Tuesday, May 21, 2019

1008 IMF approves $4.2bn loan for Ecuador; Assange arrested for revealing CIA Vault 7 tools to hack computers & phones

IMF approves $4.2bn loan for Ecuador; Assange arrested for revealing CIA
Vault 7 tools to hack computers & phones

Newsletter published on April 14, 2019

(1) Assange exposed US war crime in Baghdad
(2) WikiLeaks released video of Apache helicopter slaying of civilians
in Baghdad
(3) Assange is accused of conspiracy with Manning over video of US
soldiers War Crime
(4) IMF approves $4.2bn loan for Ecuador - in return for kicking Assange
out of London embassy
(5) Assange arrested for revealing CIA Vault 7 tools to hack computers &
phones
(6) CIA Vault 7 Whistleblower Joshua Schulte passed info to Assange
(7) CIA Vault 7 hacking tools

(1) Assange exposed US war crime in Baghdad

https://worldbeyondwar.org/10-reasons-assange-should-walk-free/

10 Reasons Assange Should Walk Free

By David Swanson | Apr 12, 2019

10 Reasons Assange Should Walk Free

Exposing war crimes is not a crime, and other reasons why Julian Assange
should be freed.

1. Governments’ (monstrous and criminal) behavior should not be secret.
People should know what their government is doing, and what a powerful
foreign government is doing to their own countries. The actual results
of the work of WikiLeaks have been hugely beneficial.

2. If U.S. courts were to get busy prosecuting the crimes exposed by
WikiLeaks, rather than trying to turn the act of revealing them into
some sort of crime, they would simply not have time for the latter.

3. Prosecutions should not be arbitrary political choices. A Justice
Department wrongly under the thumb of Obama decided against prosecuting
Assange. A Justice Department wrongly under the thumb of Trump decided
to prosecute, based on exactly the same information but different
politics. When Trump was celebrating WikiLeaks three years ago it was
for acts of journalism he is not prosecuting; instead he is prosecuting
just the journalism that he opposes.

4. The choice to prosecute these particular acts is driven by the
military industrial complex, but also by Russiagate. The U.S. media and
top politicians have long sought to depict Julian Assange as something
other than a journalist on the fictional grounds that he is in the
employ of or collaborating with an enemy government. If Assange had
exposed the peccadilloes of the peace movement, or if he had not figured
in the Russiagate myth, he would be free. They’d let him be. Breathing
air like you and me.

5. Nobody on either side of the debate right now has knowledge of or is
focused on the details of the allegation that Assange did something
unjournalistic by attempting unsuccessfully to hack into a computer in
order to protect a source. This trial by media is no more about that
than the Monica Lewinsky scandal was about lying under oath. And the
trial by jury is likely to resemble the trial by media, if previous
trials, such as Jeffrey Sterling’s, in the Virginia court of choice for
patriotic railroaders are any guide.

6. The details of that unjournalistic allegation are likely very weak,
because the indictment throws in various other allegations that are
purely journalistic: encouraging a source, protecting a source. To an
ignorant, all-white, militarized-community jury impressed by important
national figures saying the word "conspiracy" a lot, these other
allegations will loom large.

7. If the United States charges Assange with violating horribly
anti-democratic U.S. secrecy laws, and denounces him on TV as a
"traitor," despite Assange not being a U.S. citizen, other countries may
begin to find the nerve to charge U.S. journalists with violating their
secrecy laws. The next Washington Post reporter hacked to death by Saudi
Arabia may get a trial first.

8. If Assange is brought to the United States and not convicted, or is
convicted and serves out a sentence, one can expect the U.S. government,
legally or otherwise, to further prosecute or simply imprison him
indefinitely. In the propaganda that surrounds this drama it is not a
legal proceeding, but a war. If Trump gets away with the numerous crimes
and outrages he has thus far gotten away with, he or his successor will
have little difficulty devising a way to further "protect" us from Assange.

9. If Assange is prosecuted, many U.S. journalists will deliver a
self-inflicted blow to their institution dwarfing what the U.S.
government delivers. They will declare it fit and proper for a single
head of a secretive government to sadistically punish disapproved of
journalists. They will pledge their loyalty not to truth or public
knowledge, but to the Empire.

