CIA
_________________________________________
- "WikiLeaks published - biggest ever leak - of secret CIA documents !"
_________________________________________
- "the 8,761 documents - focused mainly on techniques - of surveillance !"
_________________________________________
- "the CIA was facing fresh embarrassment - after the leak of confidential documents !"
_________________________________________
- "detailed tools it had used - broke into phones !"
_________________________________________
- "communication apps - and other electronic devices !"
_________________________________________
- "the documents revealed how the CIA - cooperated with GCHQ - engineered a way !"
_________________________________________
- "of smart televisions - into an improvised surveillance devices !"
_________________________________________
- "the leak - named "Vault 7" - once again raises many questions - about the methods !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "the documents appeared to be - from the CIA’s - "center for cyber intelligence" !"
_________________________________________
- "and showed in detail - how the agency’s digital specialists - worked !"
_________________________________________
- "CIA hackers - had targeted smartphones - and computers !"
_________________________________________
- "a programme called "weeping angel" - had described how to attack a TV set !"
_________________________________________
- "so that it appeared to be off - but could still be used for - monitoring !"
_________________________________________
- "in a "fake off" mode - the TV operated as a bug - recorded conversations in the room !"
_________________________________________
- "and sent them over the Internet - to a covert CIA server !"
_________________________________________
- "the Snowden revelations created tension - between the intelligence agencies !"
_________________________________________
- "and IT companies - where many were upset about the cooperation !"
_________________________________________
- "but the agencies - were privately working on ways - to hack into their products !"
_________________________________________
- "the CIA revelations - risk renewing the friction - with the private sector !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "the leaks also revealed that CIA hackers - operated out of the Frankfurt consulate !"
_________________________________________
- "were given diplomatic - "black" - passports and state department cover !"
_________________________________________
- "the documents included instructions - for incoming CIA hackers - that made Germany’s efforts appear inconsequential !"
_________________________________________
- "and the leaks revealed - a number of the CIA’s electronic methods - were designed for physical proximity !"
_________________________________________
- "these attack methods - penetrated high-security networks - that were disconnected from the Internet ! - ( such as police - record databases ! )"
_________________________________________
- "the person was provided with a USB stick - contained CIA malware - developed for this purpose !"
_________________________________________
- "which was inserted into the targeted computer - and then extracted data !"
______________________________________________________________________________
_________________________________________
- "everyday devices - smartphones - PCs - and TVs !"
_________________________________________
- "the trove of information on - CIA hacking tools - the CIA targets !"
_________________________________________
- "raised many questions - for users - and technology companies - alike !"
_________________________________________
- "everyday consumer devices included - smartphones running iOS - and Android operating systems !"
_________________________________________
- "Windows - and Mac computers - and even smart TVs - made by manufacturers such as Samsung !
_________________________________________
- "the vulnerabilities - described in the published documents - came in many shapes and sizes !"
_________________________________________
- "the release showed that the CIA wanted - the technical capability - hacked devices !"
______________________________________________________________________________
CIA Tools - WikiLeaks: LINK ¤ WIKILEAKS_________________________________________
- "the scope and direction - of the CIA's covert hacking programs !"
_________________________________________
- "had for example been dozens of - "zero day" - exploits !"
_________________________________________
- "Apple's iPhone - Google's Android - and Microsoft's Windows !"
_________________________________________
- "and even Samsung TVs - which was turned into covert microphones !"
_________________________________________
- "the CIA's hacking division - had 5000 registered users !"
_________________________________________
- "and had produced a thousand hacking systems - trojans - and malware !"
_________________________________________
- "the CIA had created - its "own NSA" !"
_________________________________________
- "in a statement the source - who makes this leak possible - shares concerns !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "details policy questions - and an urgently need - to be debated in public !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "including whether the - CIA's hacking capabilities - exceeded its mandated powers ?!"
_________________________________________
- "there is the need for - public oversight !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "the source wishes - to initiate - a public debate !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "about the security - creation - use - proliferation - and democratic control - of cyber-"tools" !"
_________________________________________
- "iPhone - Android - and smart TVs !"
_________________________________________
- "a specialized unit in the CIA's - "mobile development branch" - produced malware !"
_________________________________________
- "infested - and exfiltrated data from - iPhones !"
_________________________________________
- "and Apple products running iOS - such as iPads !"
_________________________________________
- "a similar unit targeted - Google's "Android" - of smart phones !"
_________________________________________
- "the CIA had 24 - Android "zero days" !"
_________________________________________
- "which it had developed itself - or obtained from NSA - GCHQ - or cyber contractors !"
_________________________________________
- "Windows - OSx - Linux - and routers !"
_________________________________________
- "the CIA had run efforts - infected and controlled - Microsoft Windows users - with its malware !"
_________________________________________
- "this included local and remote - "zero days" - or air gap jumping viruses such as - "Hammer Drill" !"
_________________________________________
- "the CIA had developed multi-platform malware - attacked and controlled systems !"
_________________________________________
- "covered Windows - Mac OS X - Solaris - and Linux !"
