Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Vault 7: CIA Hacking Tools Revealed (Wikileaks unveils the CIA)
Wikileaks ^ | 3/7/2017 | Wikileaks

Posted on 03/07/2017 6:12:05 AM PST by Ultra Sonic 007

Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named "Vault 7" by WikiLeaks, it is the largest ever publication of confidential documents on the agency.

The first full part of the series, "Year Zero", comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA's Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election.

Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized "zero day" exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

"Year Zero" introduces the scope and direction of the CIA's global covert hacking program, its malware arsenal and dozens of "zero day" weaponized exploits against a wide range of U.S. and European company products, include Apple's iPhone, Google's Android and Microsoft's Windows and even Samsung TVs, which are turned into covert microphones.

Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA). The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force — its own substantial fleet of hackers. The agency's...

(Excerpt) Read more at wikileaks.org ...


TOPICS: Breaking News; Constitution/Conservatism; Crime/Corruption; Government
KEYWORDS: brennan; brennancia; cia; ciahacking; ciahackingarsenal; crowdstrike; deepstate; dmitrialperovitch; dncemailhack; dnchack; obama; obamagate; shadowgovernment; trump; vault7; vault7graphic; wiki; wikileaks
Navigation: use the links below to view more comments.
first 1-5051-100101-150151-200201-210 next last
Let the games begin.
1 posted on 03/07/2017 6:12:05 AM PST by Ultra Sonic 007
[ Post Reply | Private Reply | View Replies]

To: Ultra Sonic 007
"The organization (Wiki)had teased the release in advance with strange messages about the release being "Year Zero", and references to "Vault 7".
It had planned to release the files later on but that plan was thrown off when its press conference came under cyber attack, Mr Assange claimed."
2 posted on 03/07/2017 6:14:34 AM PST by Tilted Irish Kilt (Muslim & Spanish migrants are like Kudzu--> designed to overload the system= Cloward-Piven)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Ultra Sonic 007

Either Brennan is arrested , tried and convicted or the harassment of the Trump Administration will continue.


3 posted on 03/07/2017 6:14:56 AM PST by allendale
[ Post Reply | Private Reply | To 1 | View Replies]

To: Whenifhow; LucyT; WildHighlander57; Fedora; null and void

Ping


4 posted on 03/07/2017 6:16:10 AM PST by Tilted Irish Kilt (Muslim & Spanish migrants are like Kudzu--> designed to overload the system= Cloward-Piven)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Ultra Sonic 007

Who am I going to believe? WikiLeaks or the CIA/Obama?


5 posted on 03/07/2017 6:20:21 AM PST by grania
[ Post Reply | Private Reply | To 1 | View Replies]

To: Ultra Sonic 007

Related...

http://www.freerepublic.com/focus/f-chat/3532292/posts


6 posted on 03/07/2017 6:21:14 AM PST by ButThreeLeftsDo (MAGA!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Ultra Sonic 007

This is so bad, CIA creates hacking tools that probably are cutting edge. But their management and security sucks so bad they lose the tools to who knows who, and ultimately to Wikileaks.

Who’s faults is this? Wikileaks?? No It’s the CIA’s fault, 100%.


7 posted on 03/07/2017 6:22:13 AM PST by dynoman (Objectivity is the essence of intelligence. - Marilyn vos Savant)
[ Post Reply | Private Reply | To 1 | View Replies]

To: allendale
... or the harassment of the Trump Administration will continue.

I'm sure that's gonna happen......................

8 posted on 03/07/2017 6:22:15 AM PST by Red Badger (If "Majority Rule" was so important in South Africa, why isn't it that way here?.......)
[ Post Reply | Private Reply | To 3 | View Replies]

To: grania
By the end of 2016, the CIA's hacking division, which formally falls under the agency's Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other "weaponized" malware. Such is the scale of the CIA's undertaking that by 2016, its hackers had utilized more code than that used to run Facebook. The CIA had created, in effect, its "own NSA" with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.
9 posted on 03/07/2017 6:24:54 AM PST by Red Badger (If "Majority Rule" was so important in South Africa, why isn't it that way here?.......)
[ Post Reply | Private Reply | To 5 | View Replies]

To: allendale

“Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency...”

Since the imam-in-chief’s election and his appointment of fellow muslim Brennan in charge of the CIA.


10 posted on 03/07/2017 6:27:08 AM PST by Chauncey Gardiner
[ Post Reply | Private Reply | To 3 | View Replies]

To: dynoman

What if they were sold to level the playing field. That would be something obozo would like and encourage.


