Domain: tiger-web1.srvr.media3.us Wikileaks release #Vault7 | Page 10 | Political Talk
Started By
Message

re: Wikileaks release #Vault7

Posted on 3/7/17 at 8:30 am to
Posted by cajunangelle
Member since Oct 2012
163502 posts
Posted on 3/7/17 at 8:30 am to
quote:

CIA malware targets iPhone, Android, smart TVs

CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA's DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details).

The EDG is responsible for the development, testing and operational support of all backdoors, exploits, malicious payloads, trojans, viruses and any other kind of malware used by the CIA in its covert operations world-wide.

The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell's 1984, but "Weeping Angel", developed by the CIA's Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.

The attack against Samsung smart TVs was developed in cooperation with the United Kingdom's MI5/BTSS. After infestation, Weeping Angel places the target TV in a 'Fake-Off' mode, so that the owner falsely believes the TV is off when it is on. In 'Fake-Off' mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.

As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.

The CIA's Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones. Infected phones can be instructed to send the CIA the user's geolocation, audio and text communications as well as covertly activate the phone's camera and microphone.

Despite iPhone's minority share (14.5%) of the global smart phone market in 2016, a specialized unit in the CIA's Mobile Development Branch produces malware to infest, control and exfiltrate data from iPhones and other Apple products running iOS, such as iPads. CIA's arsenal includes numerous local and remote "zero days" developed by CIA or obtained from GCHQ, NSA, FBI or purchased from cyber arms contractors such as Baitshop. The disproportionate focus on iOS may be explained by the popularity of the iPhone among social, political, diplomatic and business elites.

LINK
Posted by ThinePreparedAni
In a sea of cognitive dissonance
Member since Mar 2013
11315 posts
Posted on 3/7/17 at 8:31 am to
Bouncing around a few different boards. Common chatter referencing the following:


Nov 2016 WashingtonTimes article

quote:



Over 500,000 U.S. diplomatic cables from 1979 have been released by the anti-secrecy group WikiLeaks.

Not much has been heard from WikiLeaks founder Julian Assange since his Internet access was cut off at Ecuador’s London embassy in mid-October, but he made up for lost time on Monday. Reporters around the world now have access to cables on everything from the Iranian revolution and Grenada’s coup to Saddam Hussein’s rise in Iraq.

If any year could be said to be the ‘year zero’ of our modern era, 1979 is it,” Mr. Assange said in a statement posted on WikiLeaks.org. “In the Middle East, the Iranian revolution, the Saudi Islamic uprising and the Egypt-Israel Camp David Accords led not only to the present regional power dynamic but decisively changed the relationship between oil, militant Islam and the world.”

“The uprising at Mecca permanently shifted Saudi Arabia towards Wahhabism, leading to the transnational spread of Islamic fundamentalism and the US-Saudi destabilisation of Afghanistan,” he continued.


1979...

Operation cyclone

quote:

Operation Cyclone was the code name for the United States Central Intelligence Agency (CIA) program to arm and finance the Jihadi warriors, mujahideen, in Afghanistan from 1979 to 1989, prior to and during the military intervention by the USSR in support of its client, the Democratic Republic of Afghanistan. The program leaned heavily towards supporting militant Islamic groups that were favored by the regime of Muhammad Zia-ul-Haq in neighboring Pakistan, rather than other, less ideological Afghan resistance groups that had also been fighting the Marxist-oriented Democratic Republic of Afghanistan regime since before the Soviet intervention.[1] Operation Cyclone was one of the longest and most expensive covert CIA operations ever undertaken;[2] funding began with $20–$30 million per year in 1980 and rose to $630 million per year in 1987.[1] Funding continued after 1989 as the mujahideen battled the forces of Mohammad Najibullah's PDPA during the civil war in Afghanistan (1989–1992).[3]


quote:


