiLeaks-reveals.html


    "Before you embark on a Journey of Revenge, Dig Two Graves" Confucius (504 bc)
    “The darkest places in hell are reserved for those who maintain their neutrality in times of moral crisis.”
    "If angry, count to ten. This will give you time to find a weapon." - Will Spencer
  • Lynsey_ADMIN_Lynsey_ADMIN_ Administrator

    Who's the new mole? FBI prepares hunt for the source of CIA documents published by WikiLeaks after latest catastrophic breach for the US intelligence community 

    • Thousands of leaked CIA documents were released by WikiLeaks yesterday
    • They reveal hacking tools used by intelligence services to break into phones, computers and even TVs
    • It follows high-profile leaks by whistleblowers such as Edward Snowden and Chelsea Manning
    • Donald Trump has been a vocal critic of leaks within the intelligence services 
    • Hunt for the mole is set to be launched, with source set to face heavy punishment if caught 

    The FBI is launching a hunt to unmask the source of the CIA document leak which has rocked the US intelligence services.

    Thousands of documents were suddenly published by anti-secrecy group WikiLeaks yesterday, purportedly revealing hacking tools which the CIA uses to break into devices such as phones, computers and smart TVs.

    It the latest in an embarrassing series of revelations, and WikiLeaks has promised more to come.

    Investigators are now carrying out a massive operation to find who released the documents, with the source likely to face a long jail term if caught. The most recent whistleblower to be convicted under the Espionage Act, Chelsea Manning, was given a 35 year sentence, although this was commuted in the final days of Barack Obama's presidency.



    http://www.dailymail.co.uk/news/article-4292724/FBI-prepares-hunt-source-CIA-documents.html
    "Before you embark on a Journey of Revenge, Dig Two Graves" Confucius (504 bc)
    “The darkest places in hell are reserved for those who maintain their neutrality in times of moral crisis.”
    "If angry, count to ten. This will give you time to find a weapon." - Will Spencer
  • Lynsey_ADMIN_Lynsey_ADMIN_ Administrator

    CIA has stolen spying techniques from Russia allowing it to carry out 'false flag' attacks which fool targets into thinking they've been hacked by the Kremlin, WikiLeaks documents reveal 

    • CIA hackers have learned to leave 'fingerprints' which could implicate others, WikiLeaks reports
    • It claims sub-group UMBRAGE has collected data on Russian techniques
    • Russia was accused of interfering in last year's US presidential election
    • WikiLeaks likened 'fingerprinting' to finding similar wounds on multiple murder victims


    CIA hackers have learned how to adopt the 'fingerprints' of other intelligence services allowing them to carry out 'false flag' attacks, WikiLeaks has sensationally claimed.

    The organization - which yesterday released thousands of documents revealing how intelligence services could break into phones, computers and TVs - said the CIA was able to frame foreign spies and hackers for its own operations.

    The false flag allegation could be seized upon by Russia's government, which has denied reports by the FBI and CIA that it interfered with last year's presidential election to get Donald Trump elected.

    WikiLeaks claims UMBRAGE, a sub-group of the CIA's Remote Development Branch, has collected in-depth data on hacking techniques used by other powers - which could include Russia and China.

    In a statement on the WikiLeaks website, the Russian Federation is specifically named as one of the bodies which might have been infiltrated by American spies.

     These techniques can be used, the group claims, to give the impression other parties are guilty of carrying out hacks which are in fact the work of the CIA.

    WikiLeaks founder Julian Assange has previously said he is '1,000 per cent' certain that Russia did not carry out hacking operations during the elections. 



    http://www.dailymail.co.uk/news/article-4293220/CIA-stolen-spying-techniques-Russia.html
    "Before you embark on a Journey of Revenge, Dig Two Graves" Confucius (504 bc)
    “The darkest places in hell are reserved for those who maintain their neutrality in times of moral crisis.”
    "If angry, count to ten. This will give you time to find a weapon." - Will Spencer
  • Lynsey_ADMIN_Lynsey_ADMIN_ Administrator

    German government demands answers from the US over WikiLeaks' claims there is a CIA listening post in Frankfurt as it attempts to verify leaked documents

    • Berlin's chief federal prosecutor will examine documents released by WikiLeaks
    • Group says files show CIA used the US consulate in Frankfurt as a listening post
    • German foreign ministry said it was in close touch with Washington about files

    Germany has demanded answers from the US over claims by WikiLeaks that there is a CIA listening post in Frankfurt.

    Berlin's top prosecutor will examine documents released by the anti-secrecy group and launch an investigation if it sees concrete indications of wrongdoing, a spokesman said.

    WikiLeaks claim the files show that the CIA used the U.S. consulate in Frankfurt as a major remote hacking base.

    A spokesman for the German foreign ministry said today that Berlin was in close touch with Washington about the documents, which Wikileaks said showed that the CIA used the U.S. consulate in Frankfurt as a major remote hacking base.

    He said Germany needed to verify the authenticity of the documents. 

    http://www.dailymail.co.uk/news/article-4293952/Germany-demands-answers-WikiLeaks-claims.html
    "Before you embark on a Journey of Revenge, Dig Two Graves" Confucius (504 bc)
    “The darkest places in hell are reserved for those who maintain their neutrality in times of moral crisis.”
    "If angry, count to ten. This will give you time to find a weapon." - Will Spencer
Sign In or Register to comment.