Trump set up? The CIA’s UMBRAGE group can stage RUSSIAN hacking

FISA warrant could have been obtained through staged hacking

(INTELLIHUB) — Among the startling revelations coming out through the Wikileaks “Vault 7” release is the shocking fact that the CIA has the ability to “misdirect attribution” of a hack, effectively making it look as if a country such as Russian was the culprit when in reality it was forces within the Central Intelligence Agency itself.

According to the Wikileaks documents, a group within the CIA’s Remote Devices Branch, code-named UMBRAGE, collects and maintains a massive library of attack techniques stolen from other countries, including the Russian Federation.

“With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from,” reads the Wikileaks release. “UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.” Continue reading

CIA used Frankfurt consulate to spy on Europeans

Protest against US dragnet surveillance tactics revealed by Edward Snowden (Photo: Valentina Pop)

 

The US intelligence agency, the CIA, has used the American consulate in Frankfurt as a covert base to carry out digital spy operations, Wikileaks revealed on Tuesday (7 March).

The Center for Cyber Intelligence Europe, based in the German city, was the base for CIA hackers covering Europe, the Middle East, and Africa, Wikileaks said. The information is based on documents from the agency’s internal discussion forum.

The leaked documents included a guide for CIA hackers on how to prepare for their trip to Germany. Continue reading

Files released by WikiLeaks show advanced CIA collection methods

As we all know by now:

 

Thousands of documents belonging to the United States Central Intelligence Agency, which were released on Tuesday by the international anti-secrecy website WikiLeaks, are almost certainly genuine. They reveal an entire universe of technical intelligence collection methods used by the CIA to extract information from digital applications and electronic devices, ranging from flash drives to smart screen televisions. WikiLeaks named the collection Vault 7, and said that it consists of nearly 8,000 web pages and 1,000 attachments. It also said that its editors redacted hundreds of pages of computer code, in order to prevent the public release of advanced cyberweapons that are allegedly used by the CIA to sabotage electronic devices and systems. Continue reading

Wikileaks Releases Encrypted “Vault 7” Torrent, Will Unveil Password Tuesday 9am

Last month, following a series of seemingly random tweets by Wikileaks, we reported that starting on February 4th, each day Wikileaks began sending out a series of cryptic question Tweets teasing the world about “Vault 7”. The questions were framed in Who, What, When, Where, Why, and How format (but not in that order). Each came with an image “clue”.

Here they are in chronological order starting with the earliest. Continue reading