Started By
Message
locked post

The Truth About the WikiLeaks C.I.A. Cache

Posted on 3/11/17 at 10:12 am
Posted by Decatur
Member since Mar 2007
28719 posts
Posted on 3/11/17 at 10:12 am
quote:

In their haste to post articles about the release, almost all the leading news organizations took the WikiLeaks tweets at face value. Their initial accounts mentioned Signal, WhatsApp and other encrypted apps by name, and described them as “bypassed” or otherwise compromised by the C.I.A.’s cyberspying tools.

Yet on closer inspection, this turned out to be misleading. Neither Signal nor WhatsApp, for example, appears by name in any of the alleged C.I.A. files in the cache. (Using automated tools to search the whole database, as security researchers subsequently did, turned up no hits.) More important, the hacking methods described in the documents do not, in fact, include the ability to bypass such encrypted apps — at least not in the sense of “bypass” that had seemed so alarming. Indeed, if anything, the C.I.A. documents in the cache confirm the strength of encryption technologies.

What had gone wrong? There were two culprits: an honest (if careless) misunderstanding about technology on the part of the press; and yet another shrewd misinformation campaign orchestrated by WikiLeaks.


quote:

If anything in the WikiLeaks revelations is a bombshell, it is just how strong these encrypted apps appear to be. Since it doesn’t have a means of easy mass surveillance of such apps, the C.I.A. seems to have had to turn its attention to the harder and often high-risk task of breaking into individual devices one by one.

Which brings us to WikiLeaks’ misinformation campaign. An accurate tweet accompanying the cache would have said something like, “If the C.I.A. goes after your specific phone and hacks it, the agency can look at its content.” But that, of course, wouldn’t have caused alarm and defeatism about the prospects of secure conversations.

We’ve seen WikiLeaks do this before. Last July, right after the attempted coup in Turkey, WikiLeaks promised, with much fanfare, to release emails belonging to Turkey’s ruling Justice and Development Party. What WikiLeaks ultimately released, however, was nothing but mundane mailing lists of tens of thousands of ordinary people who discussed politics online. Back then, too, the ruse worked: Many Western journalists had hyped these non-leaks.

WikiLeaks seems to have a playbook for its disinformation campaigns. The first step is to dump many documents at once — rather than allowing journalists to scrutinize them and absorb their significance before publication. The second step is to sensationalize the material with misleading news releases and tweets. The third step is to sit back and watch as the news media unwittingly promotes the WikiLeaks agenda under the auspices of independent reporting.

The media, to its credit, eventually sorts things out — as it has belatedly started to do with the supposed C.I.A. cache. But by then, the initial burst of misinformation has spread. On social media in particular, the spin and distortion continues unabated. This time around, for example, there are widespread claims on social media that these leaked documents show that it was the C.I.A. that hacked the Democratic National Committee, and that it framed Russia for the hack. (The documents in the cache reveal nothing of the sort.)

As with most misinformation campaigns, the dust that is kicked up obscures concerns over a real issue. Device and information insecurity, overzealous surveillance by governments — these are real concerns that call for real attention. Yes, we need to have extensive and thoughtful discussion of these topics. But that’s not what the WikiLeaks misinformation campaign has given us.


LINK
Posted by roadGator
Member since Feb 2009
140565 posts
Posted on 3/11/17 at 10:13 am to
Decatur/NYT/DR/DV
Posted by NYNolaguy1
Member since May 2011
20900 posts
Posted on 3/11/17 at 10:13 am to
If I root your phone, feel free to encrypt away. I still see everything.
Posted by Decatur
Member since Mar 2007
28719 posts
Posted on 3/11/17 at 10:13 am to
quote:

On Tuesday, Wikileaks published a large cache of CIA documents that it said showed the agency had equipped itself to run its own false-flag hacking operations. The documents describe an internal CIA group called UMBRAGE that Wikileaks said was stealing the techniques of other nation-state hackers to trick forensic investigators into falsely attributing CIA attacks to those actors. According to Wikileaks, among those from whom the CIA has stolen techniques is the Russian Federation, suggesting the CIA is conducting attacks to intentionally mislead investigators into attributing them to Vladimir Putin.

“With UMBRAGE and related projects, the CIA can not only increase its total number of attack types, but also misdirect attribution by leaving behind the ‘fingerprints’ of the groups that the attack techniques were stolen from,” Wikileaks writes in a summary of its CIA document dump

It’s a claim that seems intended to shed doubt on the U.S. government’s attribution of Russia in the DNC hack; the Russian Federation was the only nation specifically named by Wikileaks as a potential victim of misdirected attribution. It’s also a claim that some media outlets have accepted and repeated without question.

“WikiLeaks said there’s an entire department within the CIA whose job it is to ‘misdirect attribution by leaving behind the fingerprints’ of others, such as hackers in Russia,” CNN reported without caveats.

