Search Results for: vault 7 wikileaks

We found 56 results. You can refine your search here:

To find articles by the same author, please click on the name.


Vault 8: Hive

WikiLeaks – TRANSCEND Media Service, 13 Nov 2017

Today, 9 Nov 2017, WikiLeaks publishes the source code and development logs to Hive, a major component of the CIA infrastructure to control its malware. Vault 8: Source code and analysis for CIA software projects including those described in the Vault7 series.This publication will enable investigative journalists, forensic experts and the general public to better identify and understand covert CIA infrastructure components.

→ read full article

WikiLeaks Vault 8 Part 1: CIA Wrote Code to Impersonate Russian Anti-Virus Company Kaspersky

Aaron Kesel – Activist Post, 13 Nov 2017

9 Nov 2017 – WikiLeaks has released part 1 of its new Vault 8 series following its popular and widely distributed Vault 7 series which exposed CIA spyware and malware capabilities.

→ read full article

Vault 7: Protego

WikiLeaks – TRANSCEND Media Service, 11 Sep 2017

Today, September 7th 2017, WikiLeaks publishes four secret documents from the Protego project of the CIA, along with 37 related documents. Protego is not the “usual” malware development project like all previous publications by WikiLeaks in the Vault7 series.

→ read full article

Vault 7: Angelfire

WikiLeaks – TRANSCEND Media Service, 4 Sep 2017

Today, August 31st 2017, WikiLeaks publishes documents from the Angelfire project of the CIA. Like previously published CIA projects (Grasshopper and AfterMidnight) in the Vault7 series, it is a persistent framework that can load and execute custom implants on target computers running the Microsoft Windows operating system (XP or Win7).

→ read full article

Vault 7: ExpressLane

WikiLeaks – TRANSCEND Media Service, 28 Aug 2017

Today, August 24th 2017, WikiLeaks publishes secret documents from the ExpressLane project of the CIA that show one of the cyber operations it conducts against liaison services — which includes among many others the NSA, the Department of Homeland Security and the FBI.

→ read full article

Vault 7: CouchPotato

WikiLeaks – TRANSCEND Media Service, 14 Aug 2017

Today, August 10th 2017, WikiLeaks publishes the User Guide for the CoachPotato project of the CIA. CouchPotato is a remote tool for collection against RTSP/H.264 video streams.

→ read full article

Vault 7: Dumbo

WikiLeaks – TRANSCEND Media Service, 7 Aug 2017

Today, August 3rd 2017 WikiLeaks publishes documents from the Dumbo project of the CIA. Dumbo is a capability to suspend processes utilizing webcams and corrupt any video recordings that could compromise a PAG-Physical Access Group deployment.

→ read full article

CIA’s ‘Dumbo’ Hacks PC Cameras, Microphones, Files: WikiLeaks

teleSUR – TRANSCEND Media Service, 7 Aug 2017

3 Aug 2017 – In a press release published today, WikiLeaks revealed the CIA’s hacking tool, ‘Dumbo,’ which allows agents to manipulate Microsoft Window’s webcams, microphones, and other devices from thousands of miles away. The whistleblower organization published everything in the Field Guide to the User’s Manual of the CIA’s hacking system.

→ read full article

Vault 7: Imperial

WikiLeaks – TRANSCEND Media Service, 31 Jul 2017

Today, July 27th 2017, WikiLeaks publishes documents from the Imperial project of the CIA.

→ read full article

Vault 7: CL/Raytheon

WikiLeaks – TRANSCEND Media Service, 24 Jul 2017

Today, July 19th 2017, WikiLeaks publishes documents from the CIA contractor Raytheon Blackbird Technologies for the “UMBRAGE Component Library” project. The documents were submitted to the CIA between November 21st 2014 (just two weeks after Raytheon acquired Blackbird Technologies to build a Cyber Powerhouse) and September, 11th 2015.

