Friday, March 31, 2017

WikiLeaks Vault 7 Reveals CIA Can Disguise Hacks, Malware As Russian Or Chinese


By Matt Agorist


Moments ago, WikiLeaks released another set of data from the Vault 7 CIA documents which, believe it or not, paints an even more ominous picture of the world’s most unscrupulous spy agency. The latest leak consists of 676 source code files from the CIA’s anti-forensic “Marble” framework — which allows the CIA to covertly create malware, trojans, and hacking attacks — while attributing them to foreign entities.



With each release from these Vault 7 leaks, it becomes more apparent that everything we thought the CIA might get in this 1984-esque world — they already have.



According to WikiLeaks, Marble is able to hide or cloak their virus signature by “by hiding (“obfuscating”) text fragments used in CIA malware from visual inspection. This is the digital equivalent of a specialized CIA tool to place covers over the English language text on U.S. produced weapons systems before giving them to insurgents secretly backed by the CIA.”



Marble is “[D]esigned to allow for flexible and easy-to-use obfuscation” as “string obfuscation algorithms (especially those that are unique) are often used to link malware to a specific developer or development shop.”



Over the course of the last 4 months, the deep state has claimed — without evidence — that Russia has interfered in US elections. With this technology, the CIA could theoretically present the evidence it needs to “prove” Russian meddling.


According to WikiLeaks, this blame game is possible due to the fact that the source code shows that Marble has test examples not just in English but also in Chinese, Russian, Korean, Arabic and Farsi. This would permit a forensic attribution double game, for example by pretending that the spoken language of the malware creator was not American English, but Chinese, but then showing attempts to conceal the use of Chinese, drawing forensic investigators even more strongly to the wrong conclusion, — but there are other possibilities, such as hiding fake error messages.





According to Marble, the CIA could create a virus that would potentially devastate entire systems — and then blame it on anyone they want.

As Leak of Nations reports, in the second batch of ‘Vault 7’ documents, WikiLeaks released a user guide for Sonic Screwdriver – an implant on the Apple Thunderbolt-to-USB converter that allows code to be booted onto an attached device, even if the device is password-protected.


What this means is that the CIA can infect the firmware of Macs at the core of the system with a trojan horse. Having a proverbial ocean of computers to choose from, the CIA could then pick one of those infected computers, launch an attack, use Marble to cover it up and blame it on whomever they wish.


It is no wonder Ubuntu founder Mark Shuttleworth called this “a trojan horse of monumental proportions.”


For now, however, the only one to be caught hacking US elections is the Department of Homeland Security. As the Free Thought Project previously reported, the Department of Homeland Security, under the Obama administration, attempted to hack the Indiana State electoral system nearly 15,000 times.


Prior to the hacks in Indiana, it was the State of Georgia to expose DHS meddling in their elections.


While these revelations are certainly disheartening on the surface, imagine what it would be like if we didn’t know. Thankfully, there are heroes in this world like Assange who risk their very lives to shine light into the darkness.


However, it also makes heroes like Assange targets.



Matt Agorist is the co-founder of TheFreeThoughtProject.com, where this article first appeared. He is an honorably discharged veteran of the USMC and former intelligence operator directly tasked by the NSA. This prior experience gives him unique insight into the world of government corruption and the American police state. Agorist has been an independent journalist for over a decade and has been featured on mainstream networks around the world. . and now on Steemit

No comments:

Post a Comment