10. This. https://collateralmurder.wikileaks.org

(2) WikiLeaks released video of Apache helicopter slaying of civilians
in Baghdad

https://collateralmurder.wikileaks.org

{watch the videos of the killing, at above link or
https://youtu.be/5rXPrfnU3G0 }

5th April 2010 10:44 EST

WikiLeaks has released a classified US military video depicting the
indiscriminate slaying of over a dozen people in the Iraqi suburb of New
Baghdad -- including two Reuters news staff.

Reuters has been trying to obtain the video through the Freedom of
Information Act, without success since the time of the attack. The
video, shot from an Apache helicopter gun-sight, clearly shows the
unprovoked slaying of a wounded Reuters employee and his rescuers. Two
young children involved in the rescue were also seriously wounded.

The military did not reveal how the Reuters staff were killed, and
stated that they did not know how the children were injured.

After demands by Reuters, the incident was investigated and the U.S.
military concluded that the actions of the soldiers were in accordance
with the law of armed conflict and its own "Rules of Engagement".

Consequently, WikiLeaks has released the classified Rules of Engagement
for 2006, 2007 and 2008, revealing these rules before, during, and after
the killings.

WikiLeaks has released both the original 38 minutes video and a shorter
version with an initial analysis. Subtitles have been added to both
versions from the radio transmissions.

WikiLeaks obtained this video as well as supporting documents from a
number of military whistleblowers. WikiLeaks goes to great lengths to
verify the authenticity of the information it receives. We have analyzed
the information about this incident from a variety of source material.
We have spoken to witnesses and journalists directly involved in the
incident.

WikiLeaks wants to ensure that all the leaked information it receives
gets the attention it deserves. In this particular case, some of the
people killed were journalists that were simply doing their jobs:
putting their lives at risk in order to report on war. Iraq is a very
dangerous place for journalists: from 2003- 2009, 139 journalists were
killed while doing their work.

(3) Assange is accused of conspiracy with Manning over video of US
soldiers War Crime

https://www.paulcraigroberts.org/2019/04/11/the-age-of-injustice/

The Age of Injustice

By Paul Craig Roberts | Apr 12, 2019

Julian Assange’s conviction will make it impossible for media to report
leaked information that is unfavorable to the government.

[...] Assange is accused of being in a conspiracy with Manning to obtain
and publicize secret government data, such as the film, which was
already known to a Washington Post reporter who failed his newspaper and
his profession by remaining silent, of U.S. soldiers committing
extraordinary war crimes without remorse. As a U.S. soldier, it was
actually Manning’s duty to report the crimes and the failure of U.S.
troops to disobey unlawful orders. Manning was supposed to report the
crimes to his superiors, not to the public, but he knew the military had
already covered up the massacre of journalists and civilians and did not
want another My Lai-type event on its hands.

I don’t believe the charge against Assange. If Wikileaks cracked the
code for Manning, Wikileaks did not need Manning.

The alleged Grand Jury that allegedly produced the indictment was
conducted in secret over many years as Washington searched for something
that might be pinned on Assange. If there actually was a grand jury, the
jurors were devoid of integrity, but how do we know there was a grand
jury? Why should we believe anything Washington says after "Saddam
Hussein’s weapons of mass destruction," "Assad’s use of chemical weapons
against his own people," "Iranian nukes," "Russian invasion of Ukraine,"
"Russiagate," and on and on ad infinitum. Why believe Washington is
telling the truth this time?

As the grand jury was secret because of "national security," will the
trial also be secret and the evidence secret? Is what we have here a
Star Chamber proceeding in which a person is indicted in secret and
convicted in secret on secret evidence? This is the procedure used by
tyrannical governments who have no case against the person they intend
to destroy.

The governments in Washington, London, and Quito are so shameless that
they do not mind demonstrating to the entire world their lawlessness and
lack of integrity. [...]

Roberts: As soon as corrections are made to Wikipedia, they are erased
and the smears reinstalled.

https://www.paulcraigroberts.org/2019/04/11/the-problem-with-wikipedia-and-the-digital-revolution/

The Problem with Wikipedia and the Digital Revolution

By Paul Craig Roberts | Apr 12, 2019

In The Matrix in which we live, truth-tellers are unwelcome to those who
control the explanations in order to advance their agendas.

On April 10, 2019, a reader alerted me to the fact that I am being
smeared on Wikipedia as a "vocal supporter of the current Russian
government and its policies." The reader also reports that an article in
the Daily Beast calls me a "Putin worshiper." The reader says that he
tried to edit the Wikipedia entry without success, and he urged me to
give it my attention.