→ read full article

Vault 7: Highrise

WikiLeaks – TRANSCEND Media Service, 17 Jul 2017

Today, July 13th 2017, WikiLeaks publishes documents from the Highrise project of the CIA. HighRise is an Android application designed for mobile devices running Android 4.0 to 4.3. It provides a redirector function for SMS messaging that could be used by a number of IOC tools that use SMS messages for communication between implants and listening posts.

→ read full article

Vault 7: BothanSpy

WikiLeaks – TRANSCEND Media Service, 10 Jul 2017

Today, July 6th 2017, WikiLeaks publishes documents from the BothanSpy and Gyrfalcon projects of the CIA. The implants described in both projects are designed to intercept and exfiltrate SSH credentials but work on different operating systems with different attack vectors.

→ read full article

Vault 7: Elsa

WikiLeaks – TRANSCEND Media Service, 3 Jul 2017

Today, June 28th 2017, WikiLeaks publishes documents from the ELSA project of the CIA. ELSA is a geo-location malware for WiFi-enabled devices like laptops running the Micorosoft Windows operating system. Once persistently installed on a target machine using separate CIA exploits, the malware scans visible WiFi access points and records the ESS identifier, MAC address and signal strength at regular intervals.

→ read full article

Vault 7: OutlawCountry

WikiLeaks – TRANSCEND Media Service, 3 Jul 2017

Today, June 29th 2017, WikiLeaks publishes documents from the OutlawCountry project of the CIA that targets computers running the Linux operating system. It allows for the redirection of all outbound network traffic on the target computer to CIA controlled machines for ex- and infiltration purposes. The malware consists of a kernel module that creates a hidden netfilter table on a Linux target.

→ read full article

Vault 7: Brutal Kangaroo

WikiLeaks – TRANSCEND Media Service, 26 Jun 2017

Today, June 22nd 2017, WikiLeaks publishes documents from the Brutal Kangaroo project of the CIA. The documents describe how a CIA operation can infiltrate a closed network (or a single air-gapped computer) within an organization or enterprise without direct access.

→ read full article

Vault 7: Cherry Blossom

WikiLeaks – TRANSCEND Media Service, 19 Jun 2017

Today, June 15th 2017, WikiLeaks publishes documents from the CherryBlossom project of the CIA that was developed and implemented with the help of the US nonprofit Stanford Research Institute (SRI International). CherryBlossom provides a means of monitoring the Internet activity of and performing software exploits on Targets of interest. In particular, CherryBlossom is focused on compromising wireless networking devices, such as wireless routers and access points (APs), to achieve these goals.

→ read full article

Vault 7: Pandemic

WikiLeaks – TRANSCEND Media Service, 5 Jun 2017

Today, June 1st 2017, WikiLeaks publishes documents from the “Pandemic” project of the CIA, a persistent implant for Microsoft Windows machines that share files (programs) with remote users in a local network. “Pandemic” targets remote users by replacing application code on-the-fly with a trojaned version if the program is retrieved from the infected machine.

→ read full article

Vault 7: Athena

WikiLeaks – TRANSCEND Media Service, 22 May 2017

Today, May 19th 2017, WikiLeaks publishes documents from the “Athena” project of the CIA. “Athena” – like the related “Hera” system – provides remote beacon and loader capabilities on target computers running the Microsoft Windows operating system (from Windows XP to Windows 10).

→ read full article

Vault 7: AfterMidnight & Assassin Frameworks

WikiLeaks – TRANSCEND Media Service, 15 May 2017

Today, May 12th 2017, WikiLeaks publishes “AfterMidnight” and “Assassin”, two CIA malware frameworks for the Microsoft Windows platform. “AfterMidnight” allows operators to dynamically load and execute malware payloads on a target machine. “Assassin” is a similar kind of malware; it is an automated implant that provides a simple collection platform on remote computers.

