{"id":95700,"date":"2017-07-24T12:00:08","date_gmt":"2017-07-24T11:00:08","guid":{"rendered":"https:\/\/www.transcend.org\/tms\/?p=95700"},"modified":"2017-07-20T12:48:53","modified_gmt":"2017-07-20T11:48:53","slug":"vault-7-clraytheon","status":"publish","type":"post","link":"https:\/\/www.transcend.org\/tms\/2017\/07\/vault-7-clraytheon\/","title":{"rendered":"Vault 7: CL\/Raytheon"},"content":{"rendered":"<p style=\"padding-left: 30px;\"><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/04\/wikileaks-logo.png\" ><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-thumbnail wp-image-90223\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/04\/wikileaks-logo-150x150.png\" alt=\"\" width=\"150\" height=\"150\" \/><\/a>Today, July 19th 2017, WikiLeaks publishes documents from the CIA contractor <em>Raytheon Blackbird Technologies<\/em> for the &#8220;<a target=\"_blank\" href=\"https:\/\/wikileaks.org\/ciav7p1\/cms\/page_2621751.html\" >UMBRAGE<\/a> Component Library&#8221; (UCL) project. The documents were submitted to the CIA between November 21<sup>st<\/sup> 2014 (just two weeks after <a target=\"_blank\" href=\"http:\/\/investor.raytheon.com\/phoenix.zhtml?c=84193&amp;p=irol-newsArticle&amp;ID=1985908\" >Raytheon acquired Blackbird Technologies<\/a> to build a <a target=\"_blank\" href=\"http:\/\/www.raytheon.com\/news\/feature\/cyber_powerhouse.html\" >Cyber Powerhouse<\/a>) and September, 11<sup>th<\/sup> 2015. They mostly contain Proof-of-Concept ideas and assessments for malware attack vectors &#8211; partly based on public documents from security researchers and private enterprises in the computer security field.<\/p>\n<p><em>Raytheon Blackbird Technologies<\/em> acted as a kind of &#8220;technology scout&#8221; for the <a target=\"_blank\" href=\"https:\/\/wikileaks.org\/ciav7p1\/cms\/space_753668.html\" >Remote Development Branch (RDB)<\/a> of the CIA by analysing malware attacks in the wild and giving recommendations to the CIA development teams for further investigation and PoC development for their own malware projects.<a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/04\/logo@400-nsa.png\" ><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-medium wp-image-90672\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/04\/logo@400-nsa-300x212.png\" alt=\"\" width=\"300\" height=\"212\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/04\/logo@400-nsa-300x212.png 300w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/04\/logo@400-nsa.png 399w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<blockquote>\n<h1>Leaked Documents:<\/h1>\n<p><a target=\"_blank\" href=\"https:\/\/wikileaks.org\/vault7\/document\/2015-09-20150911-279-CSIT-15083-HTTPBrowser\/\" >(S\/\/NF) CSIT 15083 &#8212; HTTPBrowser <\/a><\/p>\n<p><a target=\"_blank\" href=\"https:\/\/wikileaks.org\/vault7\/document\/2015-09-20150911-280-CSIT-15085-NfLog\/\" >(S\/\/NF) CSIT 15085 &#8212; NfLog <\/a><\/p>\n<p><a target=\"_blank\" href=\"https:\/\/wikileaks.org\/vault7\/document\/2015-09-20150911-276-Symantec-Regin\/\" >(S\/\/NF) Symantec &#8212; Regin &#8211; Stealthy Surveillance <\/a><\/p>\n<p><a target=\"_blank\" href=\"https:\/\/wikileaks.org\/vault7\/document\/2015-09-20150911-277-FireEye-HammerToss\/\" >(S\/\/NF) FireEye &#8212; HammerToss &#8211; Stealthy Tactics <\/a><\/p>\n<p><a target=\"_blank\" href=\"https:\/\/wikileaks.org\/vault7\/document\/2015-09-20150911-278-VB-Gamker\/\" >(S\/\/NF) VB &#8212; Gamker <\/a><\/p><\/blockquote>\n<p>_______________________________________________<\/p>\n<blockquote>\n<h2><strong><em>All Releases:<\/em><\/strong><\/h2>\n<p><em><a href=\"https:\/\/www.transcend.org\/tms\/2017\/07\/vault-7-highrise\/\" >Vault 