NSA has direct access to tech giants' systems for user data, secret files reveal

Discussion in 'privacy general' started by Dermot7, Jun 6, 2013.

  1. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,881
    Location:
    Slovenia, EU
    https://sputniknews.com/science/201702161050765286-cia-french-parties-wikileaks/
     
  2. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,881
    Location:
    Slovenia, EU
    https://www.schneier.com/blog/archives/2017/02/nsa_using_cyber.html

    Of course adversary can hack back to improve their defensive capabilities...
     
  3. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
  4. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,881
    Location:
    Slovenia, EU
    You're welcome. Yes I agree, comments are good.
     
  5. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
  6. deBoetie

    deBoetie Registered Member

    Joined:
    Aug 7, 2013
    Posts:
    1,832
    Location:
    UK
    The dangerous thing about the class of application Palantir represents is the extent to which false-positives are inevitable and prevalent. Guilt by association, false and covert algorithmic accusations with no redress or standing. And expensive and diversionary from following people they have real intelligence about.
     
  7. hawki

    hawki Registered Member

    Joined:
    Dec 17, 2008
    Posts:
    6,065
    Location:
    DC Metro Area
    "Wikileaks Releases "Vault 7": Reveals The CIA's Hacking Tools...

    'Press Release

    Vault 7: CIA Hacking Tools Revealed

    Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named "Vault 7" by WikiLeaks, it is the largest ever publication of confidential documents on the agency.

    The first full part of the series, "Year Zero", comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA's Center for Cyber Intelligence in Langley, Virgina...

    "Year Zero" introduces the scope and direction of the CIA's global covert hacking program, its malware arsenal and dozens of "zero day" weaponized exploits against a wide range of U.S. and European company products, include Apple's iPhone, Google's Android and Microsoft's Windows and even Samsung TVs, which are turned into covert microphones...

    Wikileaks has carefully reviewed the "Year Zero" disclosure and published substantive CIA documentation while avoiding the distribution of 'armed' cyberweapons until a consensus emerges on the technical and political nature of the CIA's program and how such 'weapons' should analyzed, disarmed and published.

    Wikileaks has also decided to redact and anonymise some identifying information in "Year Zero" for in depth analysis. These redactions include ten of thousands of CIA targets and attack machines throughout Latin America, Europe and the United States...' "

    http://www.zerohedge.com/news/2017-03-07/wikileaks-hold-press-conference-vault-7-release-8am-eastern

    "...WikiLeaks touted its trove as exceeding in scale and significance the massive collection of National Security Agency documents exposed by former U.S. intelligence contractor Edward Snowden..."

    https://www.washingtonpost.com/world/national-security/wikileaks-says-it-has-obtained-trove-of-cia-hacking-tools/2017/03/07/c8c50c5c-0345-11e7-b1e9-a05d3c21f7cf_story.html?hpid=hp_rhp-top-table-main_wikileaks-11a:homepage/story

    "...He [Snowden[ added: 'If you’re writing about the CIA/@Wikileaks story, here’s the big deal: first public evidence USG(US government) secretly paying to keep US software unsafe.' He described this as 'reckless beyond words'..."

    https://www.theguardian.com/media/2...-of-secret-cia-documents-hacking-surveillance

    "...The alleged cyber-weapons are said to include malware that targets Windows, Android, iOS, OSX and Linux computers as well as internet routers..."

    http://www.bbc.com/news/technology-39193008

    "Wikileaks: The CIA is using popular TVs, smartphones and cars to spy on their owners..."

    https://www.washingtonpost.com/news/the-switch/wp/2017/03/07/why-the-cia-is-using-your-tvs-smartphones-and-cars-for-spying/?hpid=hp_rhp-top-table-main_cia-spying-210pm:homepage/story

    Full Wikileaks Official Press Release:

    https://wikileaks.org/ciav7p1/

    ["Vault 7" Backgrounder:

    "Wikileaks Releases Encrypted "Vault 7" Torrent, Will Unveil Password Tuesday 9am..."

    http://www.zerohedge.com/news/2017-...lt-7-torrent-will-unveil-password-tuesday-9am ]
     
    Last edited: Mar 7, 2017
  8. JRViejo

    JRViejo Super Moderator

    Joined:
    Jul 9, 2008
    Posts:
    97,440
    Location:
    U.S.A.
     
  9. hawki

    hawki Registered Member

    Joined:
    Dec 17, 2008
    Posts:
    6,065
    Location:
    DC Metro Area
    Dunno how authoratative Paul Wagenseil should be taken on this:

    "Paul Wagenseil? @snd_wagenseil 7h7 hours ago

    I'm just gonna state the obvious: this #wikileaks data dump is part of a Russian disinformation campaign."

    https://twitter.com/snd_wagenseil

    Maybe he was just joking in his tweet :) Dunno.