→ read full article

Vault 7: Archimedes

WikiLeaks – TRANSCEND Media Service, 8 May 2017

Today, May 5th 2017, WikiLeaks publishes “Archimedes”, a tool used by the CIA to attack a computer inside a Local Area Network (LAN), usually used in offices. It allows the re-directing of traffic from the target computer inside the LAN through a computer infected with this malware and controlled by the CIA.

→ read full article

Vault 7: Scribbles Project

WikiLeaks – TRANSCEND Media Service, 1 May 2017

Today, April 28 2017, WikiLeaks publishes the documentation and source code for CIA’s “Scribbles” project, a document-watermarking preprocessing system to embed “Web beacon”-style tags into documents that are likely to be copied by Insiders, Whistleblowers, Journalists or others.

→ read full article

Vault 7: Weeping Angel

WikiLeaks – TRANSCEND Media Service, 24 Apr 2017

Today, April 21st 2017, WikiLeaks publishes the User Guide for CIA’s “Weeping Angel” tool – an implant designed for Samsung F Series Smart Televisions. Based on the “Extending” tool from MI5/BTSS, the implant is designed to record audio from the built-in microphone and egress or store the data.

→ read full article

Vault 7: Hive Project

WikiLeaks – TRANSCEND Media Service, 17 Apr 2017

Today, April 14th 2017, WikiLeaks publishes six documents from the CIA’s HIVE project created by its “Embedded Development Branch.” HIVE is a back-end infrastructure malware with a public-facing HTTPS interface which is used by CIA implants to transfer exfiltrated information from target machines to the CIA and to receive commands from its operators to execute specific tasks on the targets.

→ read full article

Vault 7: Grasshopper Framework

WikiLeaks – TRANSCEND Media Service, 10 Apr 2017

Today, April 7th 2017, WikiLeaks releases Vault 7 “Grasshopper” — 27 documents from the CIA’s Grasshopper framework, a platform used to build customized malware payloads for Microsoft Windows operating systems.

→ read full article

Vault 7: Project Dark Matter

WikiLeaks – TRANSCEND Media Service, 3 Apr 2017

Today, March 23rd 2017, WikiLeaks releases Vault 7 “Dark Matter”, which contains documentation for several CIA projects that infect Apple Mac firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA’s Embedded Development Branch.

→ read full article

Vault 7: Marble Framework

WikiLeaks – TRANSCEND Media Service, 3 Apr 2017

Today, March 31st 2017, WikiLeaks releases Vault 7 “Marble” — 676 source code files for the CIA’s secret anti-forensic Marble Framework. Marble is used to hamper forensic investigators and anti-virus companies from attributing viruses, trojans and hacking attacks to the CIA.

→ read full article

WikiLeaks Reveals “Marble”: Proof CIA Disguises Their Hacks as Russian, Chinese, Arabic…

Tyler Durden | Zero Hedge – TRANSCEND Media Service, 3 Apr 2017

31 Mar 2017 – WikiLeaks’ latest Vault 7 release contains a batch of documents, named ‘Marble’, which detail CIA hacking tactics and how they can misdirect forensic investigators from attributing viruses, trojans and hacking attacks to their agency by inserted code fragments in foreign languages. The biggest malicious hacker on Earth was, and still is, the CIA.

→ read full article

Vault 7: CIA Hacking Tools Revealed

WikiLeaks – TRANSCEND Media Service, 13 Mar 2017

Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named “Vault 7” by WikiLeaks, it is the largest ever publication of confidential documents on the agency. The first full part of the series, “Year Zero”, comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA’s Center for Cyber Intelligence in Langley, Virgina.

→ read full article

WikiLeaks’ Latest CIA Data Dump Undermines Case against Russia Election Hack

Dave Lindorff - CounterPunch, 13 Mar 2017

10 Mar 2017 – The so-called Deep State and Democratic Party campaign to demonize Russia for allegedly “hacking the US election,” and delivering the country into the hands of Donald Trump suffered a huge and probably mortal blow this week with the release by WikiLeaks of over 7000 secret CIA documents disclosing secret CIA hacking technologies.

