It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

Vault 7, Wikileaks releases "Dark Matter"

page: 1
68
<<   2  3  4 >>

log in

join
share:
+27 more 
posted on Mar, 23 2017 @ 09:21 AM
link   


Today, March 23rd 2017, WikiLeaks releases Vault 7 "Dark Matter", which contains documentation for several CIA projects that infect Apple Mac Computer firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA's Embedded Development Branch (EDB). These documents explain the techniques used by CIA to gain 'persistence' on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware.

Vault 7, Wikileaks releases "Dark Matter"

http://(link tracking not allowed)/2o8CcdZ
(ATS won't allow me to post the link [don't know why?!], but it's official on Wikileaks' website, also reported by RT and other news agencies.)

www.rt.com...


Among others, these documents reveal the "Sonic Screwdriver" project which, as explained by the CIA, is a "mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting" allowing an attacker to boot its attack software for example from a USB stick "even when a firmware password is enabled". The CIA's "Sonic Screwdriver" infector is stored on the modified firmware of an Apple Thunderbolt-to-Ethernet adapter.

"DarkSeaSkies" is "an implant that persists in the EFI firmware of an Apple MacBook Air computer" and consists of "DarkMatter", "SeaPea" and "NightSkies", respectively EFI, kernel-space and user-space implants.

Documents on the "Triton" MacOSX malware, its infector "Dark Mallet" and its EFI-persistent version "DerStake" are also included in this release. While the DerStake1.4 manual released today dates to 2013, other Vault 7 documents show that as of 2016 the CIA continues to rely on and update these systems and is working on the production of DerStarke2.0.

Also included in this release is the manual for the CIA's "NightSkies 1.2" a "beacon/loader/implant tool" for the Apple iPhone. Noteworthy is that NightSkies had reached 1.2 by 2008, and is expressly designed to be physically installed onto factory fresh iPhones. i.e the CIA has been infecting the iPhone supply chain of its targets since at least 2008.

While CIA assets are sometimes used to physically infect systems in the custody of a target it is likely that many CIA physical access attacks have infected the targeted organization's supply chain including by interdicting mail orders and other shipments (opening, infecting, and resending) leaving the United States or otherwise.
------------------------------
I think this one is huge...what do you guys think?
edit on 23-3-2017 by Necrose because: (no reason given)

edit on Thu Mar 23 2017 by DontTreadOnMe because: Mod Note: wikileaks links blocked



posted on Mar, 23 2017 @ 09:26 AM
link   
Gentleman its about time, I was starting to become worried.

Buck


+7 more 
posted on Mar, 23 2017 @ 09:27 AM
link   
What kind of world do we live in now where we are constantly being spied on. Look to me, I could care less but it's still the point. In the last year I've really started to see the big picture of who the US of A and their shadow gov't really is. They are pure evil and nothing but bad intentions. But why?


+20 more 
posted on Mar, 23 2017 @ 09:36 AM
link   
You have 12,700,000 armed patriotic American citizens. (Who are slightly pissed)
And that gentlemen, scares the hell out of them.

Buck



posted on Mar, 23 2017 @ 09:36 AM
link   
MacBook powering down. So long.


+11 more 
posted on Mar, 23 2017 @ 09:36 AM
link   
Bigger question is how has all this access and power wielded by our intelligence community helped keep us protected as Americans? We let our privacy and right to privacy walk right out the door and for what???



posted on Mar, 23 2017 @ 09:37 AM
link   

But why?


Because information is power, the more you have the more you know the more you don't have to second guess anytithing. Oh, and because they CAN.

Back when i was a little one we had things called Libraries, all the information you could possibly want was there. I never went the the Mills and Boon section as i wasn't interested, however, it was there if i wanted too.

Now its all digital and the storage of digital media is cheap, why not collect the information even if you ain't going to use it? its there if you want to use it like Mills and Boon.

Not condoning it, it just is what it is in this day and age



posted on Mar, 23 2017 @ 09:38 AM
link   
Dude the CIA probably has anti-gravity and time travel technology by now



posted on Mar, 23 2017 @ 09:39 AM
link   
Well, sh*t




posted on Mar, 23 2017 @ 09:41 AM
link   
a reply to: Necrose

Bad news for Mac users, like me.




posted on Mar, 23 2017 @ 09:41 AM
link   

originally posted by: MotherMayEye
a reply to: Necrose

Bad news for Mac users, like me.


Me too bruv, me too

edit on 23-3-2017 by Necrose because: (no reason given)


+11 more 
posted on Mar, 23 2017 @ 09:46 AM
link   
Pretty scary stuff.
If they can do all of that, I'm sure they could plant evidence and/or show fake data trails to fit a narrative or set up scape goats.
There is no privacy anymore.
No truth, no privacy... terrible times nowadays.


+5 more 
posted on Mar, 23 2017 @ 09:49 AM
link   

originally posted by: o0oTOPCATo0o
Pretty scary stuff.
If they can do all of that,I'm sure they could plant evidence and/or show fake data trails to fit a narrative or set up scape goats.
There is no privacy anymore.
No truth, no privacy... terrible times nowadays.


I feel like at some point I'm going to abandoned all tech, and head for the hills and live off the land. Primitive style.



posted on Mar, 23 2017 @ 09:50 AM
link   
a reply to: Necrose

or is Wikileaks all "part of the plan"

I'm still wondering this. Could it be a PSYOP to rile people up and see which disgruntled citizens are a "threat" to the larger agenda??


