CIA





WikiLeaks published CIA Documents - the Guardian: LINK ¤ the GUARDIAN

_________________________________________

 

  • "WikiLeaks published - biggest ever leak - of secret CIA documents !"

 

 

 

 

_________________________________________

  • "the 8,761 documents - focused mainly on techniques - of surveillance !"

 

 

 

 

 

_________________________________________

  • "the CIA was facing fresh embarrassment - after the leak of confidential documents !"

 

 

 

 

 

_________________________________________

  • "detailed tools it had used - broke into phones !"

 

 

 

 

_________________________________________

  • "communication apps - and other electronic devices !"

 

 

 

 

 

_________________________________________

  • "the documents revealed how the CIA - cooperated with GCHQ - engineered a way !"

 

 

 

 

_________________________________________

  • "of smart televisions - into an improvised surveillance devices !"

 

 

 

 

 

_________________________________________

  • "the leak - named "Vault 7" - once again raises many questions - about the methods !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

 

 

_________________________________________

  • "the documents appeared to be - from the CIA’s - "center for cyber intelligence"  !"

 

 

 

 

_________________________________________

  • "and showed in detail - how the agency’s digital specialists - worked !"

 

 

 

 

 

_________________________________________

  • "CIA hackers - had targeted smartphones - and computers !"

 

 

 

 

 

_________________________________________

  • "a programme called "weeping angel" - had described how to attack a TV set !"

 

 

 

 

_________________________________________

  • "so that it appeared to be off - but could still be used for - monitoring !"

 

 

 

 

 

_________________________________________

  • "in a "fake off" mode - the TV operated as a bug - recorded conversations in the room !"

 

 

 

 

_________________________________________

  • "and sent them over the Internet - to a covert CIA server !"

 

 

 

 

 

_________________________________________

  • "the Snowden revelations created tension - between the intelligence agencies !"

 

 

 

 

_________________________________________

  • "and IT companies - where many were upset about the cooperation !"

 

 

 

 

 

_________________________________________

  • "but the agencies - were privately working on ways - to hack into their products !"

 

 

 

 

_________________________________________

  • "the CIA revelations - risk renewing the friction - with the private sector !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

 

 

_________________________________________

  • "the leaks also revealed that CIA hackers - operated out of the Frankfurt consulate !"

 

 

 

 

_________________________________________

  • "were given diplomatic - "black" - passports and state department cover !"

 

 

 

 

 

_________________________________________

  • "the documents included instructions - for incoming CIA hackers - that made Germany’s efforts appear inconsequential !"

 

 

 

 

 

_________________________________________

  • "and the leaks revealed - a number of the CIA’s electronic methods - were designed for physical proximity !"

 

 

 

 

_________________________________________

  • "these attack methods - penetrated high-security networks - that were disconnected from the Internet ! - ( such as police - record databases ! )"

 

 

 

 

 

_________________________________________

  • "the person was provided with a USB stick - contained CIA malware - developed for this purpose !"

 

 

 

 

_________________________________________

  • "which was inserted into the targeted computer - and then extracted data !"

 

 

 

 

 

 

 

 

 

______________________________________________________________________________

CIA Targets - the Guardian: LINK ¤ the GUARDIAN

_________________________________________

 

  • "everyday devices - smartphones - PCs - and TVs !"

 

 

 

 

_________________________________________

  • "the trove of information on - CIA hacking tools - the CIA targets !"

 

 

 

 

 

_________________________________________

  • "raised many questions - for users - and technology companies - alike !"

 

 

 

 

 

_________________________________________

  • "everyday consumer devices included - smartphones running iOS - and Android operating systems !"

 

 

 

 

_________________________________________

  • "Windows - and Mac computers - and even smart TVs - made by manufacturers such as Samsung !

 

 

 

 

 

_________________________________________

  • "the vulnerabilities - described in the published documents - came in many shapes and sizes !"

 

 

 

 

_________________________________________

  • "the release showed that the CIA wanted - the technical capability - hacked devices !"

 

 

 


 

 

 

 

 

______________________________________________________________________________

CIA Tools - WikiLeaks: LINK ¤ WIKILEAKS

_________________________________________

 

  • "the scope and direction - of the CIA's covert hacking programs !"

 

 

 

 

_________________________________________

  • "had for example been dozens of - "zero day" - exploits !"

 

 

 

 

 

_________________________________________

  • "Apple's iPhone - Google's Android - and Microsoft's Windows !"