→ read full article

WikiLeaks Reveals Vast CIA Spying, Cyberwar Operation

Bill Van Auken | WSWS – TRANSCEND Media Service, 13 Mar 2017

Amid Democrats’ claims of Russian hacking in support of Trump and Trump’s charge that he was bugged by Obama, WikiLeaks has revealed a vast CIA operation directed against the people of the US and the world.

→ read full article

WikiLeaks: US Government, Soros Funded Panama Papers to Attack Putin

Russia Today – TRANSCEND Media Service, 11 Apr 2016

7 Apr 2016 – Washington is behind the recently released offshore revelations known as the Panama Papers, WikiLeaks has claimed, saying that the attack was “produced” to target Russia and President Putin.

→ read full article

John Pilger: A Day in the Death of British Justice

John Pilger | Consortium News – TRANSCEND Media Service, 16 Aug 2021

12 Aug 2021 – The veteran journalist has covered Julian Assange’s case from the beginning and was in London this week to witness the latest shameful episode. “The reputation of British justice now rests on the shoulders of the High Court in the life or death case of Julian Assange.” Here is his dispatch.

→ read full article

Inside the Pentagon’s Secret Undercover Army

William M. Arkin | Newsweek - TRANSCEND Media Service, 14 Jun 2021

The largest undercover force the world has ever known is the one created by the Pentagon over the past decade. Some 60,000 people belong to this secret army working under masked identities in a program called “signature reduction.” More than ten times the size of the clandestine elements of the CIA, it carries out domestic and foreign assignments in military uniforms or civilian cover, in real life and online, hiding in private businesses and consultancies, some of them household name companies.

→ read full article

Assange Prosecution Launched by Trump Justice Department Will Continue under Biden

Kevin Gosztola | The Dissenter – TRANSCEND Media Service, 22 Feb 2021

9 Feb 2021 – A Justice Department spokesperson indicated officials have no plans to abandon a case widely viewed as a threat to global press freedom. “We continue to seek his extradition,” Justice Department spokesperson Marc Raimondi told Reuters.

→ read full article

Assange Legal Team Submits Closing Argument against Extradition to United States

Kevin Gosztola | The Dissenter – TRANSCEND Media Service, 16 Nov 2020

10 Nov 2020 – In submission to magistrates’ court in London, attorneys detail the “politically motivated” case the Trump administration pursued against the WikiLeaks founder.

→ read full article

Three Extraordinary Australian Journalists: Burchett, Pilger & Assange

Rick Sterling – TRANSCEND Media Service, 10 Feb 2020

7 Feb 2020 – Australia has produced extraordinary journalists across three generations: Wilfred Burchett (deceased in 1983), John Pilger (80 years old but still active) and Julian Assange (48 years old, currently in London’s Belmarsh prison). They were all rebels and all international. They all depended on freedom of the press which is now at stake.

→ read full article

One World Digital Dictatorship

Soren Korsgaard | Crime and Power – TRANSCEND Media Service, 27 Jan 2020

5 Jan 2020 – The accelerating movement by both Western-style democracies and one-party states towards world-wide ongoing digital disempowerment and digital imprisonment of humanity involving mass data collection on everyone, mass surveillance, facial recognition-based tracking, cryptocurrency-based cashless societies, and social credit-based disempowerment. A Must Read.

→ read full article

Julian Assange Languishes in Prison as His Journalistic Collaborators Brandish Their Prizes

Charles Glass – The Intercept, 22 Apr 2019

14 Apr 2019 – WikiLeaks’ collaborators were the world’s leading newspapers: the New York Times, The Guardian, El Pais of Spain, and Paris’s Le Monde. If Assange violated the law, they were in it with him. One of the best-remembered disclosures was a military video of an American helicopter crew taking delight in shooting dead two Reuters journalists and 10 other civilians on the streets of Iraq. Journalists who published his leaked documents continue working without fear of prosecution and, in some cases, brandish their journalism prizes while denouncing the man who made them possible.