Conspiracy theories

Conspiracy theorists have alleged that bin Laden and al Qaeda were beneficiaries of CIA assistance. This is challenged by experts such as Coll—who notes that declassified CIA records and interviews with CIA officers do not support such claims—and Peter Bergen, who argues: "The theory that bin Laden was created by the CIA is invariably advanced as an axiom with no supporting evidence."[59][60] Bergen insists that U.S. funding went to the Afghan mujahideen, not the Arab volunteers who arrived to assist them.[60]

However Sir Martin Ewans noted that the Afghan Arabs "benefited indirectly from the CIA's funding, through the ISI and resistance organizations,"[61] and that "it has been reckoned that as many as 35,000 'Arab-Afghans' may have received military training in Pakistan at an estimated cost of $800 million in the years up to and including 1988."[62] Some of the CIA's greatest Afghan beneficiaries were Arabist commanders such as Haqqani and Hekmatyar who were key allies of bin Laden over many years.[63][64] Haqqani—one of bin Laden's closest associates in the 1980s—received direct cash payments from CIA agents, without the mediation of the ISI. This independent source of funding gave Haqqani disproportionate influence over the the mujahideen.[65] Haqqani and his network played an important role in the formation and growth of al Qaeda, with Jalalhuddin Haqqani allowing bin Laden to train mujahideen volunteers in Haqqani territory and build extensive infrastructure there.[66]


This post was edited on 3/7/17 at 8:33 am
Posted by AZTarheeel
Member since Feb 2015
3702 posts
Posted on 3/7/17 at 8:31 am to


Posted by BigPerm30
Member since Aug 2011
31437 posts
Posted on 3/7/17 at 8:34 am to
Call him bat shite crazy but Alex Jones discussed this issue years ago. Specifically I remember with the fake off by the smart tvs.
Posted by cajunangelle
Member since Oct 2012
163502 posts
Posted on 3/7/17 at 8:36 am to
Remember all the dem progs calling (former CBS reporter) Sharyl Attkisson's book crazy? She reported her laptop was taken over and that they indeed have the ability to control cars. Recall the rolling stones reporters death. They can control cars and stick the gas pedal. This is all in Sharyl Attkisson's book and people called her nuts.
Posted by Colonel Flagg
Baton Rouge
Member since Apr 2010
23454 posts
Posted on 3/7/17 at 8:40 am to
So basically this is the tech Batman used against the Joker in The Dark Knight.
Posted by autauga
Member since Sep 2015
3684 posts
Posted on 3/7/17 at 8:40 am to
quote:

The CIA’s Remote Devices Branch‘s UMBRAGE group collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.
With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from


LINK
This post was edited on 3/7/17 at 8:43 am
Posted by GumboPot
Member since Mar 2009
139353 posts
Posted on 3/7/17 at 8:42 am to
quote:

The CIA’s Remote Devices Branch‘s UMBRAGE group collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.
With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from



So basically take everything that comes out of the IC with a grain of salt. Especially if they blame the RUSSIANS!
This post was edited on 3/7/17 at 8:43 am
Posted by GRTiger
On a roof eating alligator pie
Member since Dec 2008
69611 posts
Posted on 3/7/17 at 8:52 am to
quote:

Operation Cyclone was the code name for the United States Central Intelligence Agency (CIA) program to arm and finance the Jihadi warriors, mujahideen, in Afghanistan from 1979 to 1989, prior to and during the military intervention by the USSR in support of its client, the Democratic Republic of Afghanistan. The program leaned heavily towards supporting militant Islamic groups that were favored by the regime of Muhammad Zia-ul-Haq in neighboring Pakistan, rather than other, less ideological Afghan resistance groups that had also been fighting the Marxist-oriented Democratic Republic of Afghanistan regime since before the Soviet intervention.[1] Operation Cyclone was one of the longest and most expensive covert CIA operations ever undertaken;[2] funding began with $20–$30 million per year in 1980 and rose to $630 million per year in 1987.[1] Funding continued after 1989 as the mujahideen battled the forces of Mohammad Najibullah's PDPA during the civil war in Afghanistan (1989–1992).[3]


Thanks, Charlie Wilson's War...
Posted by goldennugget
NIL Ruined College Sports
Member since Jul 2013
26376 posts
Posted on 3/7/17 at 8:52 am to
We need Ocho in here to defend the CIA's honor like he usually does
Posted by notsince98
KC, MO
Member since Oct 2012
21656 posts
Posted on 3/7/17 at 8:52 am to
quote:

Call him bat shite crazy but Alex Jones discussed this issue years ago. Specifically I remember with the fake off by the smart tvs.