7: Highrise<\/a> \u2013 13 Jul 2017<\/em><\/p>\n<p><em><a href=\"https:\/\/www.transcend.org\/tms\/2017\/07\/vault-7-bothanspy\/\" >Vault 7: BothanSpy<\/a> \u2013 6 Jul 2017<\/em><\/p>\n<p><em><a href=\"https:\/\/www.transcend.org\/tms\/2017\/07\/vault-7-outlawcountry\/\" >Vault 7: OutlawCountry<\/a> \u2013 29 Jun 2017<\/em><\/p>\n<p><em><a href=\"https:\/\/www.transcend.org\/tms\/2017\/07\/vault-7-elsa\/\" >Vault 7: Elsa<\/a> \u2013 28 Jun 2017<\/em><\/p>\n<p><em><a href=\"https:\/\/www.transcend.org\/tms\/2017\/06\/vault-7-brutal-kangaroo\/\" >Vault 7: Brutal Kangaroo<\/a> \u2013 22 Jun 2017<\/em><\/p>\n<p><em><a href=\"https:\/\/www.transcend.org\/tms\/2017\/06\/vault-7-cherry-blossom\/\" >Vault 7: Cherry Blossom<\/a> \u2013 15 Jun 2017<\/em><\/p>\n<p><em><a href=\"https:\/\/www.transcend.org\/tms\/2017\/06\/vault-7-pandemic\/\" >Vault 7: Pandemic<\/a> \u2013 1 Jun 2017<\/em><\/p>\n<p><em><a href=\"https:\/\/www.transcend.org\/tms\/2017\/05\/vault-7-athena\/\" >Vault 7: Athena<\/a> \u2013 19 May 2017<\/em><\/p>\n<p><em><a href=\"https:\/\/www.transcend.org\/tms\/2017\/05\/aftermidnight-assassin-frameworks\/\" >Vault 7: AfterMidnight &amp; Assassin Frameworks<\/a> \u2013 12 May 2017<\/em><\/p>\n<p><em><a href=\"https:\/\/www.transcend.org\/tms\/2017\/05\/vault-7-archimedes\/\" >Vault 7: Archimedes \u2013<\/a> 5 May 2017<\/em><\/p>\n<p><em><a href=\"https:\/\/www.transcend.org\/tms\/2017\/05\/vault-7-scribbles-project\/\" >Vault 7: Scribbles Project<\/a> \u2013 28 Apr 2017<\/em><\/p>\n<p><em><a href=\"https:\/\/www.transcend.org\/tms\/2017\/04\/vault-7-weeping-angel\/\" >Vault 7: Weeping Angel<\/a> \u2013 21 Apr 2017<\/em><\/p>\n<p><em><a href=\"https:\/\/www.transcend.org\/tms\/2017\/04\/vault-7-hive-project\/\" >Vault 7: Hive Project<\/a> \u2013 14 Apr 2017<\/em><\/p>\n<p><em><a href=\"https:\/\/www.transcend.org\/tms\/2017\/04\/grasshopper\/\" >Vault 7: Grasshopper Framework<\/a> \u2013 7 Apr 2017<\/em><\/p>\n<p><em><a href=\"https:\/\/www.transcend.org\/tms\/2017\/04\/marble-framework\/\" >Vault 7: Marble Framework<\/a> \u2013 31 Mar 2017<\/em><\/p>\n<p><em><a href=\"https:\/\/www.transcend.org\/tms\/2017\/04\/dark-matter\/\" >Vault 7: Project Dark Matter<\/a> \u2013 23 Mar 2017<\/em><\/p>\n<p><em><a href=\"https:\/\/www.transcend.org\/tms\/2017\/03\/vault-7-cia-hacking-tools-revealed\/\" >Vault 7: CIA Hacking Tools Revealed<\/a> \u2013 7 Mar 2017<\/em><\/p><\/blockquote>\n<p><a target=\"_blank\" href=\"https:\/\/wikileaks.org\/vault7\/#UCL%20\/%20Raytheon\" >Go to Original \u2013 wikileaks.org<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today, July 19th 2017, WikiLeaks publishes documents from the CIA contractor Raytheon Blackbird Technologies for the &#8220;UMBRAGE Component Library&#8221; project. The documents were submitted to the CIA between November 21st 2014 (just two weeks after Raytheon acquired Blackbird Technologies to build a Cyber Powerhouse) and September, 11th 2015.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[],"class_list":["post-95700","post","type-post","status-publish","format-standard","hentry","category-whistleblowing-surveillance"],"_links":{"self":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/95700","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/comments?post=95700"}],"version-history":[{"count":0,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/95700\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media?parent=95700"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/categories?post=95700"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/tags?post=95700"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}