๐Ÿ”ฅ Popular | Latest

@Regrann from @nyc4revolution - LINK IN BIO - Wikileaks just released the โ€œlargest ever publication of U.S. Central Intelligence Agency (CIA) documents.โ€ The massive release โ€“ just the first batch in a trove of documents code-named โ€œVault 7โ€ by Wikileaks โ€“ details the CIAโ€™s global covert hacking program and its arsenal of weaponized exploits. According to a Wikileaks press release, the 8,761 newly published files came from the CIAโ€™s Center for Cyber Intelligence (CCI) in Langley, Virginia. The release says that the UMBRAGE group, a subdivision of the centerโ€™s Remote Development Branch (RDB), has been collecting and maintaining a โ€œsubstantial library of attack techniques โ€˜stolenโ€™ from malware produced in other states, including the Russian Federation.โ€ . l As Wikileaks notes, the UMBRAGE group and its related projects allow the CIA to misdirect the attribution of cyber attacks by โ€œleaving behind the โ€˜fingerprintsโ€™ of the very groups that the attack techniques were stolen from.โ€ . l In other words, the CIAโ€™s sophisticated hacking tools all have a โ€œsignatureโ€ marking them as originating from the agency. In order to avoid arousing suspicion as to the true extent of its covert cyber operations, the CIA has employed UMBRAGEโ€™s techniques in order to create signatures that allow multiple attacks to be attributed to various entities โ€“ instead of the real point of origin at the CIA. Incidentally, the U.S. intelligence communityโ€™s assertions that Russia used cyber-attacks to interfere with the election overshadowed reports that the U.S. government had actually been responsible for several hacking attempts that targeted state election systems. For instance, the state of Georgia reported numerous hacking attempts on its election agenciesโ€™ networks, nearly all of which were traced back to the U.S. Department of Homeland Security. Now that the CIA has been shown to not only have the capability but also the express intention of replacing the โ€œfingerprintโ€ of cyber-attacks it conducts with those of another state actor, the CIAโ€™s alleged evidence that Russia hacked the U.S. election โ€“ or anything else for that matter โ€“ is immediately suspect. - regrann: WikiLeaks' VAULT 7 may have dealt the fi death blow bo the tal legations that R cked our election Elst @Regrann from @nyc4revolution - LINK IN BIO - Wikileaks just released the โ€œlargest ever publication of U.S. Central Intelligence Agency (CIA) documents.โ€ The massive release โ€“ just the first batch in a trove of documents code-named โ€œVault 7โ€ by Wikileaks โ€“ details the CIAโ€™s global covert hacking program and its arsenal of weaponized exploits. According to a Wikileaks press release, the 8,761 newly published files came from the CIAโ€™s Center for Cyber Intelligence (CCI) in Langley, Virginia. The release says that the UMBRAGE group, a subdivision of the centerโ€™s Remote Development Branch (RDB), has been collecting and maintaining a โ€œsubstantial library of attack techniques โ€˜stolenโ€™ from malware produced in other states, including the Russian Federation.โ€ . l As Wikileaks notes, the UMBRAGE group and its related projects allow the CIA to misdirect the attribution of cyber attacks by โ€œleaving behind the โ€˜fingerprintsโ€™ of the very groups that the attack techniques were stolen from.โ€ . l In other words, the CIAโ€™s sophisticated hacking tools all have a โ€œsignatureโ€ marking them as originating from the agency. In order to avoid arousing suspicion as to the true extent of its covert cyber operations, the CIA has employed UMBRAGEโ€™s techniques in order to create signatures that allow multiple attacks to be attributed to various entities โ€“ instead of the real point of origin at the CIA. Incidentally, the U.S. intelligence communityโ€™s assertions that Russia used cyber-attacks to interfere with the election overshadowed reports that the U.S. government had actually been responsible for several hacking attempts that targeted state election systems. For instance, the state of Georgia reported numerous hacking attempts on its election agenciesโ€™ networks, nearly all of which were traced back to the U.S. Department of Homeland Security. Now that the CIA has been shown to not only have the capability but also the express intention of replacing the โ€œfingerprintโ€ of cyber-attacks it conducts with those of another state actor, the CIAโ€™s alleged evidence that Russia hacked the U.S. election โ€“ or anything else for that matter โ€“ is immediately suspect. - regrann
Save