11 posted on 03/07/2017 6:27:08 AM PST by seeker41 (Trump Save America)
[ Post Reply | Private Reply | To 7 | View Replies]

To: Red Badger

This give Trump the opportunity to effectively shut that part of it down.


12 posted on 03/07/2017 6:27:46 AM PST by RummyChick
[ Post Reply | Private Reply | To 9 | View Replies]

To: Red Badger

Admiral Mike Rogers must have had a very interesting conversation with Trump when he flew up to NYC to visit

I wonder how he shielded it


13 posted on 03/07/2017 6:28:01 AM PST by silverleaf (Age takes a toll: Please have exact change)
[ Post Reply | Private Reply | To 9 | View Replies]

To: Ultra Sonic 007
Wikileaks Vault 7: CIA Hacking Tools Revealed.
14 posted on 03/07/2017 6:28:12 AM PST by Prolixus (Drain the swamp!!!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Prolixus
Better link: Wikileaks Vault 7: CIA Hacking Tools Revealed.
15 posted on 03/07/2017 6:29:50 AM PST by Prolixus (Drain the swamp!!!)
[ Post Reply | Private Reply | To 14 | View Replies]

To: Tilted Irish Kilt; 2ndDivisionVet; appalachian_dweller; aragorn; Arthur Wildfire! March; ASA Vet; ..

PING!!!

Article and comments

Thanks, Tilted Irish Kilt


16 posted on 03/07/2017 6:30:21 AM PST by Whenifhow
[ Post Reply | Private Reply | To 4 | View Replies]

To: Ultra Sonic 007

Can someone post the entire Wikileaks announcement? The link does not work or the link is being overtaxed.


17 posted on 03/07/2017 6:31:34 AM PST by Presbyterian Reporter
[ Post Reply | Private Reply | To 1 | View Replies]

To: Chauncey Gardiner

Since the imam-in-chief’s election and his appointment of fellow muslim Brennan in charge of the CIA.

Since the imam-in-chief’s election and his appointment of fellow muslim Brennan in charge of the CIA.


I believe the NSA is DOD while CIA is executive branch. Naturally, the kenyan would want his hand picked stooge Brennan to have the preeminence over DOD.


18 posted on 03/07/2017 6:31:35 AM PST by lodi90
[ Post Reply | Private Reply | To 10 | View Replies]

To: Ultra Sonic 007

Got a question.....

Do they have smart phones that the CIA and other government agencies can’t hack?

If not, better get busy and start making them.


19 posted on 03/07/2017 6:31:42 AM PST by hapnHal
[ Post Reply | Private Reply | To 1 | View Replies]

To: dynoman
Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized "zero day" exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner.

And what will those who now have this arsenal be able to do with it? They now have the hacking capacity of the CIA.

20 posted on 03/07/2017 6:33:44 AM PST by I want to know
[ Post Reply | Private Reply | To 7 | View Replies]

To: hapnHal

You gotta have the old flip phone to escape their prying. Not sure they haven’t figured out how to compromise those at this point.


21 posted on 03/07/2017 6:34:46 AM PST by seeker41 (Trump Save America)
[ Post Reply | Private Reply | To 19 | View Replies]

To: hapnHal

Yes, Iphones and Android. It’s in the documents.


22 posted on 03/07/2017 6:35:22 AM PST by Beach333
[ Post Reply | Private Reply | To 19 | View Replies]

To: Ultra Sonic 007

When does trump start arresting people?


23 posted on 03/07/2017 6:35:49 AM PST by Professional
[ Post Reply | Private Reply | To 1 | View Replies]

To: silverleaf

24 posted on 03/07/2017 6:35:51 AM PST by Red Badger (If "Majority Rule" was so important in South Africa, why isn't it that way here?.......)
[ Post Reply | Private Reply | To 13 | View Replies]

To: Admin Moderator; Sidebar Moderator

Can the main link in the top page be updated with the following URL? It apparently got shifted: https://wikileaks.org/ciav7p1/


25 posted on 03/07/2017 6:36:39 AM PST by Ultra Sonic 007 (Hope for the best. Prepare for the worst.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Ultra Sonic 007

Bookmark.


26 posted on 03/07/2017 6:37:49 AM PST by Bodleian_Girl (Please check out TheCitizensAudit.com to find out what David Brock has been doing)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Red Badger

LMAO


27 posted on 03/07/2017 6:38:47 AM PST by Kevin in California
[ Post Reply | Private Reply | To 24 | View Replies]

To: I want to know
And what will those who now have this arsenal be able to do with it? They now have the hacking capacity of the CIA.

