It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

Vault 7, Wikileaks releases "Dark Matter"

page: 2
68
<< 1    3  4  5 >>

log in

join
share:

posted on Mar, 23 2017 @ 10:06 AM
link   
a reply to: corblimeyguvnor

Gotta keep up...
Can't let Google have more information and intel than them...




posted on Mar, 23 2017 @ 10:07 AM
link   
Seeing as how 90% of our tech is built overseas, wouldn't that mean collusion with foreign governments?

Just sayin.



posted on Mar, 23 2017 @ 10:12 AM
link   
a reply to: Natas0114




Seeing as how 90% of our tech is built overseas, wouldn't that mean collusion with foreign governments?
Its all the Corporations so no need for low level politicians .

edit on 23-3-2017 by the2ofusr1 because: (no reason given)



posted on Mar, 23 2017 @ 10:18 AM
link   
a reply to: the2ofusr1

I get that, but it's Nsa software or firmware, it's not like they just hand out their top secret Spyware and say "be sure to install this please".
So who actually installs yhis, and in what capacity are they employed, and by whom?



posted on Mar, 23 2017 @ 10:23 AM
link   
They arent spying on you, they are spying on the Russians you are talking to. Thats legal



posted on Mar, 23 2017 @ 10:25 AM
link   
a reply to: Perfectenemy

I don't know why any Mac user would have laughed, because there were indications of Apple cyber tools in the Vault 7 release, too.



posted on Mar, 23 2017 @ 10:26 AM
link   
a reply to: Butterfinger

Half Russian, half German.

So they're spying on me while I talk to myself...
That's not good, I often say crude things..



posted on Mar, 23 2017 @ 10:31 AM
link   

originally posted by: MotherMayEye
a reply to: Perfectenemy

I don't know why any Mac user would have laughed, because there were indications of Apple cyber tools in the Vault 7 release, too.


I assume he was remarking upon the fact that the last Vault 7 release contained information mainly regarding Windows users



posted on Mar, 23 2017 @ 10:36 AM
link   
looks like they're havin problems getting the stream going.



posted on Mar, 23 2017 @ 10:37 AM
link   
a reply to: corblimeyguvnor

Wow, that actually makes sense. They may never need it, but just in case one of us does something, they can look back and be like "we looked into his voice recordings from his smart tv, turns out he was talking about Jihad Jim" etc...

Good analogy you used with the mills and boon



posted on Mar, 23 2017 @ 10:38 AM
link   
What worries me the most is criminals and every kid hacker globally can utilise all this hacks nows.

Dangerous lack of oversight.

No wonder we have all these whistleblowers acting as public oversight!



posted on Mar, 23 2017 @ 10:38 AM
link   
a reply to: Necrose

Thank you for the post, S&F. Like many, I reread Orwell's 1984 and he truly was prophetic, one of his observations that was unimaginable fifty years ago seems to be evolving and will be a crime in the near future unless checked :

"It was terribly dangerous to let your thoughts wander when you were in any public place or within range of a telescreen. The smallest thing could give you away. A nervous tic, an unconscious look of anxiety, a habit of muttering to yourself—anything that carried with it the suggestion of abnormality, of having something to hide. In any case, to wear an improper expression on your face ... was itself a punishable offense. There was even a word for it in Newspeak: facecrime ..."



posted on Mar, 23 2017 @ 10:49 AM
link   

originally posted by: GuidedKill
Bigger question is how has all this access and power wielded by our intelligence community helped keep us protected as Americans? We let our privacy and right to privacy walk right out the door and for what???


That's not the point, it's to keep them protected from us, the little people. They know if the control pyramid is turned upside down, the weight of our numbers will crush them all.

Cheers - Dave



posted on Mar, 23 2017 @ 10:50 AM
link   

originally posted by: Necrose


Today, March 23rd 2017, WikiLeaks releases Vault 7 "Dark Matter", which contains documentation for several CIA projects that infect Apple Mac Computer firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA's Embedded Development Branch (EDB). These documents explain the techniques used by CIA to gain 'persistence' on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware.

Vault 7, Wikileaks releases "Dark Matter"

http://(link tracking not allowed)/2o8CcdZ
(ATS won't allow me to post the link [don't know why?!], but it's official on Wikileaks' website, also reported by RT and other news agencies.)

www.rt.com...


Among others, these documents reveal the "Sonic Screwdriver" project which, as explained by the CIA, is a "mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting" allowing an attacker to boot its attack software for example from a USB stick "even when a firmware password is enabled". The CIA's "Sonic Screwdriver" infector is stored on the modified firmware of an Apple Thunderbolt-to-Ethernet adapter.

"DarkSeaSkies" is "an implant that persists in the EFI firmware of an Apple MacBook Air computer" and consists of "DarkMatter", "SeaPea" and "NightSkies", respectively EFI, kernel-space and user-space implants.

Documents on the "Triton" MacOSX malware, its infector "Dark Mallet" and its EFI-persistent version "DerStake" are also included in this release. While the DerStake1.4 manual released today dates to 2013, other Vault 7 documents show that as of 2016 the CIA continues to rely on and update these systems and is working on the production of DerStarke2.0.

