#Vault7 Wikileaks





Alexa shuts down when asked if you are being monitored by the CIA or NSA XD


Probably the best post you've ever made. (credit where credit is due)
A friend of mine has one of these things, and I showed them these videos tonight. So of course they tried it when they got home, asked it the same questions in half a dozen different ways, and only got the response back that it didn't understand the question. I figured that it had probably been reprogrammed since those videos went into circulation, to give a don't understand the question response instead of shutting down. Has anyone else tried this with one of these things?
 
As is so often the case with Wikileaks, most of the documents are boring to read.
I already wrote something about it. In fact I found some other articles that are more interesting than the "Year zero" dump of Wikileaks: http://www.ronpaulforums.com/showthread.php?503015-Big-Brother-knows-everything-%96-GSM

See the folowing quotes from the other thread.
Wikileaks dropped a bombshell last March 7 by putting 8761 documents on the internet about systematic CIA infiltration of computers around the world.
The following is interesting (to say the least) - Weeping Angel. It’s designed to hack into Samsung F8000-Series “smart” televisions. Even when the telescreen is switched off, they can use the TV's microphone and webcam to spy: https://wikileaks.org/ciav7p1/cms/page_12353643.html

Besides the Weeping angel that can use a Samsung telescreen to spy on you, arguably the most interesting is that the CIA was discussing the possibility to hack cars.
I agree with Wikileaks that this is enough evidence to suspect that the CIA wants to take over the vehicle control systems. This leads to the conclusion that the CIA can carry out car crashes, without leaving evidence.
Wikileaks has redacted the files by removing identifying information of involved government officials and tens of thousands of CIA targets and attack machines throughout Latin America, Europe and the USA.
Please note that the CIA uses the HIVE suite to also hack Linux systems.
Here’s the press release by Wikileaks on the latest dump - part of the series dubbed “Year zero”:
https://wikileaks.org/ciav7p1/

There is even (older) evidence that it’s relatively easy to hack car computers, which shows beyond a doubt that the CIA could take over car control systems.
In 2008, a 14-year-old altered a television remote control to take control of trams in the city of Lodz, Poland, derailing several trams.
In 2010, a 20-year-old man with a modicum of computer savvy hacked car computers in a Texas Auto Center causing some mayhem.
In 2015, security researchers Charlie Miller and Chris Valasek hacked into a Jeep Cherokee and managed to “turn the steering wheel, briefly disable the brakes and shut down the engine”. Miller achieved this from more than a mile away by a MacBook, without any installed device needed.
Valasek and Miller also found readily accessible Internet links to thousands of other Jeeps, Dodges and Chryslers that used the wireless entertainment and navigation system Uconnect. By typing the right series of computer commands, they could easily hack into these vehicles from a distance.
Earlier in 2013 Miller and Valasek appeared on NBC’s “Today” show to override the control of a car — yanking the steering wheel, disabling the brakes and shutting off the engine.
According to experts, because the security on automotive systems is “15 years, maybe 20 years behind” they’re not difficult to hack.
Any idea why the US federal government has required that all cars since 1996 install onboard computers?
In 2013, Samy Kamkar used a creation called SkyJack and less than $100 in extra gear to transform a basic drone into an attack vehicle capable of taking control of drones that flu nearby: http://www.washingtonpost.com/sf/business/2015/07/22/hacks-on-the-highway/?utm_term=.869d905b549b
 

Today, March 23rd 2017, WikiLeaks releases Vault 7 "Dark Matter", which contains documentation for several CIA projects that infect Apple Mac firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA's Embedded Development Branch (EDB). These documents explain the techniques used by CIA to gain 'persistence' on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware. ...

Amongothers, these documents reveal the "Sonic Screwdriver"project … a "mechanism for executing code on peripheraldevices while a Mac laptop or desktop is booting" allowing anattacker to boot its attack software for example from a USB stick"even when a firmware password is enabled". The CIA's"Sonic Screwdriver" infector is stored on the modifiedfirmware of an Apple Thunderbolt-to-Ethernet adapter.

"DarkSeaSkies"is "an implant that persists in the EFI firmware of an AppleMacBook Air computer" and consists of "DarkMatter","SeaPea" and "NightSkies", respectively EFI,kernel-space and user-space implants. ...

"Triton"MacOSX malware, its infector "Dark Mallet" and itsEFI-persistent version "DerStarke" are also included inthis release. ...

Alsoincluded in this release is the manual for the CIA's "NightSkies1.2" a "beacon/loader/implant tool" for the AppleiPhone. ... designed to be physically installed onto factory freshiPhones. i.e the CIA has been infecting the iPhone supply chain ofits targets since at least 2008. ...
https://wikileaks.org/vault7/darkmatter/?cia
 
Last edited:
[video=youtube;DPQTyJj8kCQ]https://www.youtube.com/watch?time_continue=70&v=DPQTyJj8kCQ[/video]
 
Joshua Adam Schulte, 29, a former employee in the CIA's Engineering Development Group, is believed to have provided the agency's top-secret cyber warfare tools to WikiLeaks - according to a disclosure by federal prosecutors at a January hearing in a Manhattan court on unrelated charges of possessing, receiving and transporting child pornography. Schulte, who has been in jail for months, has pleaded not guilty on the child porn charges.
Schulte previously worked for the NSA before joining the CIA, then "left the intelligence community in 2016 and took a job in the private sector," according to a statement reviewed by The Post.
Schulte also claimed that he reported “incompetent management and bureaucracy” at the CIA to that agency’s inspector general as well as a congressional oversight committee. That painted him as a disgruntled employee, he said, and when he left the CIA in 2016, suspicion fell upon him as “the only one to have recently departed [the CIA engineering group] on poor terms,” Schulte wrote. -WaPo
fefe_0.png

Prosecutors allege that they found a large collection of child pornography on a server maintained by Schulte, however his attorneys argue that anywhere from 50 to 100 people had access to it, which Schulte set up several years ago to share movies and other digital files.
Federal authorities searched Schulte’s apartment in New York last year and obtained personal computer equipment, notebooks and handwritten notes, according to a copy of the search warrant reviewed by The Washington Post. But that failed to provide the evidence that prosecutors needed to indict Schulte with illegally giving the information to WikiLeaks. -WaPo
And while Schulte "remains a target of that investigation," prosecutor Matthew Laroche, assistant US attorney in the Southern District of New York, said that the investigation is "ongoing." Part of that investigation, reports WaPo, is analyzing whether the Tor network - which allows internet users to hide their location (in theory) "was used in transmitting classified information."
In other hearings in Schulte’s case, prosecutors have alleged that he used Tor at his New York apartment, but they have provided no evidence that he did so to disclose classified information. Schulte’s attorneys have said that Tor is used for all kinds of communications and have maintained that he played no role in the Vault 7 leaks. -WaPo
“Due to these unfortunate coincidences the FBI ultimately made the snap judgment that I was guilty of the leaks and targeted me,” Schulte said. He has launched Facebook and GoFundMe pages to raise money for his defense, as well as post articles critical of the criminal justice system.

More at: https://www.zerohedge.com/news/2018-05-17/former-cia-employee-suspected-vault-7-wikileaks-disclosure
 
Back
Top