IRS, ATF, DEA, Your state LEOs, Your county Sheriff, The bratty kid next door......Happy goldfish bowl!...........................

28 posted on 03/07/2017 6:38:57 AM PST by Red Badger (If "Majority Rule" was so important in South Africa, why isn't it that way here?.......)
[ Post Reply | Private Reply | To 20 | View Replies]

To: Red Badger

LOL!!
and maybe a decoder ring?


29 posted on 03/07/2017 6:39:05 AM PST by silverleaf (Age takes a toll: Please have exact change)
[ Post Reply | Private Reply | To 24 | View Replies]

To: seeker41
What if they were sold to level the playing field. That would be something obozo would like and encourage.

This is what Clinton did with nuclear/missile technology, especially to the Chinese. Dems back then (still?) believed that if more advanced countries had about the same level of knowledge of technology, there would be much less (no?) need for spying.

Utopians are always delusional. Of course, in their utopias, some of the animals are always more equal than others.

30 posted on 03/07/2017 6:39:08 AM PST by Freee-dame (Best election ever.)
[ Post Reply | Private Reply | To 11 | View Replies]

To: Kevin in California; silverleaf

31 posted on 03/07/2017 6:40:53 AM PST by Red Badger (If "Majority Rule" was so important in South Africa, why isn't it that way here?.......)
[ Post Reply | Private Reply | To 27 | View Replies]

To: Freee-dame

Yes I remember, W88 nuclear missile design for multi warheads. That was during my birth as a FReeper. The good ol days!


32 posted on 03/07/2017 6:42:43 AM PST by seeker41 (Trump Save America)
[ Post Reply | Private Reply | To 30 | View Replies]

To: silverleaf
Admiral Mike Rogers must have had a very interesting conversation with Trump when he flew up to NYC to visit

I wonder how he shielded it

No, no. NSA is the organization tasked to handle such things as cybersecurity. CIA has usurped their purview. So, it was certainly a very interesting discussion between the President elect and Admiral Rogers, but it wasn't Rogers that was on the menu.

No wonder Clapper and Brennan (particularly the latter) wanted to get rid of Rogers.

33 posted on 03/07/2017 6:43:46 AM PST by ScaniaBoy (Part of the Right Wing Research & Attack Machine)
[ Post Reply | Private Reply | To 13 | View Replies]

To: hapnHal

Reading the release it is clear that the CIA malware can reside on Windows, Ios, and Android software capturing data BEFORE ENCRYPTION.


34 posted on 03/07/2017 6:44:09 AM PST by Covenantor (Men are ruled...by liars who refuse them news, and by fools who cannot govern. " Chesterton)
[ Post Reply | Private Reply | To 19 | View Replies]

To: Red Badger

(string and tin can picture)

Sorry, but a laser can read vibrations off of the string :-)


35 posted on 03/07/2017 6:44:16 AM PST by salmon76
[ Post Reply | Private Reply | To 24 | View Replies]

To: RummyChick

I’m not sure that would be a good idea, it still has its uses................Maybe combine it with the NSA..................


36 posted on 03/07/2017 6:47:09 AM PST by Red Badger (If "Majority Rule" was so important in South Africa, why isn't it that way here?.......)
[ Post Reply | Private Reply | To 12 | View Replies]

To: allendale
Either Brennan is arrested , tried and convicted or the harassment of the Trump Administration will continue.

Muslim convert. Allegedly behind the passport office break in and the murders of Harris, the choir director Young and other gay men from the Trinity Church who had relations with Soetoro.

37 posted on 03/07/2017 6:48:46 AM PST by bgill (From the CDC site, "We don't know how people are infected with Ebola")
[ Post Reply | Private Reply | To 3 | View Replies]

To: seeker41

I'm safe, then.............

38 posted on 03/07/2017 6:49:09 AM PST by Red Badger (If "Majority Rule" was so important in South Africa, why isn't it that way here?.......)
[ Post Reply | Private Reply | To 21 | View Replies]

To: salmon76
Drudge: “Another Snowden”

Now, who has been complaining about leaks the last couple of months. And hasn't the MSM pooh-poohed the whole thing? Once again reality come to President Trump's aid.

39 posted on 03/07/2017 6:49:23 AM PST by ScaniaBoy (Part of the Right Wing Research & Attack Machine)
[ Post Reply | Private Reply | To 35 | View Replies]

To: salmon76

Yes, but you have to be able to see it first.................


40 posted on 03/07/2017 6:50:12 AM PST by Red Badger (If "Majority Rule" was so important in South Africa, why isn't it that way here?.......)
[ Post Reply | Private Reply | To 35 | View Replies]

To: Red Badger

SAT phone safe...


