Ok first up i should state that collected my findings off of Twitter, not from Wikileaks directly.Exley97 said:Well, this is Wikileaks editorializing the leaked data.
Yes i know im fucking scum but id rather do gaming and let other people pick through the thousands of documents.
And also listen to Alex Jones on the subject, seriously a conspiracy theorist getting evidence to support his narrative is a fucking comedy goldmine.
Id just like to point out the CIA does have false flag operations in its history. Now granted not its recent history but such things are probably put beyond the reach of the former contractors allegedly responsible for leaking theese files.Exley97 said:I haven't seen any evidence or reports that the data contains actual false flag operations using other hacking groups'/nation-state's malware or attack techniques. Yes, the CIA collects malware and attack methods from other parties in a database. Yes, they use that information and take "code snippets" of existing malware to adapt their own methods and malware. I'm sure every government cyber operation does the same (which, on a side note, is why things like Stuxnet are so dangerous -- because now Iran, Russia and others can use the same code and adapt it for new variants).
Making the leap to say that the CIA is running a false flag operation is extremely irresponsible, especially since 1) there's no documentation in the leaks that shows the CIA took third-party malware and used it for an attack, and 2) the very document that Wikileaks posted states the goal of the Umbrage "Component Library" in black & white:
"The goal of this repository is to provide functional code snippets that can be rapidly combined into custom solutions. Rather than building feature-rich tools, which are often costly and can have significant CI value, this effort focuses on developing smaller and more targeted solutions built to operational specifications."
What's more, you can't engage in an effort to "misdirect attribution" as Wikileaks claims if you're building a custom solutions that only uses "snippets" of code from existing malware types. That's complete and utter nonsense, and no cyber attribution expert in the world would go for that.
And im certainly no expert on the subject of cyber warfare or the tools used to fight it. I prefer to leave theese things to people who do understand them.
If youre willing to assume that the prospect of RC assassinations are real for a moment, could you see this being used for self driving or driverless vehicles?Exley97 said:Again, this is Wikileaks editorializing and making leaps. The press release states that the CIA was looking to infect vehicle software systems like QNX with malware. "The purpose of such control is not specified, but [strong]it would permit the CIA to engage in nearly undetectable assassinations[/strong]."
First, no, it would permit such things -- at least if we're talking about QNX. As far as I know, QNX doesn't extend to actual vehicle controls for brakes, acceleration, etc. and only apply to feature like telematics, advanced driver assistance, hands-free controls and entertainment systems. So I'm not sure why Wikileaks would claim that CIA hacks could potentially allow the agency to gain control of a vehicle and crash it, though I'm sure Wikileaks would love to spark more conspiracy theories about Michael Hastings' death.
Second, there's nothing in the leaked documents that suggest that the aim of the CIA is to remote control, disable and crash vehicles (even if it were possible with other car OSes). It's highly likely (though obviously unconfirmed) that the hacking efforts in question would designed to leverage the hand-free/entertainment controls to establish a surveillance "listening post," similar to the Samsung smart TV hacks disclosed in the Vault 7 docs.
And yes more surveillance does seem more likely today than actually forcing vehicles to crash.
Although i remain skeptical (out of ignorance, i admit) that vehicles driven by electric and dynamic hybrid motors couldnt be hacked and at least forced to stop.
Im more interested to find out if they actually tried it, and what memes, if any, they tried to get off the ground.Exley97 said:And don't forget the emojis.gigastar said:And a document at least proposed the creation of meme task force.