It would be possible to leave such fingerprints if the CIA were re-using unique source code written by other actors to intentionally implicate them in CIA hacks, but the published CIA documents don’t say this. Instead they indicate the UMBRAGE group is doing something much less nefarious.

They say UMBRAGE is borrowing hacking “techniques” developed or used by other actors to use in CIA hacking projects. This is intended to save the CIA time and energy by copying methods already proven successful. If the CIA were actually re-using source code unique to a specific hacking group this could lead forensic investigators to mis-attribute CIA attacks to the original creators of the code. But the documents appear to say the UMBRAGE group is writing snippets of code that mimic the functionality of other hacking tools and placing it in a library for CIA developers to draw on when designing custom CIA tools.

“The goal of this repository is to provide functional code snippets that can be rapidly combined into custom solutions,” notes a document in the cache that discusses the project. “Rather than building feature-rich tools, which are often costly and can have significant CI value, this effort focuses on developing smaller and more targeted solutions built to operational specifications.”

Robert Graham, CEO of Errata Security, agrees that the CIA documents are not talking about framing Russia or other nations.

“What we can conclusively say from the evidence in the documents is that they’re creating snippets of code for use in other projects and they’re reusing methods in code that they find on the internet,” he told The Intercept. “Elsewhere they talk about obscuring attacks so you can’t see where it’s coming from, but there’s no concrete plan to do a false flag operation. They’re not trying to say ‘We’re going to make this look like Russia’.”

The UMBRAGE documents do mention looking at source code, but these reference widely available source code for popular tools, not source code unique to, say, Russian Federation hackers. And the purpose of examining the source code seems to be for purposes of inspiring the CIA code developers in developing their code, not so they can copy/paste it into CIA tools.


quote:

Components the UMBRAGE project has borrowed from include keyloggers; tools for capturing passwords and webcam imagery; data-destruction tools; components for gaining escalated privileges on a machine and maintaining stealth and persistent presence; and tools for bypassing anti-virus detection.

Some of the techniques UMBRAGE has borrowed come from commercially available tools. The documents mention Dark Comet, a well-known remote access trojan, or RAT, that can capture screenshots and keystrokes and grab webcam imagery, among other things. The French programmer who created Dark Comet stopped distributing it after stories emerged that the Syrian government was using it to spy on dissidents. Another tool UMBRAGE highlights is RawDisk, a tool made by the commercial software company Eldos, which contains drivers that system administrators can use to securely delete information from hard drives.

But legitimate tools are often used by hackers for illegitimate purposes, and RawDisk is no different. It played a starring role in the Sony hack in 2014, where the attackers used it to wipe data from Sony’s servers.

It was partly the use of RawDisk that led forensic investigators to attribute the Sony hack to North Korea. That’s because RawDisk had been previously used in 2011 “Dark Seoul” hack attacks that wiped the hard drives and master boot records of three banks and two media companies in South Korea. South Korea blamed the attack on North Korea and China. But RawDisk was also used in the destructive Shamoon attack in 2012 that wiped data from 30,000 systems at Saudi Aramco. That attack wasn’t attributed to North Korea, however; instead U.S. officials attributed it to Iran.

All of this highlights how murky attribution can be, particularly when focused only on the tools or techniques a group uses, and how the CIA is not doing anything different than other groups in borrowing tools and techniques.

“Everything they’re referencing [in the CIA documents] is extremely public code, which means the Russians are grabbing the same snippets and the Chinese are grabbing them and the U.S. is grabbing,” says Graham. “So they’re all grabbing the same snippets of code and then they’re making their changes to it.”

The CIA documents do talk elsewhere about using techniques to thwart forensic investigators and make it hard to attribute attacks and tools to the CIA. But the methods discussed are simply proper operational security techniques that any nation-state attackers would be expected to use in covert operations they don’t want attributed to them. The Intercept wasn’t able to find documents within the WikiLeaks cache that talk about tricking forensic investigators into attributing attacks to Russia. Instead they discuss do’s and don’ts of tradecraft, such as encrypting strings and configuration data in malware to prevent someone from reverse engineering the code, or removing file compilation timestamps to prevent investigators from making correlations between compilation times and the working hours of CIA hackers in the U.S.


LINK
Posted by Navytiger74
Member since Oct 2009
50458 posts
Posted on 3/11/17 at 10:17 am to
quote:

What had gone wrong? There were two culprits: an honest (if careless) misunderstanding about technology on the part of the press; and yet another shrewd misinformation campaign orchestrated by WikiLeaks.
Three. People are foolish and self-obsessed and assume any technology developed will be directed at their boring arse lives.
Posted by Decatur
Member since Mar 2007
28719 posts
Posted on 3/11/17 at 10:20 am to
Yep. Fashion your message for dupes and appeal to their narcissism.
This post was edited on 3/11/17 at 10:21 am
Posted by KCT
Psalm 23:5
Member since Feb 2010
38911 posts
Posted on 3/11/17 at 10:23 am to
quote:

and yet another shrewd misinformation campaign orchestrated by WikiLeaks.




