It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

WikiLeaks releases Vault 7!

page: 9
124
<< 6  7  8    10  11  12 >>

log in

join
share:

posted on Mar, 7 2017 @ 10:20 AM
link   
Help me out here.

I am taking the 'Year Zero' thing as meaning that 2017 is Year Zero..... meaning when the 'thing' goes down (happens). Whatever the 'thing' might be.

Is that right?




posted on Mar, 7 2017 @ 10:22 AM
link   
a reply to: RickinVa


Among the key topical revelations is that the CIA can engage in "false flag" cyberattacks which portray Russia as the assailant. Discussing the CIA's Remote Devices Branch's UMBRAGE group, Wikileaks' source notes that it "collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation.Wikileaks' source notes that it "collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation.


So this release has only told us that the CIA "can" engage in false flag cyber attacks and they maintain a library of "attack techniques"?

They "can", but did they offer proof that they actually did engage in those attacks? Also, it does not seem unreasonable that they would catalog those techniques.



posted on Mar, 7 2017 @ 10:24 AM
link   

originally posted by: introvert
a reply to: RickinVa


Among the key topical revelations is that the CIA can engage in "false flag" cyberattacks which portray Russia as the assailant. Discussing the CIA's Remote Devices Branch's UMBRAGE group, Wikileaks' source notes that it "collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation.Wikileaks' source notes that it "collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation.


So this release has only told us that the CIA "can" engage in false flag cyber attacks and they maintain a library of "attack techniques"?

They "can", but did they offer proof that they actually did engage in those attacks? Also, it does not seem unreasonable that they would catalog those techniques.

I suppose this is where you have to decide how much to trust that the CIA has everyone's best interests at heart.



posted on Mar, 7 2017 @ 10:25 AM
link   
a reply.
edit on 7-3-2017 by PRSpinster because: (no reason given)

edit on 7-3-2017 by PRSpinster because: (no reason given)



posted on Mar, 7 2017 @ 10:27 AM
link   
a reply to: PRSpinster




Trump isn't just anti-establishment, he's also the destroyer. He will usher in year zero.

Anti-American.. Enjoy it while you have it bc your days are numbered. Give it or we'll take it. Whatever.


What exactly are you implying by these comments? I'm curious.



posted on Mar, 7 2017 @ 10:29 AM
link   
a reply to: butcherguy

I got that impression too as in this when it drops will reset everything. on a side note has there been any clue as to how many parts there are to vault 7?



posted on Mar, 7 2017 @ 10:38 AM
link   
a reply to: FamCore

It's the March surprise.
Government doesn't do things randomly, Fam. If it's done, it has been discussed at length. Take the art sculpture at CIA. Whomever commissioned it, purposely placed it in the heart of the intelligence community. There are reasons for it. It isn't just by blind luck that it ended up at CIA. I'm not generally an alarmist and I do have a fondness for WL but this is very bad.



posted on Mar, 7 2017 @ 10:38 AM
link   
Now I'm wondering what brand of phone, TV, etc. are in the Oval office and elsewhere throughout the White House. Did you guys read how Samsung is used as a listening device?


The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell's 1984, but "Weeping Angel", developed by the CIA's Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.

The attack against Samsung smart TVs was developed in cooperation with the United Kingdom's MI5/BTSS. After infestation, Weeping Angel places the target TV in a 'Fake-Off' mode, so that the owner falsely believes the TV is off when it is on. In 'Fake-Off' mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.

As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.

www.zerohedge.com...
edit on 7-3-2017 by queenofswords because: (no reason given)



posted on Mar, 7 2017 @ 10:39 AM
link   
22 mins and counting i have the file going to be one of the first people to read through it and post about it on ats


Omg eastern time its been hours lol noooooooooooooooooo damn it
edit on 7-3-2017 by digital01anarchy because: (no reason given)



posted on Mar, 7 2017 @ 10:39 AM
link   
a reply to: PRSpinster

The art sculpture on page 1 of OP? What's the meaning behind it? Sorry there are 9 pages I've probably missed some important details



posted on Mar, 7 2017 @ 10:40 AM
link   
a reply to: Grambler


In other words, the CIA has the ability to hack someone and make it look like the Russians did it.

What if all of this talk of Russia hacking the DNC was actually just the CIA framing Russia. Clearly they have the tech for it.