→ read full article

The Making of Juan Guaidó: How the US Regime Change Laboratory Created Venezuela’s Coup Leader

Dan Cohen and Max Blumenthal | The Grayzone – TRANSCEND Media Service, 11 Feb 2019

Before the fateful day of January 22, fewer than one in five Venezuelans had heard of Juan Guaidó. Only a few months ago, the 35-year-old was an obscure character in a politically marginal far-right group closely associated with gruesome acts of street violence. He is the product of a decade-long project overseen by Washington’s elite regime change trainers. While posing as a champion of democracy, he has spent years at the forefront of a violent campaign of destabilization.

→ read full article

Business as Usual: Washington’s Regime Change Strategy in Venezuela

Garry Leech - CounterPunch, 26 Nov 2018

23 Nov 2018 – A great summary of what has happened in Venezuela and in all of Latin America. Besides Venezuela and the recent attempts by the Trump administration to affect regime change there, it draws on lessons from Operation Condor, Chile and Haiti. Washington’s strategy of regime change in Venezuela is almost identical to the approach it has taken in Latin America on numerous occasions since World War Two.”

→ read full article

The Ugly, Messy Truth about Julian Assange and Why You Should Care

Helen Razer – New Matilda [Australia], 12 Nov 2018

4 Nov 2018 – Over the past few days, there has been increased activity around the Ecuadorian embassy in London, sparking fears Julian Assange faces imminent detention by British authorities. Helen Razer weighs in on truth, on Assange, and why you should care about both.

→ read full article

The War on Assange Is a War on Press Freedom

Chris Hedges – Truthdig, 23 Jul 2018

15 Jul 2018 – The arrest of the WikiLeaks founder, which appears near, would be the first domino to fall. Afterward, thousands of publishers, editors and reporters in the U.S. would be in peril.

→ read full article

What Is Bitcoin? Everything You Need to Know about Bitcoin, Explained

Daniel Frumkin – TRANSCEND Media Service, 19 Feb 2018

This article will answer the common questions that newcomers have when first learning about Bitcoin. How do blockchains work? What makes Bitcoin valuable? What is decentralization? What is mining? How do you buy Bitcoin? How do you safely store it? How do you send or receive Bitcoin from somebody else? But we won’t just stop there.

→ read full article

Interview with Edward Snowden: ‘There Is Still Hope – Even for Me’

Martin Knobbe and Jörg Schindler – Der Spiegel, 18 Sep 2017

12 Sep 2017 – Whistleblower Edward Snowden discusses his life in Russia, the power of the intelligence apparatuses and how he will continue his battle against all-encompassing surveillance by governments.

→ read full article

ExpressLane: CIA’s Secret Spy Tool Steals Biometric Data from Other Intelligence Agencies

Aaron Kesel – Activist Post, 28 Aug 2017

26 Aug 2017 – WikiLeaks has published a document of a CIA project called ‘ExpressLane’ that allows the agency to secretly extract biometric data from the NSA, the DHS, and the FBI as well as non-U.S. agencies.

→ read full article

CIA Can Geo-locate Your Computer by Listening to WiFi Signals

Aaron Kesel – Activist Post, 10 Jul 2017

WikiLeaks Vault 7 has provided great insight into the CIA’s hacking capabilities. So far we have learned they can hack into various electronic devices such as smartphones, TVs, and computers. The latest revelation called project Elsa seems frightening. Elsa is the code name for the CIA’s geo-location malware for WiFi-enabled devices like laptops running the Microsoft Windows operating systems.

→ read full article

Julian Assange Strikes Back at CIA Director and Talks Trump, Russia, and Hillary Clinton

Jeremy Scahill – The Intercept, 24 Apr 2017

19 Apr 2017 – WikiLeaks founder Julian Assange is hitting back at Trump’s CIA director Mike Pompeo following a speech last week in which Pompeo accused WikiLeaks of being a “hostile nonstate intelligence agency” operating outside of the protections of the First Amendment.