_________________________________________
- "zero days !"
_________________________________________
- "the CIA had been searching for - vulnerabilities - exploits - bugs - or "zero days" !"
_________________________________________
- "in the wake of the Snowden's leaks - the technology companies secured - a commitment !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "from the US administration - that the executive - would disclose on an ongoing basis !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "serious vulnerabilities - not disclosed to the manufacturers - would place !"
_________________________________________
- "critical infrastructure - at risk ! - ( if the CIA could discover vulnerabilities - so could others ! )"
_________________________________________
- "the US government stated - that it would disclose all pervasive vulnerabilities - discovered after 2010 on an ongoing basis !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "these documents showed - that the CIA breached - these commitments !"
_________________________________________
- "the same vulnerabilities existed - for the US Cabinet - Congress !"
_________________________________________
- "CEOs - system administrators - security officers - and engineers !"
_________________________________________
- "these security flaws - must not be hided - from manufacturers !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "( or wished the CIA everyone - "hackable" ?! )"
_________________________________________
- "the CIA usually required - that its implants communicated - with their programs - over the Internet !"
_________________________________________
- "if CIA implants - and software were classified - then CIA officers could be prosecuted !"
_________________________________________
- "or dismissed - for violating rules - that prohibit placing classified information - onto the Internet !"
_________________________________________
- "consequently the CIA - had secretly made many of its cyber spying code - unclassified !"
_________________________________________
- "no one had copyright - due to restrictions in the constitution !"
_________________________________________
- "this meant that cyber manufactures - and computer hackers - could freely "pirate" them !"
_________________________________________
- "fine dining !"
_________________________________________
- "this was a standardized questionnaire - a menu that CIA case officers - filled out !"
_________________________________________
- "the questionnaire allowed the OSB - operational support branch - identified !"
_________________________________________
- "how to adapt existing tools for the operation - and communicate this to CIA configuration staff !"
_________________________________________
- "among the list of possible targets - of the collection could be !"
_________________________________________
- ""asset" - "liason asset" !"
_________________________________________
- ""system administrator" - "foreign information operations" !"
_________________________________________
- ""foreign intelligence agencies" - and "foreign government entities" !"
_________________________________________
- "notably absent was any reference to - "extremists" - or "transnational criminals" !"
CIA - Wikipedia EN: LINK ¤ CIA
CIA-Werkzeuge - der Standard: LINK ¤ der STANDARD
_________________________________________
- "die CIA hatte eine große Zahl an - Cyber-Werkzeugen - und Spionagesoftware entwickelt !"
_________________________________________
- "Wikileaks hat Dokumente - unter dem Titel "Vault 7" - enthüllt !"
_________________________________________
- "offenbar arbeitete die CIA - an Ausspähmethoden über elektronische Geräte !"
_________________________________________
- "beispielsweise ein Fernseher - um das Ziel via Mikrofon und Webcam - zu überwachen !"
_________________________________________
- "Windows - iPhones - und Android-Geräte !"
_________________________________________
- "der CIA-Werkzeugkasten hatte eine Vielzahl - noch nicht aufgedeckter Lücken - umfasst !"
_________________________________________
- "sogenannte "Zero Day" Exploits - Trojaner - und Malware !"
_________________________________________
- "in dem Konvolut fanden sich auch Programme - mit denen Server- und Desktopbetriebssysteme !"
_________________________________________
- "sowie Router - gehackt werden sollten !"
_________________________________________
- "ein Ordner trug den vielsagenden Namen - "NSA Tools" !"
_________________________________________
- "die Dokumente enthüllten außerdem - dass CIA-Hacker im US-Konsulat in Frankfurt - aktiv waren !"
_________________________________________
- "die Quelle gibt als Grund - für die Informationsweitergabe an !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "eine Debatte über Datenschutz - und Cybersicherheit - zu entfachen !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "iPhones - Android - und TV !"
_________________________________________
- "ein spannender Bereich im Datenmaterial betraf - Apples Betriebssystem für iPhones - und iPads - iOS !"
_________________________________________
- "die CIA hatte Exploits - aus Drittquellen zugekauft !"
_________________________________________
- "dieses war lange vermutet worden - der Leak hat nun die Bestätigung geboten !"
_________________________________________
- "Sicherheitsexperten üben seit Jahren - schwere Kritik an solchen Methoden !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
_________________________________________
- "( da Dritte dieselbe Lücke - entdecken - und ausnutzen könnten ! )"
_________________________________________
- "so fand sich etwa einer für Apples Betriebssystem - iOS 9.2 - in der Liste !"
_________________________________________
- "der offenbar nur wenige Tage nach der Veröffentlichung - dieser Betriebssystemversion aufgenommen worden war !"
_________________________________________
- "auch bei Android - waren eine Fülle von Werkzeugen - aufgelistet !"
_________________________________________
- "die Dokumente boten einen tiefen Einblick - in Ziele - und Methoden - der CIA !"
CIA - Wikipedia DE: LINK ¤ CIA