The dude knows his shite. I'm not sure how much more Alex needs to be right before the general population takes him more seriously. This is a bad day for the main stream media.
Posted by goldennugget
NIL Ruined College Sports
Member since Jul 2013
26376 posts
Posted on 3/7/17 at 8:54 am to
quote:

The dude knows his shite. I'm not sure how much more Alex needs to be right before the general population takes him more seriously. This is a bad day for the main stream media.



I agree

I posted a link to Alex Jones the other day where he discussed Israel being involved in 9/11 and everyone dismissed him without even giving it a listen.

Thats how they operate. They discredit anyone who tries to unveil the truth as a crazy tin foil nut. This keeps people from being interested.
Posted by ILeaveAtHalftime
Member since Sep 2013
2889 posts
Posted on 3/7/17 at 8:55 am to
And cliffs of the leak? Is this a nothing burger like everything else that's come out recently?
This post was edited on 3/7/17 at 8:56 am
Posted by DeltaDoc
The Delta
Member since Jan 2008
16504 posts
Posted on 3/7/17 at 8:58 am to
Michael Hastings, whom was allegedly writing a story on Brennan and ME gun running, asked to borrow his roommate's car because he was worried about driving his own. He was refused. Later that evening his new Mercedes C-class wrecked on a boulevard in L.A. going over 100 mph...the fiery wreck resulted in his death. No story was ever written.
Posted by bamarep
Member since Nov 2013
52444 posts
Posted on 3/7/17 at 8:59 am to
Only if you call the spooks being able to turn on your iPad or TV and listen to you bang your wife a nothing burger.
Posted by cajunangelle
Member since Oct 2012
163502 posts
Posted on 3/7/17 at 9:00 am to
AJ has said some things that did not come to fruitation. Overall he's not wrong I will give you that. Recently his ex spook bud said that Flynn was fired because Flynn knows about DC pedoGate. And Pence's best friend was on the DC pedo list. So that is why Flynn was fired. Who is Pence's best friend? Biden?

It bothers me AJ pimps hundred dollar vitamins for mens health and boners on his site. But I guess he has to butter his bread somehow...
Posted by TheFranchise
The Stick
Member since Feb 2005
6318 posts
Posted on 3/7/17 at 9:01 am to
The discrediting also serves to deter others from coming forward lest they be labeled a kook.

I return to what FBI Anon and HLI Anon each said about faking election results: it doesn't matter if everyone knows it's not true, as long everyone doesn't realize that everyone else realizes it's not true
Posted by DeltaDoc
The Delta
Member since Jan 2008
16504 posts
Posted on 3/7/17 at 9:01 am to
I've always assumed him to be crazy. I listened to his recent podcast with Joe Rogan and still think he is crazy, but also probably right more than wrong.
Posted by cajunangelle
Member since Oct 2012
163502 posts
Posted on 3/7/17 at 9:02 am to
Or that Obama (The Spooks) spied on and controlled France's election. It is the only way they can keep up the globalism mentality.
Posted by berrycajun
Baton Rouge
Member since May 2016
7164 posts
Posted on 3/7/17 at 9:03 am to
What I'm most disturbed by is their seeing us. I don't care what they hear, but I have daughters. There's no Tv in their room but.

However, There's a Sony tv in MY bedroom facing my bed. Are they watching me in my bedroom? I doubt it. They must be watching only those they are threatened by.
Jump to page
Page First 8 9 10 11 12 ... 15
Jump to page
first pageprev pagePage 10 of 15Next pagelast page

Back to top
logoFollow TigerDroppings for LSU Football News
Follow us on X, Facebook and Instagram to get the latest updates on LSU Football and Recruiting.

FacebookXInstagram