I do not know whether the person who wrote my Wikipedia entry intended
to smear me or is merely uninformed. However, dissenting voices do get
smeared on Wikipedia. It is an ongoing problem for many of us. For years
readers and people who know me would make corrections to my Wikipedia
biography, but as soon as the corrections were made, they would be
erased and the smears reinstalled. [...]

(4) IMF approves $4.2bn loan for Ecuador - in return for kicking Assange
out of London embassy

https://www.enca.com/business/imf-approves-42bn-loan-ecuador

IMF approves $4.2bn loan for Ecuador

Tuesday 12 March 2019 - 11:05am

AFP

WASHINGTON - The International Monetary Fund on Monday approved a
$4.2-billion, three-year loan for Ecuador, part of a broader aid package
to help support the government's economic reform program.

The Washington-based lender agreed to the terms of the financing late
last month, and the final approval of the IMF board on Monday releases
the first installment of $652-million.

IMF Managing Director Christine Lagarde said the aid will support the
government's efforts to shore up its finances, including a wage
"realignment," gradual lowering of fuel subsidies, and reduction of
public debt.

"The savings generated by these measures will allow for an increase in
social assistance spending over the course of the program," Lagarde said
in a statement, stressing that "Protecting the poor and most vulnerable
segments in society is a key objective" of the program.

Quito is expected to receive another $6-billion from the Development
Bank of Latin America, the Inter-American Development Bank, the World
Bank and the Latin American Reserve Fund.

WATCH: IMF's Lagarde says state capture inquiry good for SA

"The Ecuadoran authorities are implementing a comprehensive reform
program aimed at modernizing the economy and paving the way for strong,
sustained, and equitable growth," Lagarde said.

IMF performs periodic reviews of its loans to ensure governments are
following through on its policy pledge and then releases funds in
installments.

(5) Assange arrested for revealing CIA Vault 7 tools to hack computers &
phones


CIA Vault 7 can make its hacks them look "Russian" or "Iranian" by
inserting foreign language strings into their  source code

https://www.moonofalabama.org/2019/04/assange-vault-7.html#more

April 13, 2019

CIA's Vault 7 Files Launched New Case Against Assange - Attack Intends
To Prevent Further Leaks

After the arrest of Julian Assange by British police and the unsealing
of the U.S. indictment against him, the question is why is the U.S.
doing this and why now?

The indictment alleges that Assange 'conspired' with Chelsea Manning by
giving support to her attempt to find a password to an account that
would have allowed her to conceal her pilfering of U.S. documents. Glenn
Greenwald argues that the case is quite thin and clearly an attack on
press freedom. That a reporter or editor has to help a source to conceal
its identity is part of the job description.

The Obama administration, not known for reluctance to go after
whistleblowers, had already weighted the 'conspired' case and decided
against prosecuting it.

It is thus likely that the case, as unsealed now, is only a pretext to
extradite Assange from Britain. The real case will only get unsealed if
and when Assange is in U.S. custody.

National security reporter William Arkin, who left NBC News over its
warmongering, is likely right when he writes that the issue behind this
is Wikileaks' publishing of the CIA's hacking tools known as Vault 7.

While the publishing of the Vault 7 files received little coverage in
the media, it seriously damaged to the CIA's capabilities. Arkin wrote
on April 11 about the Vault 7 connection. The Guardian and the Daily
Beast were offered the piece but declined to publish it:

The American case, which shifted completely in March 2017, is based up
WikiLeaks’ publications of the so-called "Vault 7" documents, an
extensive set of cyber espionage secrets of the Central Intelligence
Agency. Vault 7 was little noticed in the emerging Russian collusion
scandal of the new Trump administration, but the nearly 10,000 CIA
documents that WikiLeaks started publishing that March constituted an
unprecedented breach, far more potentially damaging than anything the
anti-secrecy website had ever done, according to numerous U.S. officials.

"There have been serious compromises – Manning and Snowden included –
but until 2017, no one had laid a glove on the Agency in decades," says
a senior intelligence official who has been directly involved in the
damage assessments.

"Then came Vault 7, almost the entire archive of the CIA’s own hacking
group," the official says. "The CIA went ballistic at the breach." The
official is referring to a little known CIA organization called the
Center for Cyber Intelligence, a then unknown counterpart to the
National Security Agency, and one that conducts and oversees the covert
hacking efforts of the U.S. government.