 

 

 

 

_________________________________________

  • "and even Samsung TVs - which was turned into covert microphones !"

 

 

 

 

 

_________________________________________

  • "the CIA's hacking division - had 5000 registered users !"

 

 

 

 

_________________________________________

  • "and had produced a thousand hacking systems - trojans - and malware !"

 

 

 

 

 

_________________________________________

  • "the CIA had created - its "own NSA"  !"

 

 

 

 

 

_________________________________________

  • "in a statement the source - who makes this leak possible - shares concerns !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

_________________________________________

  • "details policy questions - and an urgently need - to be debated in public !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

 

_________________________________________

  • "including whether the - CIA's hacking capabilities - exceeded its mandated powers ?!"

 

 

 

 

_________________________________________

  • "there is the need for - public oversight !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

 

_________________________________________

  • "the source wishes - to initiate - a public debate !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

_________________________________________

  • "about the security - creation - use - proliferation - and democratic control - of cyber-"tools"  !"

 

 

 

 

 

 

_________________________________________

  • "iPhone - Android - and smart TVs !"

 

 

 

 

_________________________________________

  • "a specialized unit in the CIA's - "mobile development branch" - produced malware !"

 

 

 

 

 

_________________________________________

  • "infested - and exfiltrated data from - iPhones !"

 

 

 

 

_________________________________________

  • "and Apple products running iOS - such as iPads !"

 

 

 

 

 

_________________________________________

  • "a similar unit targeted - Google's "Android" - of smart phones !"

 

 

 

 

 

_________________________________________

  • "the CIA had 24 - Android "zero days"  !"

 

 

 

 

_________________________________________

  • "which it had developed itself - or obtained from NSA - GCHQ - or cyber contractors !"

 

 

 

 

 

 

_________________________________________

  • "Windows - OSx - Linux - and routers !"

 

 

 

 

_________________________________________

  • "the CIA had run efforts - infected and controlled - Microsoft Windows users - with its malware !"

 

 

 

 

 

_________________________________________

  • "this included local and remote - "zero days" - or air gap jumping viruses such as - "Hammer Drill"  !"

 

 

 

 

 

_________________________________________

  • "the CIA had developed multi-platform malware - attacked and controlled systems !"

 

 

 

 

_________________________________________

  • "covered Windows - Mac OS X - Solaris - and Linux !"

 

 

 

 

 

 

_________________________________________

  • "zero days !"

 

 

 

 

_________________________________________

  • "the CIA had been searching for - vulnerabilities - exploits - bugs - or "zero days"  !"

 

 

 

 

 

_________________________________________

  • "in the wake of the Snowden's leaks - the technology companies secured - a commitment !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

_________________________________________

  • "from the US administration - that the executive - would disclose on an ongoing basis !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

 

_________________________________________

  • "serious vulnerabilities - not disclosed to the manufacturers - would place !"

 

 

 

 

_________________________________________

  • "critical infrastructure - at risk ! - ( if the CIA could discover vulnerabilities - so could others ! )"

 

 

 

 

 

_________________________________________

  • "the US government stated - that it would disclose all pervasive vulnerabilities - discovered after 2010 on an ongoing basis !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

_________________________________________

  • "these documents showed - that the CIA breached - these commitments !"

 

 

 

 

 

_________________________________________

  • "the same vulnerabilities existed - for the US Cabinet - Congress !"

 

 

 

 

_________________________________________

  • "CEOs - system administrators - security officers - and engineers !"

 

 

 

 

 

_________________________________________

  • "these security flaws - must not be hided - from manufacturers !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

_________________________________________

  • "( or wished the CIA everyone - "hackable"  ?! )"

 

 

 

 

 

_________________________________________

  • "the CIA usually required - that its implants communicated - with their programs - over the Internet !"

 

 

 

 

_________________________________________

  • "if CIA implants - and software were classified - then CIA officers could be prosecuted !"

 

 

 

 

 

_________________________________________

  • "or dismissed - for violating rules - that prohibit placing classified information - onto the Internet !"

 

 

 

 

_________________________________________

  • "consequently the CIA - had secretly made many of its cyber spying code - unclassified !"

 

 

 

 

 

_________________________________________

  • "no one had copyright - due to restrictions in the constitution !"

 

 

 

 

_________________________________________

  • "this meant that cyber manufactures - and computer hackers - could freely "pirate" them !"

 

 

 

 

 

 

_________________________________________

  • "fine dining !"

