It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
originally posted by: Rosinitiate
originally posted by: interupt42
a reply to: Rosinitiate
If the dump is only in regards to how the gov't spies on its citizens with no limits than meh.
Seriously , you have to be under a rock to not be already aware of this and the ones that aren't aware they could care less within 3-2-1 seconds. Not diminishing the wkileaks, but people just don't give a damn about their privacy.
You know, according to the video I posted earlier, they advise WL of being CIA and they (CIA) are running interference to Anon's Vault 7 (7th flr shadow group) initiative.
originally posted by: interupt42
originally posted by: Rosinitiate
originally posted by: interupt42
a reply to: Rosinitiate
If the dump is only in regards to how the gov't spies on its citizens with no limits than meh.
Seriously , you have to be under a rock to not be already aware of this and the ones that aren't aware they could care less within 3-2-1 seconds. Not diminishing the wkileaks, but people just don't give a damn about their privacy.
You know, according to the video I posted earlier, they advise WL of being CIA and they (CIA) are running interference to Anon's Vault 7 (7th flr shadow group) initiative.
Yeah but the same goes to anon.
I find it interesting that these so called bombshell leaks are typically on things that the majority of the public is aware about deep down.
originally posted by: coldlikecustard
a reply to: interupt42
Interesting points you bring up although i am holding out hope that the human race won't be so shallow when this is all public knowledge I can however see your point and will just have to keep my fingers crossed you are wrong on this one
originally posted by: coldlikecustard
a reply to: interupt42
Interesting points you bring up although i am holding out hope that the human race won't be so shallow when this is all public knowledge I can however see your point and will just have to keep my fingers crossed you are wrong on this one
Has WikiLeaks already 'mined' all the best stories? No. WikiLeaks has intentionally not written up hundreds of impactful stories to encourage others to find them and so create expertise in the area for subsequent parts in the series. They're there. Look. Those who demonstrate journalistic excellence may be considered for early access to future parts.
UMBRAGE
The CIA's hand crafted hacking techniques pose a problem for the agency. Each technique it has created forms a "fingerprint" that can be used by forensic investigators to attribute multiple different attacks to the same entity.
This is analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible. As soon one murder in the set is solved then the other murders also find likely attribution.
The CIA's Remote Devices Branch's UMBRAGE group collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation.
With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the "fingerprints" of the groups that the attack techniques were stolen from.
UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.
originally posted by: Olivine
The Wikileaks press conference was hacked? Wiki twitter
The timing of this dump sure does smell like Russia coming to Trump's rescue...
originally posted by: Grambler
I find this interesting.
UMBRAGE
The CIA's hand crafted hacking techniques pose a problem for the agency. Each technique it has created forms a "fingerprint" that can be used by forensic investigators to attribute multiple different attacks to the same entity.
This is analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible. As soon one murder in the set is solved then the other murders also find likely attribution.
The CIA's Remote Devices Branch's UMBRAGE group collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation.
With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the "fingerprints" of the groups that the attack techniques were stolen from.
UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.
www.zerohedge.com...
In other words, the CIA has the ability to hack someone and make it look like the Russians did it.
What if all of this talk of Russia hacking the DNC was actually just the CIA framing Russia. Clearly they have the tech for it.
This could be huge.
originally posted by: bknapple32
anyone wanna tell me why a jpeg of Ricky Bobby is in the files?