Wikileaks acquired the Vault 7 files in late 2016 or early 2017. In
January 2017 a lawyer for Julian Assange tried to make a deal with the
U.S. government. Assange would refrain from publishing some critical
content of the Vault 7 files in exchange for limited immunity and safe
passage to talk with U.S. officials. One issue to be talked about was
the sourcing of the DNC files which Wikileaks published. U.S. officials
in the anti-Trump camp claimed that Russia had hacked the DNC servers.
Assange consistently said that Russia was not the source of the
published files. He offered technical evidence to prove that.

On March 23 2017 Wikileaks published some Vault 7 files of minor interest.

The Justice Department wanted a deal and made on offer to Assange. But
intervention from then FBI director Comey sabotaged it:

Multiple sources tell me the FBI’s counterintelligence team was aware
and engaged in the Justice Department’s strategy but could not explain
what motivated Comey to send a different message around the negotiations ...

With the deal seemingly in jeopardy Wikileaks publish the CIA's Vault 7
files of "Marble Framework" and "Grasshopper". These CIA tools
systematically changed its sniffing tools to make them look "Russian" or
"Iranian" by inserting foreign language strings into their source code.
The publication proved that the attribution of the DNC pilfering and
other "hacks" to Russia was nonsense. The publishing of these files
ended all negotiations:

On April 7, 2017, Assange released documents with the specifics of some
of the CIA malware used for cyber attacks. It had immediate impact: A
furious U.S. government backed out of the negotiations, and then-CIA
Director Mike Pompeo slammed WikiLeaks as a "hostile intelligence service."

The alleged leaker of the Vault 7 files, one Joshua Schulte, is in U.S.
custody but still has not had his day in court. It is likely that the
U.S. wants to offer him a deal should he agree to testify against Assange.

In another piece Arkin expands on his first take by setting the case
into a wider context:

[C]oming on the heels of massive leaks by Edward Snowden and a group
called the Shadow Brokers just months earlier, and given the notoriety
WikiLeaks had earned, Vault 7 was the straw that broke the governmental
back. Not only was it an unprecedented penetration of the CIA, an
organization that had evaded any breach of this type since the 1970’s,
but it showed that all of the efforts of the U.S. government after
Chelsea Manning and Edward Snowden had failed to either deter or catch
"millennial leakers."

The targeting of Assange is not only for revenge, though revenge is
surely part of the motive. The wider aim is to shut down on leaking:

The thinking of government officials – current and former – that I’ve
talked to is that shutting down WikiLeaks once and for all – or at least
separating it from the mainstream media to make it less attractive as a
recipient of U.S. government secrets, will at least be one step towards
greater internal security.

Assange will first be sentenced in Britain for jumping bail. He will be
convicted to some six month of jail. Only after that time will the legal
fight about the extradition to the States begin. It may take up to three
years.

Assange's greatest hope to escape an extradition is a change of
government in Britain:

Jeremy Corbyn @jeremycorbyn - 19:34 utc - 11 Apr 2019 The extradition of
Julian Assange to the US for exposing evidence of atrocities in Iraq and
Afghanistan should be opposed by the British government.

The time it will take for the extradition case to move through British
and EU courts is likely long enough for Labour to win a general
election. With Jeremy Corbyn in charge Assange would likely be safe. It
is one more reason for the transatlantic establishment to prevent a
Corbyn win by all means available to it.

Posted by b on April 13, 2019 at 02:19 PM

(6) CIA Vault 7 Whistleblower Joshua Schulte passed info to Assange

https://sputniknews.com/us/201811011069405779-CIA-Vault-7-New-Charges/

CIA Vault 7 Whistleblower Hit With New Leaking Charges

04:03 01.11.2018 (updated 04:30 01.11.2018)

On Wednesday, federal prosecutors filed a rewritten indictment against
the 30-year-old man said to be behind the largest leak of classified
information in the history of the Central Intelligence Agency - Joshua
Schulte, who allegedly gave WikiLeaks founder Julian Assange the
material for the "Vault 7" releases.

The news comes just hours after a letter from Schulte to the judge
presiding over his case pleading for something to be done about the
conditions he faces in pre-trial detention. Between being cut off from
access to legal counsel and shoved into the "box" at a notorious prison
for unspecified reasons, Schulte described the conditions as
"unconstitutional."