 

 

 

 

_________________________________________

  • "this was a standardized questionnaire - a menu that CIA case officers - filled out !"

 

 

 

 

 

_________________________________________

  • "the questionnaire allowed the OSB - operational support branch - identified !"

 

 

 

 

_________________________________________

  • "how to adapt existing tools for the operation - and communicate this to CIA configuration staff !"

 

 

 

 

 

_________________________________________

  • "among the list of possible targets - of the collection could be !"

 

 

 

 

_________________________________________

  • ""asset" - "liason asset"  !"

 

 

 

 

 

_________________________________________

  • ""system administrator" - "foreign information operations"  !"

 

 

 

 

_________________________________________

  • ""foreign intelligence agencies" - and "foreign government entities"  !"

 

 

 

 

 

_________________________________________

  • "notably absent was any reference to - "extremists" - or "transnational criminals"  !"

 

 

 

 


 

 

 

 

 

 

 

 

 

______________________________________________________________________________

CIA - Wikipedia EN: LINK ¤ CIA

______________________________________________________________________________


______________________________________________________________________________



CIA-Werkzeuge - der Standard:
LINK ¤ der STANDARD

_________________________________________

 

  • "die CIA hatte eine große Zahl an - Cyber-Werkzeugen - und Spionagesoftware entwickelt !"

 

 

_________________________________________

  • "Wikileaks hat Dokumente - unter dem Titel "Vault 7" - enthüllt !"

 

 

 

_________________________________________

  • "offenbar arbeitete die CIA - an Ausspähmethoden über elektronische Geräte !"

 

 

_________________________________________

  • "beispielsweise ein Fernseher - um das Ziel via Mikrofon und Webcam - zu überwachen !"

 

 

 

_________________________________________

  • "Windows - iPhones - und Android-Geräte !"

 

 

 

_________________________________________

  • "der CIA-Werkzeugkasten hatte eine Vielzahl - noch nicht aufgedeckter Lücken - umfasst !"

 

 

_________________________________________

  • "sogenannte "Zero Day" Exploits - Trojaner - und Malware !"

 

 

 

_________________________________________

  • "in dem Konvolut fanden sich auch Programme - mit denen Server- und Desktopbetriebssysteme !"

 

 

_________________________________________

  • "sowie Router - gehackt werden sollten !"

 

 

 

_________________________________________

  • "ein Ordner trug den vielsagenden Namen - "NSA Tools"  !"

 

 

 

_________________________________________

  • "die Dokumente enthüllten außerdem - dass CIA-Hacker im US-Konsulat in Frankfurt - aktiv waren !"

 

 

_________________________________________

  • "die Quelle gibt als Grund - für die Informationsweitergabe an !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

_________________________________________

  • "eine Debatte über Datenschutz - und Cybersicherheit - zu entfachen !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 


 

 

 

 

 

______________________________________________________________________________

CIA-Werkzeuge - der Standard: LINK ¤ der STANDARD

_________________________________________

 

  • "iPhones - Android - und TV !"

 

 

_________________________________________

  • "ein spannender Bereich im Datenmaterial betraf - Apples Betriebssystem für iPhones - und iPads - iOS !"

 

 

 

_________________________________________

  • "die CIA hatte Exploits - aus Drittquellen zugekauft !"

 

 

 

_________________________________________

  • "dieses war lange vermutet worden - der Leak hat nun die Bestätigung geboten !"

 

 

_________________________________________

  • "Sicherheitsexperten üben seit Jahren - schwere Kritik an solchen Methoden !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

_________________________________________

  • "( da Dritte dieselbe Lücke - entdecken - und ausnutzen könnten ! )"

 

 

 

_________________________________________

  • "so fand sich etwa einer für Apples Betriebssystem - iOS 9.2 - in der Liste !"

 

 

_________________________________________

  • "der offenbar nur wenige Tage nach der Veröffentlichung - dieser Betriebssystemversion aufgenommen worden war !"

 

 

 

_________________________________________

  • "auch bei Android - waren eine Fülle von Werkzeugen - aufgelistet !"

 

 

_________________________________________

  • "die Dokumente boten einen tiefen Einblick - in Ziele - und Methoden - der CIA !"

 

 

 

 

 

 

 

______________________________________________________________________________

CIA - Wikipedia DE: LINK ¤ CIA
______________________________________________________________________________





cia - 14397CIA
designed by Free CSS Templates | powerd by pluck | hosted by akis