Also included in this release is the manual for the CIA's "NightSkies 1.2" a "beacon/loader/implant tool" for the Apple iPhone. Noteworthy is that NightSkies had reached 1.2 by 2008, and is expressly designed to be physically installed onto factory fresh iPhones. i.e the CIA has been infecting the iPhone supply chain of its targets since at least 2008.

While CIA assets are sometimes used to physically infect systems in the custody of a target it is likely that many CIA physical access attacks have infected the targeted organization's supply chain including by interdicting mail orders and other shipments (opening, infecting, and resending) leaving the United States or otherwise.
------------------------------
I think this one is huge...what do you guys think?


Very interesting information indeed.

Granted the info below is from 2013, but I would imagine this list to be the same today. So the CIA is obviously targeting Apple products because of their massive growing consumer demand in the countries in which they are most popular.



China
This doesn’t come as a surprise considering the fact that China has the largest amount of population in the world. Out of the 1.34 billion people in china, 900 million people are mobile device users. Additionally, several million Chinese own multiple mobile phones. About half of the mobile phone users utilize Apple devices.

India
Just like China, India acquires its position as one of the countries with the highest number of mobile device users due to its large population. There are about 1.2 billion people, 70% of which own mobile phones. Apple devices are largely utilized in India with millions of shipments made to the country each year.

United States
If the United States of America had as much population as China and India, it would undoubtedly have taken the first position in this list. Out of the 310 million people who live in the United States, 96% of them own a mobile device. Apple products are also highly utilized, considering the fact that Apple is headquartered here.

Brazil
Brazil is also one of the countries with the highest number of mobile device users. The Brazilian network is so extensive such that they easily pursue with advancement. Apple devices in particular are highly utilized in Brazil.

Indonesia
This country makes it to the top 5 countries with the highest number of mobile device users. It hosts close to 250 million people, of which own at least one mobile device. Apple is one of the companies whose products are highly adopted in Indonesia.

Russia
With a population of about 143 million people, Russia is the 6th country in the world with the highest number of mobile device users. At least 55% of all Russians own at least one mobile device, and almost 50% of all devices used are from Apple.

Japan
This country has a population that is close to 137 million people. 87% of the Japanese population owns a mobile device. This is another country where shipments of Apple devices account to millions.

Pakistan
Pakistan is actually the 3rd-fastest developing telecommunication country in the world. There are close to 106 million people residing in this country. About 65% of the population in Pakistan utilizes mobile devices.

United Kingdom
About 25% of the residents of the United Kingdom admit to be highly addicted to Smartphones. This is one of the parts of the Globe that has the highest number of Apple device users, including Smartphones, tablets and computers.

Germany
Germany closes the list of the top 10 countries with the highest number of Apple device users. There are over 107 million and 27 million mobile phone and Smartphone users respectively. Just like the citizens of the above mentioned countries, Germans too utilize Apple products in large numbers.


Source

So...quite the interesting list of countries right? I wonder if there will be any doc released showing either collusion with Apple and CIA assets, or if we would ever find any former Apple employees working for the CIA as assets specifically for the purpose of reverse engineering their own code.
edit on 3/23/17 by Vasa Croe because: (no reason given)



posted on Mar, 23 2017 @ 11:19 AM
link   
I'm trying to wrap my mind around how all this bug ware can be in your system and no tech nerds have isolated it yet?

If thats possible, and I am pretty sure that it is. The leak is 'solid', so wheres the code?



posted on Mar, 23 2017 @ 11:19 AM
link   
Wikileaks LIVE right now. Julian Assange explains




posted on Mar, 23 2017 @ 12:17 PM
link   

originally posted by: intrptr

I'm trying to wrap my mind around how all this bug ware can be in your system and no tech nerds have isolated it yet?

If thats possible, and I am pretty sure that it is. The leak is 'solid', so wheres the code?


Yep, it's very strange that after all these years none of this code has been discovered, and people were digging very deep into iOS when designing Jailbreaks for iPhones... hmm

WikiLeaks probably doesn't release the code so it doesn't get into the wrong hands (supposedly
)

edit on 23-3-2017 by Necrose because: (no reason given)



posted on Mar, 23 2017 @ 12:21 PM
link   
I've just assumed all along that our intel agencies have been spying on us since the OSS. Besides launching the MI complex, WWII created the monsters under our beds.

It's almost surreal in nature.



posted on Mar, 23 2017 @ 12:26 PM
link   
a reply to: Restricted

that awkward moment when you realise everything our parents believed was a lie



posted on Mar, 23 2017 @ 12:28 PM
link   

originally posted by: Necrose
a reply to: Restricted

that awkward moment when you realise everything our parents believed was a lie


Yeah, disgusting. I've known for years. Fortunately, my mother has dementia, so she'll never know she was living a delusion.



new topics

top topics



 
68
<< 1    3  4  5 >>

log in

join