Schulte was arrested in August 2017 after allegedly leaking more than
8,000 CIA documents to WikiLeaks, which were published in March of that
year. Initially, Schulte was not charged for anything related to that
matter, but for child pornography.

It wasn't until June of 2018 that a 13-count superseding indictment was
issued against him, alleging theft of classified national defense
information.

One of the most renowned whistleblowers in CIA history, John Kiriakou,
said Schulte may face a difficult road back to good graces in the public
eye. Kiriakou is a 15-year CIA veteran who blew the whistle on the
agency's unconstitutional "enhanced interrogation" program, also known
as torture. He also hosts a show on Radio Sputnik called Loud & Clear.

"I believe that the Justice Department learned a lesson during the Obama
administration whereby whistleblowers had great public sympathy once
they were charged," Kiriakou told Sputnik News.

"That sympathy often lead to acquittals, such as in the case of NSA's
Thomas Drake, or short sentences, like in my case. What the Justice
Department has done to mitigate that is too frequently add child
pornography charges to new cases. We saw this in the case of Matthew
DeHart and now in the case of the Vault 7 whistleblower. In the DeHart
case, the judge acknowledged that there was no evidence of child
pornography. None," he said.

"I would not be surprised if the same thing happened in Vault 7,"
Kiriakou noted.

So why is the government so interested in getting Schulte? Former CIA
analyst Ray McGovern told Sputnik News that it's all about the subject
of the leak. "Julian Assange called it a ‘bigger revelation' than all
the stuff that came from Ed Snowden," McGovern said.

"The tool that they call Marble Framework," McGovern said, "destroys
this story about Russian hacking."

"What happened there was really significant, because that Marble
Framework, by the CIA's own admission, enabled this CIA division to hack
into computers or servers, disguise who hacked in, leave tell-tale signs
like cyrillic," McGovern said, noting that 13 days after the revelation,
Mike Pompeo "as head of the CIA, gets up and says, ‘You know, this
WikiLeaks fellow Julian Assange is a demon,' and not only that, but he's
‘running a non-state hostile intelligence agency.'"

An alternative theory to the Democratic National Committee (DNC) hack
coming from the CIA, pushed by the CIA-funded cybersecurity firm
FireEye's spokesperson, is that the Russians "wanted experts and
policymakers to know that Russia is behind it." FireEye is one of the
few organizations to forensically analyze the DNC servers.

Hours after a letter written by Schulte to the judge presiding over his
case was revealed online, prosecutors issued a new indictment against
him. The government accused him of continuing to leak classified
information in jail. Prosecutors say he passed off national defense secrets.

Schulte's letter to Judge Paul Crotty reads, in part:

"I am writing to you because I have been unable to contact my attorney,
review my discovery, or even assist on my case in any capacity for the
entire month of October. This is outrageous and clearly unconstitutional."

"On Monday, October 1, I was called down for a legal visit. When I
arrived, I was told I was going to the ‘box' for an indeterminate amount
of time while they investigated me for something they refused to tell
me. So I was handcuffed in prison and led away in chairs to the
notoriously inhumane torture chamber that is MCC's 9 South."

"My fellow slaves constantly scream, pound and claw at their cages
attempting to get attention for basic needs fulfilled. I've witnessed
men dragged from their cages and beaten and maced. An officer even
uncuffed an inmate and told him to fight away from the cameras. Abuse
runs rampant."

"This is true cruel and unusual punishment. If you would disagree then I
beg you come and witness for yourself what the UN Human Rights Board has
condemned and denounced as detestable, inhumane and un-American: the
s**t-filled showers where you leave dirtier than you entered; the flood
of the tiers and cages with ice-cold water; the constant blast of cold
air as we are exposed to extreme cold without blankets or long-sleeve
shirts; the uncontrollable lights that are always on as we are sleep
deprived."

"I was strip searched and my cell was raided early in the morning on my
birthday. Coincidence? Or birthday gift from the government?"

"How is it I should be subjected to this? Terrorists receive better
treatment in Guantanamo Bay, Cuba — I have seen the footage myself."

"I beg you Judge Crotty to read the first search warrant affidavit and
the government's Brady letter; the FBI outright lied in that affidavit
and now acknowledges roughly half of those lies."

