MAKES ONE ALMOST WANT TO GO BACK TO A ROTARY DIAL LAND LINE OR BETTER YET, TELEGRAPH AND A PHILCO BLACK & WHITE TV WITH RABBIT EARS ANTENNA…
In the wake of the latest Wikileaks dump, several of the tech firms whose products have been allegedly compromised by the CIA have given their first reactions to the claims. Companies like Apple looked quell worries from their users by issuing a statement to TechCrunch designed to alleviate concerns that the company’s products might still be vulnerable to a laundry list of CIA exploits. In short, Apple maintains that many of the iOS vulnerabilities the CIA previously relied upon have already been patched.
Apple’s statement was the most detailed, saying it had already addressed some of the vulnerabilities.
“The technology built into today’s iPhone represents the best data security available to consumers, and we’re constantly working to keep it that way,” it said.
“Our products and software are designed to quickly get security updates into the hands of our customers, with nearly 80% of users running the latest version of our operating system.
“While our initial analysis indicates that many of the issues leaked today were already patched in the latest iOS, we will continue work to rapidly address any identified vulnerabilities.
“We always urge customers to download the latest iOS to make sure they have the most recent security update.”
Samsung – whose F8000 series of televisions was reportedly compromised via a USB connection-based hack co-developed with the UK’s MI5 agency – was briefer.
“Protecting consumers’ privacy and the security of our devices is a top priority at Samsung,” it said.
“We are aware of the report in question and are urgently looking into the matter.”
The leaks also claimed that the CIA had created malware to target PCs running Microsoft’s Windows operating system.
“We are aware of the report and are looking into it,” a spokesman from Microsoft said.
Google declined to comment about allegations that the CIA was able to “penetrate, infest and control” Android phones due to its discovery and acquisition of “zero day” bugs – previously unknown flaws in the operating system’s code.
Likewise, the Linux Foundation has yet to publicly react to claims the agency had created “attack and control systems” that could hijack computers powered by Linux-based software.
The World Wide Web Foundation – which campaigns for internet privacy – said the US government needed to issue a detailed response.
WikiLeaks Publishes ‘Biggest Ever Leak of Secret CIA Documents’ & Exposes CIA Hacking Processes Through Smartphones & TV’s
AND WE ARE SUPPOSED TO BE WORRIED ABOUT THE RUSSIANS?
Yesterday Wikileaks unloaded the the biggest ever leak of CIA secret documents and detailed the tools it uses to break into phones, communication apps and other electronic devices. WikiLeaks named the leak the “Vault 7”. The leak is not only that of secret CIA documents but also how CIA hackers target smart phones, computers and Samsung F8000 TV’s.
Just how much information does the CIA have a regular, normal citizens who have never committed a crime and have never been charged with anything? Who is to say that info is not going to be used against a private citizen for political purposes? We still do have a US Constitution in this country, right?
The US intelligence agencies are facing fresh embarrassment after WikiLeaks published what it described as the biggest ever leak of confidential documents from the CIA detailing the tools it uses to break into phones, communication apps and other electronic devices.
The thousands of leaked documents focus mainly on techniques for hacking and reveal how the CIA cooperated with British intelligence to engineer a way to compromise smart televisions and turn them into improvised surveillance devices.
The leak, named “Vault 7” by WikiLeaks, will once again raise questions about the inability of US spy agencies to protect secret documents in the digital age. It follows disclosures about Afghanistan and Iraq by army intelligence analyst Chelsea Manning in 2010 and about the National Security Agency and Britain’s GCHQ by Edward Snowden in 2013.
The new documents appear to be from the CIA’s 200-strong Center for Cyber Intelligence and show in detail how the agency’s digital specialists engage in hacking. Monday’s leak of about 9,000 secret files, which WikiLeaks said was only the first tranche of documents it had obtained, were all relatively recent, running from 2013 to 2016.
The revelations in the documents include:
- CIA hackers targeted smartphones and computers.
- The Center for Cyber Intelligence, based at the CIA headquarters in Langley, Virginia, has a second covert base in the US consulate in Frankfurt which covers Europe, the Middle East and Africa.
- A programme called Weeping Angel describes how to attack a Samsung F8000 TV set so that it appears to be off but can still be used for monitoring.
CIA malware targets iPhone, Android, smart TVs
CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA’s DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details).
The EDG is responsible for the development, testing and operational support of all backdoors, exploits, malicious payloads, trojans, viruses and any other kind of malware used by the CIA in its covert operations world-wide.
The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell’s 1984, but “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.
The attack against Samsung smart TVs was developed in cooperation with the United Kingdom’s MI5/BTSS. After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.
As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.
Charles Krauthammer on the Hypocrisy Over the Bradly/Chelsea Manning Commutation vs. Wikileaks Hacked Emails (VIDEO)
The hypocrisy of Barack Obama and the LEFT that they would consider the Wikileaks embarrassing, hacked emails of Team Hillary damning and the reason why she lost a presidential election, while Manning’s release of documents and information of America’s actions in on going wars in Iraq and Afghanistan, including the identities of individuals who were working for us, many of whom are probably now dead as they were hunted down and killed as nothing and only worth a slap on the wrist.