This could be huge.


It's possible that the CIA (or another agency) hacked the DNC and framed Russia but is it likely? Nothing (from this release anyway) adds any evidence to advance that particular hypothesis. I scanned through UMBRAGE component library index and I didn't see anything matching what was recovered from the DNC hacks (there were two by all accounts) or for that matter, associated with Cozy Bear/Fancy Bear.

I might have missed something but I also didn't see anything in the text/notes about using the malware captured in the wild for misdirection of attribution.

There might be something else coming down the pipe but it seems to me at least that if WL had anything that pointed to the CIA being behind the hacks, they'd have led with that and it would be getting a LOT of hype.

This just seems like leading commentary by WL to foster an idea that it's possible.
edit on 2017-3-7 by theantediluvian because: (no reason given)



posted on Mar, 7 2017 @ 10:44 AM
link   
a reply to: queenofswords

I read Samsung smart tv's that have a microphone for Skyping. And as for mobiles: both iOS and Android phones have been compromised.



posted on Mar, 7 2017 @ 10:45 AM
link   

originally posted by: butcherguy

originally posted by: introvert
a reply to: RickinVa


Among the key topical revelations is that the CIA can engage in "false flag" cyberattacks which portray Russia as the assailant. Discussing the CIA's Remote Devices Branch's UMBRAGE group, Wikileaks' source notes that it "collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation.Wikileaks' source notes that it "collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation.


So this release has only told us that the CIA "can" engage in false flag cyber attacks and they maintain a library of "attack techniques"?

They "can", but did they offer proof that they actually did engage in those attacks? Also, it does not seem unreasonable that they would catalog those techniques.

I suppose this is where you have to decide how much to trust that the CIA has everyone's best interests at heart.


True.

What's important here is that this does not contain proof.

Until such proof is provided, this is not even close to being a smoking gun.



posted on Mar, 7 2017 @ 10:45 AM
link   


One day during a Passover, Union soldier Myer Levy of Philadelphia was walking through a captured Virginia town, when he saw a boy sitting on the steps of his house and eating matza. When Levy asked for some, the boy leaped up and ran into the house shouting, “Mother, there’s a damn-Yankee Jew outside!” The boy’s mother came out and invited Levy to return that evening for a Passover meal.


Jerusalem Post
April 4, 2013


Buck



posted on Mar, 7 2017 @ 10:46 AM
link   
a reply to: PRSpinster

Info on the "Lingua" sculpture:




Lingua is composed of two 16' tall cylinders, with text cut with a water jet cutter in Russian, Mandarin Chinese, Ethiopian, French, Spanish, Latin, Greek, and Iroquois.[1] The texts are historical texts from as far back as 1400 BC.[2] The Russian-language section is a quote from Leo Tolstoy's War and Peace (Volume 3, Part 1, beginning of chapter XXII).


en.wikipedia.org...(sculpture)



Meanwhile, the Russian army is split between three generals, there’s no one commander in chief, and no one is making any preparations for war. While Emperor Alexander is in Poland there’s a ball in his honor.

On the same day Napoleon is crossing the Niemen River, Alexander is partying with his generals in a palace in the city of Vilno.

Helene is there.

Boris is also there, without his wife. Now that he’s rich, he’s not quite so obvious a striver, but he still keeps his eyes on the emperor the whole time he’s in sight.

Suddenly, Alexander is called away by some urgent message.

Boris figures out a way to sneak out into the garden after them and overhears the news about Napoleon advancing with his army.

Alexander is angry and takes it personally.

He writes a sarcastic and angry letter to Napoleon, basically calling him out for being a jerk and not letting diplomacy work. Alexander adds that now there can’t be peace until every single armed Frenchman is out of Russia.




The "summary" for Leo Tolstoy's War & Peace, Vol. 3 Pt 1:

www.shmoop.com...

I wonder what the significance of that is...


+1 more 
posted on Mar, 7 2017 @ 10:46 AM
link   
It’s 08:45 here on the West Coast of the U.S. and I’m just waking up, so I haven’t had the chance to go through this thread or read much of the ”Vault 7” release yet.

However, one thing that got my jaw to drop when I read it was the purported ability of the CIA to electronically hijack cars along with a reference to Michael Hastings.