41 posted on 03/07/2017 6:50:13 AM PST by seeker41 (Trump Save America)
[ Post Reply | Private Reply | To 38 | View Replies]

To: seeker41

SAT phone safe? You decide.........

https://en.wikipedia.org/wiki/Iridium_Communications


42 posted on 03/07/2017 6:52:22 AM PST by Red Badger (If "Majority Rule" was so important in South Africa, why isn't it that way here?.......)
[ Post Reply | Private Reply | To 41 | View Replies]

To: Ultra Sonic 007

It’ll be cool when Brennon, Snowden and Assange are all in prison.


43 posted on 03/07/2017 6:55:46 AM PST by ifinnegan (Democrats kill babies and harvest their organs to sell)
[ Post Reply | Private Reply | To 1 | View Replies]

To: All

4D chess.

Trump knew this was coming out this week. He made his allegations about wiretapping this weekend. Leftists and their MSM goons say it could never happen.

Wikileaks dumps proof the CIA was hacking everyone every which way possible. BOOM!


44 posted on 03/07/2017 6:55:51 AM PST by TigerClaws
[ Post Reply | Private Reply | To 1 | View Replies]

To: silverleaf
I wonder how he shielded it

I don't know, but John McCain's current method of espionage appears to be getting on a jet - or putting an absolutely trusted surrogate on a jet - and flying across the world to have a face-to-face meeting in a secure room or hand off notes in person.

(in my best John McCain voice) "You can't wiretap The Maverick, my friends! I'm a little too sharp for you."

Mr. niteowl77

45 posted on 03/07/2017 7:04:43 AM PST by niteowl77
[ Post Reply | Private Reply | To 13 | View Replies]

To: hapnHal

All devices are hackable given enough time and money.


46 posted on 03/07/2017 7:06:19 AM PST by FlatLandBeer
[ Post Reply | Private Reply | To 19 | View Replies]

To: Ultra Sonic 007

The CIA interfered in the 2004 election against the incumbent President.


47 posted on 03/07/2017 7:09:25 AM PST by cll (Serviam!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Ultra Sonic 007

So, once again Trump seems prophetic, or perhaps he had foreknowledge and he was setting the stage with his call for surveillance investigation.


48 posted on 03/07/2017 7:11:51 AM PST by binreadin
[ Post Reply | Private Reply | To 1 | View Replies]

To: Ultra Sonic 007

Interesting.


49 posted on 03/07/2017 7:13:12 AM PST by b4its2late (A Liberal is a person who will give away everything he doesn't own.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Beach333
CIA malware targets iPhone, Android, smart TVs

CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA's DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details).

The EDG is responsible for the development, testing and operational support of all backdoors, exploits, malicious payloads, trojans, viruses and any other kind of malware used by the CIA in its covert operations world-wide.

The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell's 1984, but "Weeping Angel", developed by the CIA's Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.

The attack against Samsung smart TVs was developed in cooperation with the United Kingdom's MI5/BTSS. After infestation, Weeping Angel places the target TV in a 'Fake-Off' mode, so that the owner falsely believes the TV is off when it is on. In 'Fake-Off' mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.

As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.

The CIA's Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones. Infected phones can be instructed to send the CIA the user's geolocation, audio and text communications as well as covertly activate the phone's camera and microphone.

Despite iPhone's minority share (14.5%) of the global smart phone market in 2016, a specialized unit in the CIA's Mobile Development Branch produces malware to infest, control and exfiltrate data from iPhones and other Apple products running iOS, such as iPads. CIA's arsenal includes numerous local and remote "zero days" developed by CIA or obtained from GCHQ, NSA, FBI or purchased from cyber arms contractors such as Baitshop. The disproportionate focus on iOS may be explained by the popularity of the iPhone among social, political, diplomatic and business elites.

A similar unit targets Google's Android which is used to run the majority of the world's smart phones (~85%) including Samsung, HTC and Sony. 1.15 billion Android powered phones were sold last year. "Year Zero" shows that as of 2016 the CIA had 24 "weaponized" Android "zero days" which it has developed itself and obtained from GCHQ, NSA and cyber arms contractors.

These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the "smart" phones that they run on and collecting audio and message traffic before encryption is applied.

50 posted on 03/07/2017 7:13:56 AM PST by COUNTrecount
[ Post Reply | Private Reply | To 22 | View Replies]


Navigation: use the links below to view more comments.
first 1-5051-100101-150151-200201-210 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson