Andrew Anglin
Daily Stormer
March 7, 2017
So, Wikileaks just dumped a bunch of stuff on CIA’s global spy network.
Shockingly, it is not shocking.
Basically just indicates that the CIA is using the same software as we already knew the NSA was using, so… the revelation is that US government spy agencies share software with each other?
RT:
The major takeaway from the latest WikiLeaks dump centers around the terrifying, ‘all-seeing-eye’ surveillance project codenamed ‘Weeping Angel.’ The CIA appears to have taken espionage to a whole new level if WikiLeaks’ initial analysis is accurate.
According to the preliminary release, the CIA has the capability to hack, record and even control everyday technology used by billions of people around the world.
These include smartphones, tablets, smart TVs and even vehicles with remote control navigation systems.
On these devices themselves, the CIA can allegedly hack into some of the world’s most heavily encrypted social media and communications platforms such as WhatsApp, Weibo, Confide, Signal and Telegram before any encryption can even be applied.
For example, WhatsApp’s end-to-end encryption means that only the direct participants in a conversation can read messages; not even WhatsApp is capable of reading them.
The CIA, however, was able to hack into individual private WhatsApp messages before encryption could even be applied.
“Your messages are secured with a lock, and only the recipient and you have the special key needed to unlock and read your message,” the company writes on their website.
This is true. It remains true.
PSA: This incorrectly implies CIA hacked these apps / encryption. But the docs show iOS/Android are what got hacked – a much bigger problem. https://t.co/Bw9AkBpOdt
— Edward Snowden (@Snowden) March 7, 2017
The issue is that the CIA is already in your phone, so they can see the messages just as easy as you can see them, meaning that end-to-end encryption is irrelevant. They are at both ends.
To understand the sheer scale of the leak and of the CIA’s high tech surveillance operations, the hierarchy of divisions within the agency’s cyber division can be looked at below.
According to WikiLeaks, the manufacturing division for the Agency’s hacking tools, or ‘zero days’ as they are dubbed in the leaks, is the EDG (Engineering Development Group), which is under the umbrella of the agency’s CCI (Center for Cyber Intelligence).
Smartphone devices
The CIA’s Mobile Devices Branch (MDB) developed a variety of tools and techniques to remotely hack and control the world’s most popular smartphones and tablets.
Once hacked, phones can be used to transmit their “geolocation, audio and text communications” directly to the CIA without the user’s knowledge. In addition, the CIA can remotely activate the phone’s microphone and camera.
Apple devices
Despite Apple holding a minority share in the global smartphone market in 2016, the CIA’s Mobile Development Branch has a specific division dedicated to the hacking of Apple devices which run the iOS operating system from smartphones and tablets.
WikiLeaks also alleges that the CIA not only developed but collaborated on or purchased a variety of hacking tools or ‘zero days’ from intelligence agencies and contractors around the world such as GCHQ, NSA, FBI or Baitshop.
Samsung
The EDG has produced a ‘zero day’ capable of hacking Samsung smart TVs, switching it into a fake ‘off mode’ where the device appears to remain on standby while actually recording audio and transmitting it to nearby secured CIA servers.
For context, Samsung was the top-selling television brand in the world for the last decade with a global market share of 21 percent as of 2015. WikiLeaks did not specify in the initial release whether video recordings were also a part of this particular ‘zero day.’
Vehicle control
As far back as 2014, WikiLeaks alleges that the CIA was exploring the possibility of infecting control systems in modern cars and trucks. While the exact goal of such control has yet to be established, WikiLeaks suggests that such hacks could be used for almost undetectable assassinations.
Android devices (Samsung, HTC, Sony)
The majority of the world’s smartphones (approximately 85 percent) run on the Android operating system, with roughly 1.15 billion Android devices sold last year, according to the WikiLeaks statement. Naturally, the CIA devoted an entire subdivision to hacking Android devices, with 24 individual weaponized ‘zero days’ targeting Android devices.
Microsoft
The CIA’s cyber division has developed numerous local and remote ‘zero days’ to hack and control Microsoft Windows users.
These ‘zero days’ include, but are not limited to: air gap jumping viruses such as ‘Hammer Drill’ that are capable of infecting computers or phones that have never been connected to the internet; hacking tools that focus on removable devices such as USB drives; systems for hiding data, be it in covert disk areas or in images; particular ‘zero days’ that are manufactured to self-perpetuate and hide themselves from detection on an ongoing basis.
Before any tech experts gloat, WikiLeaks also alleges that the CIA has developed advanced, multi-platform malware attack and control systems that cover Windows and Mac OS X but also mixed source platforms like Solaris and open source platforms like Linux. Wikileaks names these specific ‘zero days’ as the EDB’s ‘HIVE,’ ‘Cutthroat’ and ‘Swindle’ tools.
I guess aside from the technical stuff, which is interesting to me and perhaps more interesting to others, the main upshot of this is that the issue of privacy can once again enter the public debate.
Privacy should be given the status of “fundamental human right.” That seems like something that can and should be taken for granted. The fact that this isn’t the case in this great system of human rights democracy simply proves yet again that this human rights democracy is a gigantic hoax.
Oh, and we learned this:
If you're writing about the CIA/@Wikileaks story, here's the big deal: first public evidence USG secretly paying to keep US software unsafe. pic.twitter.com/kYi0NC2mOp
— Edward Snowden (@Snowden) March 7, 2017
The CIA reports show the USG developing vulnerabilities in US products, then intentionally keeping the holes open. Reckless beyond words.
— Edward Snowden (@Snowden) March 7, 2017
Why is this dangerous? Because until closed, any hacker can use the security hole the CIA left open to break into any iPhone in the world. https://t.co/xK0aILAdFI
— Edward Snowden (@Snowden) March 7, 2017
The government spying everyone is probably not really as bad as the government making it possible for random people to spy on random people. I would assume in the scheme of things, the latter is worse than the former.
And Kim Dotcom points out that they have a protocol to blame hacking on enemy states, which obviously takes the “Russian hacking” conspiracy claims to a whole never level of idiocy.
CIA uses techniques to make cyber attacks look like they originated from enemy state. It turns DNC/Russia hack allegation by CIA into a JOKE
— Kim Dotcom (@KimDotcom) March 7, 2017
Actually, that might be the most important takeaway here. It’s certainly the one that’s the most immediately relevant.
The fact that they could be using this to stop all of these terrorist attacks might be, on some level, an interesting line of thought. Basically, these intelligence agencies have a godlike power. Omniscience. The ability to know everything. So then we have to ask, why does God let bad things happen?
Pretty much, I think this technology is beyond what any human being is capable of managing or doing anything much with. If you gave this ability to an intelligent computer, however, it could do something insane.
When artificial intelligence comes about, it will have access to this technology.
We can only wonder what it will do with it.