WikiLeaks Vault 7

in #cia7 years ago

The first full part of the series, "Year Zero", comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA's Center for Cyber Intelligence.

I'm not going to fill you in on Vault 7 because I feel YOU must read the actual leak and decide what is fact or fiction. I personally believe most of it and to me it's hard not to when Russia hacked the DNC, SNOWDEN, and now having AI robots.

Many wanted to crucify Snowden for they classified as treason but he was able to really give us a good look inside the government and the abilities they have on top of the evil they are doing.

Edward Snowden is an former Central Intelligence Agency employee, and former contractor for the United States government who copied and leaked classified information. He was the voice that convinced great minds like Mark Zuckerman, Steve Jobs, Anonymous to cover up the lens in front of your laptop to prevent your privacy from being streamed from the other side of the spectrum.

Please give Vault 7 a read and come back and comment with your thoughts. Once again, I opted out of leaving details so we can have a great debate on the steemit community thoughts. It will definitely have you second guessing.

Vault 7 link down below.
https://wikileaks.org/ciav7p1/

Sort:  

The questions to ask is is attribution dead? Are forensic fingerprints meaningless now? Now that any attackers can disguise themselves as the CIA, and the CIA can disguise itself as a nation-state, the answer is to yes - to some extent. While it is clear that the CIA (and other organizations) hide their tracks by using foreign tools and using foreign locations, they still use the methodologies for running cyber operations that are unique to their organization. For example, while the CIA may use foreign malware, their methodology for lateral movement in the network is probably unique and distinctive to them and is usually harder to change and disguise. Attribution is possible but should rely less on the identification of a malware, and focus instead on the behaviors and methodologies used by the hackers. In other words, when you want to attribute an attack, look for the TTPs (tactics, techniques and procedures) that are used and always question the source of the code. ....
I hope you like my thoughts....... @joseph

Very interesting. I never thought on the aspect of fingerprints and how it may no longer have any value. You made a great point. The problem with the CIA is that they withhold knowledge to certain sectors and major corporate franchises of the attack and THEIR methodologies on how and which areas were easily penetrated. The CIA can't even prevent their systems from being hacked. The government, in my opinion, is connected to some kind of underground pool and it is all slowly coming to light.
Loved the comment and thank you for making me think of other variables @arjunanku

you are most welcome......

This also brings into question the now widely accepted theory of Russians hacking of the DNC. Just saying.

I ever had prediction it long times ago, it's 1996 while my campus laboraturim runed by operating system windowat 3.11, I said one day at future the genius box would be a serious problem in modern human culture. Today, I am one of the bitter part of it, Including every body else. And I feel in a watch attached by someone else who holds the power. In other parts we are happy to know something is closed even though we really understand that we are being closely watched.

Ironically by the agencies own gathering of intelligence, they have sort of shot themselves. With such a volume of documents, what can a human do but spend the rest of their lives going through and then proving? I love the idea of collectively getting together and trying to give it a dent. Will follow and try to contribute. Much thanks for conceiving the idea.

These are documents that have been acquired over time. Documents that the CIA have had in their possession and various groups of humans have it at their discretion at any given time. Vault 7 is just part 1 of the leaks coming according to multiple sources. We shall see what else some of us have thought to be true but have had no actual grounds to call it facts.

Hay its really a matter of dissection because this a digital age and here. When we generally put alll the data over internet and thus it's really a concern ......

😍A very informative post. Great job. Keep it up! 😍
OpenMusic Steemit Kiss.gif

vote and comment back plz

Great post, I've become to a great site for news. Now i'm going to follow the link, and read about it. Thank you.

Hay you had really and real issue and talk about our security and our privacy and as you said we must have to do a dissection on it.

WikiLeaks , Panama leaks, and Paradise leakes, all become dangerous for politicians and business man due to tax evasion, and money laundering etc. These Leaks are exposing the corr

Coin Marketplace

STEEM 0.16
TRX 0.16
JST 0.032
BTC 59398.61
ETH 2510.08
USDT 1.00
SBD 2.43