Kevin Gosztola, a journalist who focuses on prisons and whistleblowers,
told Sputnik News he has heard of inmate abuse at the Metropolitan
Correctional Center (MCC), where Schulte is detained, though not at
South 9, the unit he is in. "I'm aware that there's another part of the
facility called 10 South that's been described when people share their
stories of solitary confinement. His letter describes very vividly what
is going on, and there's probably very little reason to believe that he
is making this up."

"We know that it's harsh. We know that the New York Times, for example,
has profiled this and even described this facility as something
comparable to Guantanamo Bay in its harshness," Gosztola said.

"Part of restricting people like this is intent upon ensuring that they
do not talk about what they saw while they were in the CIA, that they
don't share other classified information that they might know, other
sensitive details about what was going on in government," Gosztola said.

"This isolation is to prevent him from talking."

According to a former special monitor on torture and punishment at the
United Nations, the brutal conditions of solitary confinement at the "10
South" unit at the facility are a "punitive measure that is unworthy of
the United States as a civilized democracy." Schulte is at 9 South.

"If they had the goods on him, why wait 15 months? They're gonna try to
find someone to pin it on just to say that you can't do this thing,"
McGovern said.

"Am I saying that the FBI will lie? Yes."

"It seems clear that Schulte had extra reasons for them to rough him up…
and to subject him to cruel and inhumane punishment. Habeas corpus has
gone out the window; he's been held for over a year, and they won't tell
him what charges they really want to bring against him," McGovern said.
"They doubtless have these special compartments for people who are
accused of things like Schulte."

"I think that there's there's an element of the system that truly
pressures you into situations where you want to take a plea agreement
and not go to trial," Gosztola told Sputnik News. "And so, I think with
Schulte, he's got the case that involves WikiLeaks, he's got the case
involving what he allegedly leaked, but then he's also got these other
charges that stem from what agents say they found on his computer. He
faces a child pornography charge; he faces other offenses. And this kind
of pressure is, you know, 'We don't want you to go to court and
challenge us.'"

McGovern was arrested years ago at an event held by former General David
Petraeus. He was taken to central booking at One Police Plaza in New
York City, a hold facility colloquially known as "The Tombs," which is
at the same compound as the Metropolitan Correctional Center.

"It is a horrid place," McGovern said of central booking. "You're
treated like dirt. I can't say I was singled out for extra lousy
treatment because it was a very egalitarian treatment we got. It was awful."

"You can't lay down" because of the seating McGovern said, and "there
are roaches and stuff."

"I hadn't even been arraigned," McGovern said, "in comparison to
Schulte, all I can confirm is this is one hell hole."

You don't end up in 9 South or 10 South by accident, Gosztola said. "His
[Schulte's] case is something that has been given broad publicity by
media. And so the Bureau of Prisons marks your case. We know that in
other cases when you've had leakers or whistleblowers, your case is
marked because they know you have broad publicity. The case of John
Kiriakou was marked because he was receiving broad publicity. The case
of Reality Winner was marked, and now that she was moved to where she
will be in prison in Texas, they know that she received broad publicity
for her case."

"This is what happened — and seems to be happening increasingly. We saw
this with Reality Winner being in a pretrial detention in a county jail
in Georgia for over a year when other leakers had been allowed to be
free," Gosztola said. "And so now in this case, there's something about
Josh that the government has decided is dangerous to them, or they want
us to believe he's dangerous, so they have kept him in a cell, and now,
as he's describing, these are horrid conditions."

CIA Vault 7 uses cyberattack techniques & malware produced by other
hackers; disguising these attacks as the work of other groups and nations

(7) CIA Vault 7 hacking tools

https://en.wikipedia.org/wiki/Vault_7

Vault 7 is a series of documents that WikiLeaks began to publish on 7
March 2017, that detail activities and capabilities of the United States
Central Intelligence Agency to perform electronic surveillance and cyber
warfare. The files, dated from 2013–2016, include details on the
agency's software capabilities, such as the ability to compromise cars,
smart TVs,[1] web browsers (including Google Chrome, Microsoft Edge,
Mozilla Firefox, and Opera Software ASA),[2][3][4] and the operating
systems of most smartphones (including Apple's iOS and Google's
Android), as well as other operating systems such as Microsoft Windows,
macOS, and Linux.[5][citation needed]

... Part 1 - "Year Zero"

