{"id":96424,"date":"2017-08-07T12:00:57","date_gmt":"2017-08-07T11:00:57","guid":{"rendered":"https:\/\/www.transcend.org\/tms\/?p=96424"},"modified":"2017-08-07T12:22:56","modified_gmt":"2017-08-07T11:22:56","slug":"cias-dumbo-hacks-pc-cameras-microphones-files-wikileaks","status":"publish","type":"post","link":"https:\/\/www.transcend.org\/tms\/2017\/08\/cias-dumbo-hacks-pc-cameras-microphones-files-wikileaks\/","title":{"rendered":"CIA&#8217;s &#8216;Dumbo&#8217; Hacks PC Cameras, Microphones, Files: WikiLeaks"},"content":{"rendered":"<blockquote><p><em>The whistleblower organization published everything in the <a href=\"https:\/\/www.transcend.org\/tms\/category\/big-brother-spying-surveillance-whistleblowing\/\" >Field Guide to the User\u2019s Manual of the CIA&#8217;s hacking system<\/a>.<\/em><\/p><\/blockquote>\n<div id=\"attachment_96425\" style=\"width: 510px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/08\/cia-dumbo-wikileaks.jpg\" ><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-96425\" class=\"wp-image-96425\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/08\/cia-dumbo-wikileaks.jpg\" alt=\"\" width=\"500\" height=\"283\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/08\/cia-dumbo-wikileaks.jpg 600w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/08\/cia-dumbo-wikileaks-300x170.jpg 300w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/a><p id=\"caption-attachment-96425\" class=\"wp-caption-text\">Dumbo enables agents to either create fake evidence of their intrusion or destroy all real traces of the security break. | Photo: Reuters<\/p><\/div>\n<p><em>3 Aug 2017 &#8211; <\/em>In a press release published today, WikiLeaks <a href=\"https:\/\/www.transcend.org\/tms\/2017\/08\/vault-7-dumbo\/\" >revealed the CIA&#8217;s hacking tool, \u2018Dumbo,\u2019<\/a> which allows agents to manipulate Microsoft Window&#8217;s webcams, microphones, and other devices from thousands of miles away.<\/p>\n<blockquote><p><strong><em>RELATED: <\/em><\/strong><em><a target=\"_blank\" href=\"http:\/\/www.telesurtv.net\/english\/news\/Blackstone-Group-Poised-to-Buy-Stake-in-Israeli-Spyware-Firm-20170723-0018.html\" >Blackstone Group Poised to Buy Stake in Israeli Spyware Firm<\/a><\/em><\/p><\/blockquote>\n<p>The <a target=\"_blank\" href=\"https:\/\/wikileaks.org\/vault7\/#Dumbo\" >Wikileaks report<\/a>, part of its Vault 7 disclosures, stated that Dumbo was created to enable access to a target computer during CIA field operations quickly and almost inconspicuously.<\/p>\n<p>\u201cDumbo can identify, control and manipulate monitoring and detection systems on a target computer running the Microsoft Windows operating system. It identifies installed devices like webcams and microphones, either locally or connected by wireless (Bluetooth, WiFi) or wired network,\u201d WikiLeaks stated in a press release Thursday.<\/p>\n<p>Controlled by a USB stick, field agents are able to gain access to a Windows system from an administration position, assuming the rights to mute microphones, disable all network adapters, and suspend camera recording while notifying the agent of active files to facilitate deleting or corrupting materials.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">RELEASE: CIA project &#39;Dumbo&#39; to switch off security webcams and corrupt recordings to hide physical intrusions <a target=\"_blank\" href=\"https:\/\/t.co\/XucsNTcJO6\" >https:\/\/t.co\/XucsNTcJO6<\/a> <a target=\"_blank\" href=\"https:\/\/t.co\/5xFl28eEKZ\" >pic.twitter.com\/5xFl28eEKZ<\/a><\/p>\n<p>&mdash; WikiLeaks (@wikileaks) <a target=\"_blank\" href=\"https:\/\/twitter.com\/wikileaks\/status\/893061589351399425?ref_src=twsrc%5Etfw\" >August 3, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Additionally, Dumbo enables agents to either create fake evidence of their intrusion or destroy all real traces of the security break.<\/p>\n<p>The whistleblower organization published everything in the Field Guide to the User\u2019s Manual of the program\u2019s hacking system, with reports dating back to 2015.<\/p>\n<p>According to the files, the USB stick must be plugged in at all times during the operation in order for it to work and will only operate on 32bit Windows XP, Windows Vista and Window\u2019s newer operating systems. It is not supported by 64bit Windows XP or any products released before XP.<\/p>\n<p>However, according to the Wikileaks, Windows users are not the only potential victims of CIA probes. Other agency projects such as Imperial will breach almost any technology\u2019s high security with trojans and untraceable stealth tactics, releasing sensitive information to unknown parties.<\/p>\n<p>A report from HackRead detailed all seven of the Vault 7 documents released by Wikileaks.<\/p>\n<p>httpv:\/\/www.youtube.com\/watch?v=8TlCb8HsOo8<\/p>\n<p><a target=\"_blank\" href=\"http:\/\/www.telesurtv.net\/english\/news\/CIAs-Dumbo-Hacks-PC-Cameras-Microphones-Files-WikiLeaks-20170803-0013.html?utm_source=planisys&amp;utm_medium=NewsletterIngles&amp;utm_campaign=NewsletterIngles&amp;utm_content=14\" >Go to Original \u2013 telesurtv.net<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>3 Aug 2017 &#8211; In a press release published today, WikiLeaks revealed the CIA&#8217;s hacking tool, \u2018Dumbo,\u2019 which allows agents to manipulate Microsoft Window&#8217;s webcams, microphones, and other devices from thousands of miles away. The whistleblower organization published everything in the Field Guide to the User\u2019s Manual of the CIA&#8217;s hacking system.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[],"class_list":["post-96424","post","type-post","status-publish","format-standard","hentry","category-whistleblowing-surveillance"],"_links":{"self":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/96424","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/comments?post=96424"}],"version-history":[{"count":0,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/96424\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media?parent=96424"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/categories?post=96424"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/tags?post=96424"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}