People’s lives were put at risk, but Obama trumped national security issues vs. an individual with a gender issue.
Barack Obama Looked to Reduce Manning Sentence He Viewed as ‘Nuts’ as Common Sense Americans See Obama and Manning’s Actions as Damage to America
ON HIS WAY OUT THE DOOR, OBAMA PROVES TO ALL THAT HE IS THE DIVIDER IN CHIEF AND OUT OF TOUCH WITH MAINSTREAM AMERICA …
In what can only be described as the perfect metaphor to personify the Barack Obama presidency, Obama and his minions looked upon the 35 year sentence handed down to Bradly/Chelsea Manning as “nuts,” while others that like to refer to as those that live on this place I call Earth, looked upon the crimes that Manning committed as an extreme danger to the United States. Barack Obama and those in his ear would have us believe that Manning has already served enough time as the lame duck president commuted Manning’s sentence by 80% from 35 years to 7. Obama’s own Defense Secretary Ashton B. Carter recommended against commutation, but Obama did it anyhow. Why? What would possess a President of the United States of America who took an oath of office to preserve, protect and defend the Constitution of the United States, to do such a thing knowing the damage that Bradly Manning did? Maybe, just maybe we are seeing the real Obama and his agenda in his last days and his legacy of not only failure but intended damage and division to America.
The key question for the president was how much time Manning should serve. He and his advisers looked at other government leak cases, which indicated that 35 years was the longest sentence ever imposed for a leak conviction. By the time the second request came in, Manning had served six years, much of that time subjected to harsh treatment and solitary confinement.
In his decision to commute Manning’s sentence, made public this week, Obama knew he would face criticism, the person close to the president said, speaking on the condition of anonymity to discuss internal deliberations. “But he felt strongly it was the right thing to do.”
Most people think Barack Obama is nuts and much worse for commuting a sentence of an individual that committed an act of treason against the United States. Andrew McCarthy at National Review provides the basis of the damage caused not only by Bradly Manning, but Barack Obama as well. Obama’s actions are breathtaking when one considers that in a different time and generation, Manning’s actions would have been cause for the death penalty. But as Instapundit opines, “look at the way Obama treats America’s friends and compare it to the way he treats America’s enemies, and it’s obvious that Obama’s interests and America’s only rarely coincide.”
- First, it is also disgraceful for the New York Times to report without balance that “Prosecutors … presented no evidence that anyone was killed because of [Manning’s] leaks.” As the Times well knows, in cases involving classified information, the government frequently cannot reveal – let alone prosecute – the damage done.
- Second, there is a logical way to deduce the damage caused. I laid it out in a column about Hillary Clinton’s reckless mishandling of our nation’s secrets:
- Third, the degree to which Obama has wielded executive power in favor of America’s enemies and against his own political opponents and scapegoats is breathtaking. The treasonous Manning gets an 80 percent shave off his sentence. Now we learn Oscar Lopez-Rivera, an unrepentant FALN terrorist convicted of waging war against the United States, has also had his sentence commuted.
ASSANGE CLAIMS RUSSIANS NOT THE SOURCE OF WIKILEAKS PODESTA HACKED EMAILS …
In an exclusive interview with FOX News Channel’s Sean Hannity, the founder of WikiLeaks Julian Assange said that Russia was not the source for the DNC and John Podesta hacked emails. Barack Obama and Democrats have blamed Russia for interfering in US elections with the hacks. Or is it that Democrats are looking to shift blame from themselves and Hillary Clinton’s embarrassing 2016 presidential election loss to Donald Trump? The WikiLeaks founder said that the Obama administration trying to ‘delegitimize’ Trump and his electoral landslide victory.
“They’re trying to delegitimize the Trump administration as it goes into the White House,” Assange said during an interview with Fox News’s Sean Hannity airing Tuesday night, according to a transcript of excerpts from the network.
“They are trying to say that President-elect Trump is not a legitimate president,” Assange said during the interview, which was conducted at the Ecuadorian embassy in London where he has been staying.
HANNITY: Can you say to the American people, unequivocally, that you did not get this information about the DNC, John Podesta’s emails, can you tell the American people 1,000 percent that you did not get it from Russia or anybody associated with Russia?
JULIAN ASSANGE: Yes. We can say, we have said, repeatedly that over the last two months that our source is not the Russian government and it is not a state party.
ASSANGE: Our publications had wide uptake by the American people, they’re all true. But that’s not the allegation that’s being presented by the Obama White House. So, why such a dramatic response? Well, the reason is obvious. They’re trying to delegitimize the Trump administration as it goes into the White House. They are trying to say that President-elect Trump is not a legitimate President…
ASSANGE: Our source is not a state party, so the answer for our interactions is no. But if we look at our most recent statement from the US government, which is on the 29th of December, OK, we had five different branches of government, Treasury, DHS, FBI, White House presenting their accusations to underpin Obama’s throwing out 29 Russian diplomats. What was missing from all of those statements? The word WikiLeaks. It’s very strange.