The first batch of documents named "Year Zero" was published by
WikiLeaks on 7 March 2017, consisting of 7,818 web pages with 943
attachments, purportedly from the Center for Cyber Intelligence,[12]
which already contains more pages than former NSA contractor and leaker,
Edward Snowden's NSA release.[13]

... Part 5 - "HIVE"

On 14 April 2017 WikiLeaks published Vault 7 part 5, titled "HIVE".
Based on the CIA top-secret virus program created by its "Embedded
Development Branch" (EDB). The six documents published by WikiLeaks are
related to the HIVE multi-platform CIA malware suite. A CIA back-end
infrastructure with a public-facing HTTPS interface used by CIA to
transfer information from target desktop computers and smartphones to
the CIA, and open those devices to receive further commands from CIA
operators to execute specific tasks. Also called Listening Post (LP),
and Command and Control (C2). All of the above while hiding its presence
behind unsuspicious-looking public domains. This masking interface is
known as "Switchblade".[28]

Part 6 - "Weeping Angel"

On 21 April 2017 WikiLeaks published Vault 7 part 6, code-named "Weeping
Angel". Which is a hacking tool co-developed by the CIA and MI5. Used to
exploit a series of smart TVs for the purpose of covert intelligence
gathering. Once installed in suitable televisions with a USB stick, the
hacking tool enables those televisions' built-in microphones and
possibly video cameras to record their surroundings, while the
televisions falsely appear to be turned off. The recorded data is then
either stored locally into the television's memory or sent over the
internet to the CIA. Allegedly both the CIA and MI5 agencies
collaborated to develop that malware and coordinated their work in Joint
Development Workshops.[29][30][31]

Part 7 - "Scribbles"

On 28 April 2017 WikiLeaks published Vault 7 part 7 "Scribbles". The
leak includes documentation and source code of a tool intended to track
documents leaked to whistleblowers and journalists by embedding web
beacon tags into classified documents to trace who leaked them.[34][35]
The tool affects Microsoft Office documents, specifically "Microsoft
Office 2013 (on Windows 8.1 x64), documents from Office versions 97-2016
(Office 95 documents will not work!) [and d]ocuments that are not
[locked], encrypted, or password-protected".[36] When a CIA watermarked
document is opened, an invisible image within the document that is
hosted on the agency's server is loaded, generating a HTTP request. The
request is then logged on the server, giving the intelligence agency
information about who is opening it and where it is being opened.
However, if a watermarked document is opened in an alternative word
processor the image may be visible to the viewer. ...

Marble framework

The documents describe the Marble framework, a string obfuscator used to
hide text fragments in malware from visual inspection. As part of the
program, foreign languages were used to cover up the source of CIA
hacks.[76][77][78] According to WikiLeaks, it reached 1.0 in 2015 and
was used by the CIA throughout 2016.[79]

In its release, WikiLeaks described the primary purpose of "Marble" as
to insert foreign language text into the malware to mask viruses,
trojans and hacking attacks, making it more difficult for them to be
tracked to the CIA and to cause forensic investigators to falsely
attribute code to the wrong nation.[80] The source code revealed that
Marble had examples in Chinese, Russian, Korean, Arabic and Persian.[81]
These were the languages of the US's main cyber-adversaries – China,
Russia, North Korea, and Iran.[82] ...

Frankfurt base

The first portion of the documents made public on 7 March 2017, Vault 7
"Year Zero", revealed that a top secret CIA unit used the German city of
Frankfurt as the starting point for hacking attacks on Europe, China and
the Middle East. According to the documents, the U.S. government uses
its Consulate General Office in Frankfurt as a hacker base for cyber
operations. WikiLeaks documents reveal the Frankfurt hackers, part of
the Center for Cyber Intelligence Europe (CCIE), were given cover
identities and diplomatic passports to obfuscate customs officers to
gain entry to Germany.[60][67] ...

UMBRAGE

The documents reportedly revealed that the agency had amassed a large
collection of cyberattack techniques and malware produced by other
hackers. This library was reportedly maintained by the CIA's Remote
Devices Branch's UMBRAGE group, with examples of using these techniques
and source code contained in the "Umbrage Component Library" git
repository. According to WikiLeaks, by recycling the techniques of
third-parties through UMBRAGE, the CIA can not only increase its total
number of attacks,[70] but can also mislead forensic investigators by
disguising these attacks as the work of other groups and nations.[1][60] ...