→ read full article

The Deep State Hasn’t Gone Away

Robert C. Koehler | Common Wonders – TRANSCEND Media Service, 20 Mar 2017

The whole point of a democracy is to empower the public interest, which means that the public must be aware of the Deep State and hold it continually accountable. While Lofgren is adamant that there’s more to it than the military-industrial consensus and the pursuit of endless war, this to me is by far its most troubling aspect. Let’s not give it any peace.

→ read full article

This Week in History

Satoshi Ashikaga – TRANSCEND Media Service, 27 Feb 2017

Feb 27-Mar 5~ QUOTE OF THE WEEK: “The greatest healing therapy is friendship and love.” – Hubert H. Humphrey

→ read full article

CIA Espionage Orders for the 2012 French Presidential Election (in English and in French)

WikiLeaks – TRANSCEND Media Service, 20 Feb 2017

16 February, 2017 – All major French political parties were targeted for infiltration by the CIA’s human (“HUMINT”) and electronic (“SIGINT”) spies in the seven months leading up to France’s 2012 presidential election. The revelations are contained within three CIA tasking orders published today by WikiLeaks as context for its forth coming CIA Vault 7 series.

→ read full article

This Week in History

Satoshi Ashikaga – TRANSCEND Media Service, 5 Sep 2016

Sep 5-11 ~ QUOTE OF THE WEEK: “We must let go of the life we have planned, so as to accept the one that is waiting for us.” – Joseph Campbell

→ read full article

This Week in History

Satoshi Ashikaga - TRANSCEND Media Service, 9 May 2016

May 9–15 ~ QUOTE OF THE WEEK: “War does not determine who is right – only who is left.” – Bertrand Russell

→ read full article

Selling Your Secrets: The Invisible World of Software Backdoors and Bounty Hunters

Pratap Chatterjee - TomDispatch, 10 Feb 2014

Imagine that you could wander unseen through a city, sneaking into houses and offices of your choosing at any time, day or night. Imagine that, once inside, you could observe everything happening, unnoticed by others — from the combinations used to secure bank safes to the clandestine rendezvous of lovers. Imagine also…

→ read full article

The Secret War: Cyber

Wired – TRANSCEND Media Service, 8 Jul 2013

Inside Fort Meade, Maryland-USA, a top-secret city, as if designed by Kafka and with tens of thousands of people moving through more than 50 buildings, sits among a forest of trees, surrounded by electrified fences and heavily armed guards, protected by antitank barriers, monitored by sensitive motion detectors, and watched by rotating cameras. To block electromagnetic signals the inner walls of the buildings are wrapped in copper shielding and the one-way windows are embedded with a fine copper mesh.

→ read full article

Why ‘Colour’ Revolutions are Multi-shaded

Debidatta Aurobinda Mahapatra – TRANSCEND Media Service, 31 Jan 2011

Adding to the galaxy of ‘colour’ revolutions such as rose, tulip, orange, and many others is the recent jasmine revolution in Tunisia. The North African country suddenly gained worldwide attention in the second week of January as the ruler of country for the last 23 years fled to Saudi Arabia after massive protests. The perplexity of the matter revolved around the question how the immolation of a 26 year old could trigger such a massive unrest in Tunisia and consequently in the almost whole Arab world with protests in countries like Algeria, Syria, Yemen, Jordan are gaining shape.

→ read full article

AMERICA’S ULTIMATE WEAPON OF MASS DESTRUCTION: BIOLOGICAL WARFARE

Tom Burghardt, 5 Aug 2009

Bioweapons Research, Secrecy and Contamination Go Hand in Hand The 2001 anthrax attacks underscore the dangers posed to our health and safety by the Bioweapons-Industrial Complex. The killer(s) employed a military-grade version of the deadly pathogen, a four-mutation blend of anthrax prepared at the government’s test site at the remote Dugway Proving Ground in Utah. […]

→ read full article