WikiLeaks Doc Dump Shows CIA Disguised Hacking Using Code Making Hacks Look Like Originating From Russia or China

WikiLeaks’ has released a a series of documents called ‘Vault 8’, which is pretty damning for the CIA, and puts serious questions and doubt into the government’s claims that “Russia Hacked America” leading up to the 2016 Presidential Election.

Yea, I’m sure that Russia and China are always trying to hack into the sensitive areas of American networks, including the government, but now we know that some of the hacking is being done, probably illegally, by our own CIA, and masking their activities to make them look like the Russians or Chinese did it.

Why would the CIA hide the fact that they are spying on Americans, using unknowing legitimate companies, and code that made it look like the Russians or Chinese were doing the hacking? Because it is illegal for the CIA to spy on Americans, and they know this, so the only way to cover their asses was to make it look like some other evil country is doing the hacking.

“The CIA multi-platform hacking suite ‘Hive’ was able to impersonate existing entities to conceal suspicious traffic from the user being spied on, the source code of the malicious program indicates. The extraction of information would therefore be misattributed to an impersonated company, and at least three examples in the code show that Hive is able to impersonate Russian cybersecurity company Kaspersky Lab”

The DNC knew that their network systems had been breached, and actually watched the hackers in their systems, as the DNC refused to take the system down and rebuild it with higher security.

“For a whole month, CrowdStrike watched Cozy Bear and Fancy Bear operating. Cozy Bear was the hacking force that had been in the DNC system for nearly a year.”

Cozy Bear and Fancy Bear are cybersecurity firms that have reported ties with Russian hackers. Both groups are blamed for the hacks on the DNC in 2016. CrowdStrike is a private U.S. cybersecurity firm that oversaw the protection of the DNC’s servers.

So, the DNC, who seemed to be up in arms that “Russia hacked our election” (which is bullshit) actually watched hackers infiltrate the DNC’s network, but did nothing to stop it because it might harm some Democrat’s campaign. All I need to know.

WikiLeaks has published hundreds more files today which it claims show the CIA went to great lengths to disguise its own hacking attacks and point the finger at Russia, China, North Korea and Iran.

The 676 files released today are part of WikiLeaks’ Vault 7 tranche of files and they claim to give an insight into the CIA’s Marble software, which can forensically disguise viruses, trojans and hacking attacks.

WikiLeaks says the source code suggests Marble has test examples in Chinese, Russian, Korean, Arabic and Farsi (the Iranian language).

It says: ‘This would permit a forensic attribution double game, for example by pretending that the spoken language of the malware creator was not American English, but Chinese.’
This could lead forensic investigators into wrongly concluding that CIA hacks were carried out by the Kremlin, the Chinese government, Iran, North Korea or Arabic-speaking terror groups such as ISIS.

WikiLeaks, whose founder Julian Assange remains holed up in the Ecuadorean Embassy in London, said Vault 7 was the most comprehensive release of US spying files ever made public.
Earlier this month WikiLeaks published thousands of documents claiming to reveal top CIA hacking secrets, including the agency’s ability to infiltrate encrypted apps, break into smart TVs and phones and program self-driving cars.

It also claims the CIA can bypass the encryption of Whatsapp, Signal, Telegram, Wiebo, Confide and Cloakman by hacking the smart phones the applications run on.

The CIA was also looking at hacking the vehicle control systems used in modern cars and trucks, WikiLeaks claims.

Read more: http://www.dailymail.co.uk/news/article-4367746/WikiLeaks-says-CIA-disguised-hacking-Russian-activity.html

Stand Up To Government Corruption and Hypocrisy – usbacklash.org