Apple products

After WikiLeaks released the first installment of Vault 7, "Year Zero",
Apple stated that "many of the issues leaked today were already patched
in the latest iOS," and that the company "will continue work to rapidly
address any identified vulnerabilities."[88]

On 23 March 2017, WikiLeaks released "Dark Matter", the second batch of
documents in its Vault 7 series, detailing the hacking techniques and
tools all focusing Apple products developed by the Embedded Development
Branch (EDB) of the CIA. The leak also revealed the CIA had been
targeting the iPhone since 2008, a year after the device was released.
These EDB projects attacked Apple's firmware meaning that the attack
code would persist even if the system gets rebooted.[89][90] The "Dark
Matter" archive included documents from 2009 and 2013. Apple issued a
second statement assuring, that based on an "initial analysis, the
alleged iPhone vulnerability affected iPhone 3G only and was fixed in
2009 when iPhone 3GS was released." Additionally, a preliminary
assessment showed "the alleged Mac vulnerabilities were previously fixed
in all Macs launched after 2013".[91][92]

On 24 March 2017 WikiLeaks described Apple as "duplicitous" for saying
it had fixed security flaws: "Apple's claim that it has "fixed" all
"vulnerabilities" described in DARKMATTER is duplicitous. EFI is a
systemic problem, not a zero-day". Echoing the lack of trust in Apple
was the German-Finnish Internet entrepreneur Kim Dotcom, who wrote:
"Apple statement is not credible."[93]

Cisco

WikiLeaks said on 19 March 2017 on Twitter that the "CIA was secretly
exploiting" a vulnerability in a huge range of Cisco router models
discovered thanks to the Vault 7 documents.[94][95] The CIA had learned
more than a year ago how to exploit flaws in Cisco's widely used
internet switches, which direct electronic traffic, to enable
eavesdropping. Cisco quickly reassigned staff from other projects to
turn their focus solely on analyzing the attack and to figure out how
the CIA hacking worked, so they could help customers patch their systems
and prevent criminal hackers or spies from using similar methods.[96]

On 20 March, Cisco researchers confirmed that their study of the Vault 7
documents showed the CIA had developed malware which could exploit a
flaw found in 318 of Cisco's switch models and alter or take control of
the network.[97]

Cisco issued a warning on security risks, patches were not available,
but Cisco provided mitigation advice.[95]

Smartphones/tablets

The electronic tools can reportedly compromise both Apple's iOS and
Google's Android operating systems. By adding malware to the Android
operating system, the tools could gain access to secure communications
made on a device.[98]

Messaging services

According to WikiLeaks, once an Android smartphone is penetrated the
agency can collect "audio and message traffic before encryption is
applied".[1] Some of the agency's software is reportedly able to gain
access to messages sent by instant messaging services.[1] This method of
accessing messages differs from obtaining access by decrypting an
already encrypted message.[98] While the encryption of messengers that
offer end-to-end encryption, such as Telegram, WhatsApp and Signal,
wasn't reported to be cracked, their encryption can be bypassed by
capturing input before their encryption is applied, by methods such as
keylogging and recording the touch input from the user.[98]
Commentators, among them Snowden and cryptographer and security pundit
Bruce Schneier, observed that Wikileaks incorrectly implied that the
messaging apps themselves, and their underlying encryption, had been
compromised - an implication which was in turn reported for a period by
the New York Times and other mainstream outlets.[99][1]

Vehicle control systems

One document reportedly showed that the CIA was researching ways to
infect vehicle control systems. WikiLeaks stated, "The purpose of such
control is not specified, but it would permit the CIA to engage in
nearly undetectable assassinations."[100][60] This statement brought
renewed attention to conspiracy theories surrounding the death of
Michael Hastings.[101][100]

Windows

The documents refer to a "Windows FAX DLL injection" exploit in Windows
XP, Windows Vista and Windows 7 operating systems.[12] This would allow
a user with malicious intents to hide its own malware under the DLL of
another application. However, a computer must have already been
compromised through another method for the injection to take place.[102]

Commentary

On 7 March 2017, Edward Snowden comments on the importance of the
release, stating that it reveals the United States Government to be
"developing vulnerabilities in US products" and "then intentionally
keeping the holes open", which he considers highly reckless.[103] ...

This page was last edited on 24 March 2019, at 07:45 (UTC).

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.