Nothing about that accident and death ever made sense to me. Now I find it supremely disturbing on its face that Hastings died in an inexplicable car crash while he was investigating CIA director, John Brennan.

Hasting's last published work appeared on Buzz Feed and was entitled, “Why Democrats Love to Spy on Americans”.

18 days before his death Hastings tweeted: “[F]irst they came for manning. Then Assange. Then fox. Then the ap.drake and the other whistle-blowers. Any nyt reporters too.”

Days before his death friends said he was agitated and paranoid because he had stumbled onto “something big” in course of his investigation.

Hastings was killed in a fiery car crash that former counter-terrorism czar, Richard Clarke, said was “consistent” with a “car cyber-attack”. He made this statement during an interview with Inside Edition.

The more one looks into the Hastings matter, the more one comes away feeling uneasy about his end. I try not to let myself go down too many rabbit holes, but sometimes there’s a hole with a rabbit in it after all…

edit on 7-3-2017 by SBMcG because: Obama is going to SuperMax.

edit on 7-3-2017 by SBMcG because: The Deep State IS the Alt-Left.



posted on Mar, 7 2017 @ 10:47 AM
link   

originally posted by: theantediluvian
a reply to: Grambler


In other words, the CIA has the ability to hack someone and make it look like the Russians did it.

What if all of this talk of Russia hacking the DNC was actually just the CIA framing Russia. Clearly they have the tech for it.

This could be huge.


It's possible that the CIA (or another agency) hacked the DNC and framed Russia but is it likely? Nothing (from this release anyway) adds any evidence to advance that particular hypothesis. I scanned through UMBRAGE component library index and I didn't see anything matching what was recovered from the DNC hacks (there were two by all accounts) or for that matter, associated with Cozy Bear/Fancy Bear.

I might have missed something but I also didn't see anything in the text/notes about using the malware captured in the wild for misdirection of attribution.

There might be something else coming down the pipe but it seems to me at least that if WL had anything that pointed to the CIA being behind the hacks, they'd have led with that and it would be getting a LOT of hype.

This just seems like leading commentary by WL to foster an idea that it's possible.


Oh I agree, I havent read anything that proves that is what happened. But it appears the CIA has the technology to do that.

Perhaps more will be released, or maybe not. But knowing the CIA can frame people for hacks adds another level of disturbance to their secretive spying.



posted on Mar, 7 2017 @ 10:50 AM
link   

originally posted by: introvert

originally posted by: butcherguy

originally posted by: introvert
a reply to: RickinVa


Among the key topical revelations is that the CIA can engage in "false flag" cyberattacks which portray Russia as the assailant. Discussing the CIA's Remote Devices Branch's UMBRAGE group, Wikileaks' source notes that it "collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation.Wikileaks' source notes that it "collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation.


So this release has only told us that the CIA "can" engage in false flag cyber attacks and they maintain a library of "attack techniques"?

They "can", but did they offer proof that they actually did engage in those attacks? Also, it does not seem unreasonable that they would catalog those techniques.

I suppose this is where you have to decide how much to trust that the CIA has everyone's best interests at heart.


True.

What's important here is that this does not contain proof.

Until such proof is provided, this is not even close to being a smoking gun.


So knowing that the CIA can a hack a system and make it appear it was a foreign government..... are you still convinced that the Russians hacked the election? Especially knowing that many in the intel community were highly upset about Hillary's use of an unclassified server to transmit and receive classified information?



posted on Mar, 7 2017 @ 10:51 AM
link   
I've noticed most major news organizations are reporting the WL release.... Except CNN



posted on Mar, 7 2017 @ 10:55 AM
link   
a reply to: butcherguy

Before the info was out I was wondering about year zero. My theory was that it could have something to do with 'zero day'. As in zero day vulnerability. This is a term used for vulnerabilities that have been exploited before the company has noticed it. I believe it is called zero day because when finding out they have 0 days to patch the software because they are already too late. But I am not sure if I remember correctly. Will look it up later.
This combined with the fact that the image was hidden, that the image is of a work of art placed in the CIA with a purpose for its employees to decipher (or hack) the message. Yes it doesn't surprise me that it turns out the file contains information about hacks involving the CIA.
I could be wrong though.




top topics



 
124
<< 6  7  8    10  11  12 >>

log in

join