Well, give Julian Assange credit. In 10 years of posting all of this "misinformation," Assange has never once had to post a retraction. That's a lot of misinformation not to have ever once exposed him as being a liar.


PS - Decatur, I'm just curious. Do you ever get tired of ALWAYS being on the wrong side of EVERYTHING? What's your next thread going to be about? How #BLM was right about their narrative of "Hands up, don't shoot!" in the Ferguson case, despite testimony from black eyewitnesses who corroborated the police officer's actions?

Posted by Decatur
Member since Mar 2007
28719 posts
Posted on 3/11/17 at 10:25 am to
quote:

Assange has never once had to post a retraction. That's a lot of misinformation not to have ever once exposed him as being a liar.


That Assange has never posted a retraction has no bearing on the fact that he is a liar and a bullshitter, as many people who know him have attested.
Posted by CamdenTiger
Member since Aug 2009
62454 posts
Posted on 3/11/17 at 10:28 am to
Not saying it is, but if I was in the psych-ops business, I'd write this article...
Posted by Navytiger74
Member since Oct 2009
50458 posts
Posted on 3/11/17 at 10:29 am to
quote:

Yep. Fashion your message for dupes and appeal to their narcissism.
Now that works...

That I can tell you.
Posted by HailHailtoMichigan!
Mission Viejo, CA
Member since Mar 2012
69313 posts
Posted on 3/11/17 at 10:32 am to
Beltway slobs have corrupted your soul
Posted by KCT
Psalm 23:5
Member since Feb 2010
38911 posts
Posted on 3/11/17 at 10:32 am to
quote:

That Assange has never posted a retraction has no bearing on the fact that he is a liar and a bullshitter, as many people who know him have attested.





You're the liar, Decatur. Always have been.

And obtw, I have no doubt that your heroes like Hillary & Podesta don't like him. But, JA definitely exposed the truth about those swamp rats, didn't he?

You must be missing that race-baiting POS Obama pretty bad about right now. But, this sums up Obama's legacy....Psalm 37:35-36
Posted by NYNolaguy1
Member since May 2011
20900 posts
Posted on 3/11/17 at 10:33 am to
quote:

he is a liar and a bullshitter, as many people who know him have attested.



So the Democrats are pissy they lost and claim he's liar. Then you tell me he's a liar and because the Democrats say so, that we are supposed to believe them...

Right.
Posted by KCT
Psalm 23:5
Member since Feb 2010
38911 posts
Posted on 3/11/17 at 10:35 am to
quote:

Beltway slobs have corrupted your soul


Hey, cut the man some slack. He's busy guarding his desk in D.C.
Posted by Navytiger74
Member since Oct 2009
50458 posts
Posted on 3/11/17 at 10:35 am to
quote:

Beltway slobs have corrupted your soul
I don't want any trouble out of you today, Hail. Let's stick to the issue.
Posted by goldennugget
Hating Masks
Member since Jul 2013
24514 posts
Posted on 3/11/17 at 10:37 am to
The CIA owns the media
Posted by cajunangelle
Member since Oct 2012
146956 posts
Posted on 3/11/17 at 10:40 am to
You are in full agreement with Decatur. I do think today may be the day you come out of the closet. Do it before Saint Paddy day so we can drink green beer in celebration of your freedom.
Posted by Navytiger74
Member since Oct 2009
50458 posts
Posted on 3/11/17 at 10:41 am to
quote:

Decatur


Well you did it to yourself. You posted a bunch of long paragraphs and your thread is now infested with a bunch of people who can only read 140 characters--plus a kid who was too weird for Seattle (and Seattle is weird, believe me).
This post was edited on 3/11/17 at 10:43 am
Posted by Navytiger74
Member since Oct 2009
50458 posts
Posted on 3/11/17 at 10:42 am to
quote:

You are in full agreement with Decatur. I do think today may be the day you come out of the closet. Do it before Saint Paddy day so we can drink green beer in celebration of your freedom.
What do you want to hear, Cajun? Just type the words and I'll re-post them.
Posted by KCT
Psalm 23:5
Member since Feb 2010
38911 posts
Posted on 3/11/17 at 10:43 am to
quote:

I do think today may be the day you come out of the closet


He was thrown out of the closet a long time ago.
first pageprev pagePage 1 of 4Next pagelast page

Back to top
logoFollow TigerDroppings for LSU Football News
Follow us on Twitter, Facebook and Instagram to get the latest updates on LSU Football and Recruiting.

FacebookTwitterInstagram