+10 more 
posted on Mar, 23 2017 @ 09:50 AM
link   

originally posted by: o0oTOPCATo0o
Pretty scary stuff.
If they can do all of that, I'm sure they could plant evidence and/or show fake data trails to fit a narrative or set up scape goats.
There is no privacy anymore.
No truth, no privacy... terrible times nowadays.

Yep.
If they want you in jail, they can make you guilty of having child pornography... in a heartbeat.



posted on Mar, 23 2017 @ 09:53 AM
link   
This does not surprise me considering the list of electronic devices known to have surveillance technology built in from the factory. Televisions, stereos, dvd players, game consoles, now smart refrigerators, microwaves, cable boxes, phones, laptops, pc's, etc. I doubt there is a major electronic device manufactured in the last five years that doesn't have some kind of monitoring technology built in.

This is something I thought about a long time ago but never mentioned publicly. I might as well now since it is probably already happening. Any speaker including ear buds can be a microphone. All you have to do is plug it in to the mic jack. Or, if wired internally, just switch it remotely from speaker to mic any time you want. Got five speakers in that sound bar aimed right at you? Are you sure one of them isn't listening instead of talking?
edit on 23-3-2017 by Vroomfondel because: (no reason given)



posted on Mar, 23 2017 @ 09:58 AM
link   

originally posted by: FamCore
a reply to: Necrose

or is Wikileaks all "part of the plan"

I'm still wondering this. Could it be a PSYOP to rile people up and see which disgruntled citizens are a "threat" to the larger agenda??


I guess we will never know, and once we do, and the answer is "yes", then it's probably too late.
edit:// actually, it's too late to do anything already

edit on 23-3-2017 by Necrose because: (no reason given)



posted on Mar, 23 2017 @ 10:01 AM
link   
a reply to: Vroomfondel




This is something I thought about a long time ago but never mentioned publicly. I might as well now since it is probably already happening. Any speaker including ear buds can be a microphone. All you have to do is plug it in to the mic port. Or, if wired internally, just switch it remotely from speaker to mic any time you want. Got five speakers in that sound bar aimed right at you? Are you sure one of them isn't listening instead of talking?
I was thinking that if you have a digital screne that a portion of it could be digitally configured into a camera or a mic .
edit on 23-3-2017 by the2ofusr1 because: (no reason given)



posted on Mar, 23 2017 @ 10:03 AM
link   
Remember this little gem?



It’s common to check up on tracking information when you’re waiting on a package, but at least occasionally, that tracking data is omitting a quick stop off at the NSA. According to a new report in Der Spiegel, the NSA regularly intercepts shipments of laptops and other electronic devices in order to implant physical listening devices and install advanced malware. This process, called interdiction, can give authorities instant remote access to a subject’s computer without them being any the wiser.

The NSA regularly intercepts laptop shipments to implant malware, report says


Interdiction is undertaken by the NSA’s superhacker team known at Tailored Access Operations (TAO). It is not impossible to deliver malware to a target computer after the fact, but the risk is far lower if the surveillance tools can be installed before a device reaches the buyer. TAO is reportedly able to divert a package to its network of secret workshops where the modifications can be made before returning the packages to the shipping company.

Documents Reveal Top NSA Hacking Unit

Since this would end up drawing attention if done on a mass scale, they had to figure out how to do it remotely. The sad part is, this has been happening for a long time. And of course, sometimes a little help in needed.

Sam-stung and Micro-steal to the rescue!!



The NSA has what Der Spiegel describes as a catalog of spy tools with pricing and feature details. The 50-page document lists tools to compromise hardened systems made by the likes of Cisco, Juniper Networks, Huawei, Western Digital, Microsoft, and Samsung. The prices for these attacks, maintained by an internal group known as ANT, can reach as high as $250,000. Although, when it comes to secret NSA software vulnerabilities, you get what you pay for.

And this, more relevant than ever...


When the NSA is unable to get its hands on a device as it is being shipped, it will sometimes attempt to gain physical access with the help of the CIA and FBI. Agents from the NSA are occasionally ferried around on FBI jets to plant wiretaps, which may only take a few minutes. With the work done, the agent will hop another FBI plane and vanish like a specter in the night.

Your friends and peers lie, corporations lie, politicians lie, intelligence officials lie. We are surrounded by invisible walls that serve as the current boundaries of humanity. It's time we began to knock them down. Hopefully, Trump is that wrecking ball.



edit on 23-3-2017 by eisegesis because: (no reason given)



posted on Mar, 23 2017 @ 10:05 AM
link   
This surprised me not one bit however i recall alot of mac users who laughed about the last vault 7 release. Well who is laughing now. Seriously though why does a fridge need Wi-Fi for example? Technology should be used to benefit the world and make it a better place but instead we are spied on by everyday household items. The sad part is like the first batch of info. This is going to be widly ignored and the majority will just shrug this off again. Being on social media and signaling virtue against Trump and Russia are far more important. This is just sad. Orwell was right all along i wonder if he could have been a time traveller and tried to warn us of things to come but we didn't listen.
edit on 23-3-2017 by Perfectenemy because: (no reason given)




top topics



 
68
<<   2  3  4 >>

log in

join