rhatto: wikileaks*

140 bookmark(s) - Ordenar por: Data ↓ / Título / Voting / - Bookmarks from other users for this tag

  1. All of this highlights how murky attribution can be, particularly when focused only on the tools or techniques a group uses, and how the CIA is not doing anything different than other groups in borrowing tools and techniques.

    ... »

    “Everything they’re referencing in the CIA documents » is extremely public code, which means the Russians are grabbing the same snippets and the Chinese are grabbing them and the U.S. is grabbing,” says Graham. “So they’re all grabbing the same snippets of code and then they’re making their changes to it.”

    ... »

    The bottom line with the CIA data dump released by Wikileaks is that journalists and others should take care to examine statements made around them to ensure that they’re reporting accurately on the contents.
    https://theintercept.com/2017/03/08/w...code-to-save-time-not-to-frame-russia
    Voting 0
  2. -
    http://mjg59.dreamwidth.org/46952.html
    Voting 0
  3. -
    https://www.theguardian.com/media/201...et-cia-documents-hacking-surveillance
    Tags: , by rhatto (2017-03-07) | Cache | Permalink
    Voting 0
  4. In what is surely one of the most astounding intelligence own goals in living memory, the CIA structured its classification regime such that for the most market valuable part of "Vault 7" — the CIA's weaponized malware (implants + zero days), Listening Posts (LP), and Command and Control (C2) systems — the agency has little legal recourse.

    The CIA made these systems unclassified.

    Why the CIA chose to make its cyberarsenal unclassified reveals how concepts developed for military use do not easily crossover to the 'battlefield' of cyber 'war'.

    To attack its targets, the CIA usually requires that its implants communicate with their control programs over the internet. If CIA implants, Command & Control and Listening Post software were classified, then CIA officers could be prosecuted or dismissed for violating rules that prohibit placing classified information onto the Internet. Consequently the CIA has secretly made most of its cyber spying/war code unclassified. The U.S. government is not able to assert copyright either, due to restrictions in the U.S. Constitution. This means that cyber 'arms' manufactures and computer hackers can freely "pirate" these 'weapons' if they are obtained. The CIA has primarily had to rely on obfuscation to protect its malware secrets.
    https://wikileaks.org/ciav7p1
    Voting 0
  5. -
    https://firstlook.org/theintercept/20...tical-and-financial-targets-wikileaks
    Tags: , , , , by rhatto (2015-07-04) | Cache | Permalink
    Voting 0
  6. -
    http://www.cartacapital.com.br/revista/857/os-alvos-do-tio-sam-9756.html
    Tags: , , , , by rhatto (2015-07-04) | Cache | Permalink
    Voting 0
  7. -
    http://apublica.org/2015/07/wikileaks...pessoal-de-dilma-e-aviao-presidencial
    Tags: , , , , by rhatto (2015-07-04) | Cache | Permalink
    Voting 0
  8. -
    https://wikileaks.org/nsa-brazil
    Tags: , , , , by rhatto (2015-07-04) | Cache | Permalink
    Voting 0
  9. What Thordarson did not know at the time was that Sabu, the loudmouth figurehead of LulzSec and one of the hackers he was communicating with, was in fact working as an FBI informant—and the online chat about hacking Icelandic government infrastructure was apparently being monitored by the feds. About four days later, the FBI contacted Icelandic authorities to warn them about an “imminent” hacking attack, according to Iceland’s state prosecutor, and this prompted Icelandic police to travel to the United States to discuss the matter. (Sabu, it later turned out, was a then-28-year-old hacker from New York named Hector Monsegur. The FBI reportedly tracked him to his Lower East Side apartment in early June 2011 and managed to “flip” him, because he was the guardian of two young children and desperate to stay out of jail.)

    ... »

    Being at the center of the action had given Thordarson the adrenaline rush he was looking for. But the contact with LulzSec, which he had initiated, made him feel like he had gone too far. He was worried that in maintaining contact with the hackers, he was “breaking quite a lot of laws.” Meanwhile, news reports were saying that the U.S. government was already investigating WikiLeaks for its publication of classified documents, including the Collateral Murder video, diplomatic cables, and military war logs from Afghanistan and Iraq. And just as Thordarson was getting anxious about the high-stakes international affairs he had become entangled with, he also seems to have become bored with WikiLeaks—and he now admits he wanted to embark on a new adventure.
    http://www.slate.com/articles/technol...s_volunteer_turned_fbi_informant.html
    Tags: , by rhatto (2015-06-26) | Cache | Permalink
    Voting 0
  10. -
    http://www.newrepublic.com/article/12...really-going-trade-services-agreement
    Tags: , , , by rhatto (2015-06-11) | Cache | Permalink
    Voting 0

Top of the page

First / Anterior / Próximo / Last / Página 1 de 14 fluxo de links: Tags: wikileaks

Sobre - Propulsed by SemanticScuttle