    I guess that's the point -- no one knows, though Snowden earlier in the day said the dump looked authoritative, but then again -- he's in Russia and pretty much survives at the pleasure of Putin.

    ~ Removed Off Topic Political Comments ~
     
    Last edited by a moderator: Mar 7, 2017
  10. JRViejo

    JRViejo Super Moderator

    Joined:
    Jul 9, 2008
    Posts:
    97,440
    Location:
    U.S.A.
    All of it is noise at the moment; his is another point of view, just like the others.
     
  11. deBoetie

    deBoetie Registered Member

    Joined:
    Aug 7, 2013
    Posts:
    1,832
    Location:
    UK
    I guess the relevance of the CIA leaks to this forum will only emerge with responsible analysis over time, and even if the tools and exploits are past their sell-by date, they are illustrative of the scale of the problem for us (and the issue that these tools are being propagated widely).

    One thing I did notice in the release was the statement - which clearly needs validation - was that the CIA specifically use tools and techniques and misinformation to prevent fingerprinting of their operations and to encourage mis-attribution, including to the Russians. It's obviously hard to know who to trust (and much of that is self-inflicted and inherent in the secret laws), yet clearly a knee-jerk response that it's those pesky Russians again is irresponsible.
     
  12. ronjor

    ronjor Global Moderator

    Joined:
    Jul 21, 2003
    Posts:
    163,083
    Location:
    Texas
    Security Firms Assess Impact of CIA Leak
     
  13. guest

    guest Guest

    Not really a leak, the CIA just does what they always do since ages, modern age technology made it easier to them , no need agents disguised as cable operators sitting on a truck all day long near your phone line pylon.
     
  14. guest

    guest Guest

  15. guest

    guest Guest

  16. hawki

    hawki Registered Member

    Joined:
    Dec 17, 2008
    Posts:
    6,065
    Location:
    DC Metro Area
  17. hawki

    hawki Registered Member

    Joined:
    Dec 17, 2008
    Posts:
    6,065
    Location:
    DC Metro Area
    On the lighter side:

    "In New CIA WikiLeaks Trove,...

    The spy agency appears to be up on its kaomoji game...

    ...the dump included an interesting nugget of intel: The CIA is well-versed in memes and text-based emojis, also known as kaomoji.

    A document simply titled “Japanese style faces” released by WikiLeaks contains more than 100 expressions, including gems like:

    ∩( ・ω・)∩ ― happy dog

    ᶘ ᵒᴥᵒᶅ ― baby seal

    ╯‵Д′)╯彡┻━┻ ― angry guy flipping a table..."

    http://www.huffingtonpost.com/entry...s_58bf91abe4b0ed718268221b?tn3csn62v3ip8ehfr&
     
  18. Krusty

    Krusty Registered Member

    Joined:
    Feb 3, 2012
    Posts:
    10,210
    Location:
    Among the gum trees
    Why government officials unplug the hotel TV when travelling overseas

     
  19. Krusty

    Krusty Registered Member

    Joined:
    Feb 3, 2012
    Posts:
    10,210
    Location:
    Among the gum trees
    CIA aware in 2016 of Vault 7 leak that led to WikiLeaks release

     
  20. emmjay

    emmjay Registered Member

    Joined:
    Jan 26, 2010
    Posts:
    1,541
    Location:
    Triassic
  21. guest

    guest Guest

    CIA is very weak in surveillance or all this affair is a smokescreen... after the Snowden drama, if i was the CIA director i would ask a 24/24 tight surveillance on Wikileaks, seems not the case, and now another leak...
     
  22. JRViejo

    JRViejo Super Moderator

    Joined:
    Jul 9, 2008
    Posts:
    97,440
    Location:
    U.S.A.
  23. CloneRanger

    CloneRanger Registered Member

    Joined:
    Jan 4, 2006
    Posts:
    4,978
    ADS Streams

    I warned about malware etc being able to hide in NTFS Alternate Data Streams, over TEN years ago. Not many people thought it was anything to be concerned about ? Since then it's become more & more of a reality ! Just one reason i've Always formatted my C Drives with FAT32 only. I expect the TLA's didn't wait until recently to take advantage of the ADS.

     
  24. Krusty

    Krusty Registered Member

    Joined:
    Feb 3, 2012
    Posts:
    10,210
    Location:
    Among the gum trees
    Owner asking Amazon’s smart assistant if it is connected to the CIA — causing it to shut down
     
  25. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,592
    Location:
    U.S.A.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.