It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Today, March 23rd 2017, WikiLeaks releases Vault 7 "Dark Matter", which contains documentation for several CIA projects that infect Apple Mac Computer firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA's Embedded Development Branch (EDB). These documents explain the techniques used by CIA to gain 'persistence' on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware.
But why?
originally posted by: MotherMayEye
a reply to: Necrose
Bad news for Mac users, like me.
originally posted by: o0oTOPCATo0o
Pretty scary stuff.
If they can do all of that,I'm sure they could plant evidence and/or show fake data trails to fit a narrative or set up scape goats.
There is no privacy anymore.
No truth, no privacy... terrible times nowadays.
originally posted by: o0oTOPCATo0o
Pretty scary stuff.
If they can do all of that, I'm sure they could plant evidence and/or show fake data trails to fit a narrative or set up scape goats.
There is no privacy anymore.
No truth, no privacy... terrible times nowadays.
originally posted by: FamCore
a reply to: Necrose
or is Wikileaks all "part of the plan"
I'm still wondering this. Could it be a PSYOP to rile people up and see which disgruntled citizens are a "threat" to the larger agenda??
I was thinking that if you have a digital screne that a portion of it could be digitally configured into a camera or a mic .
This is something I thought about a long time ago but never mentioned publicly. I might as well now since it is probably already happening. Any speaker including ear buds can be a microphone. All you have to do is plug it in to the mic port. Or, if wired internally, just switch it remotely from speaker to mic any time you want. Got five speakers in that sound bar aimed right at you? Are you sure one of them isn't listening instead of talking?
It’s common to check up on tracking information when you’re waiting on a package, but at least occasionally, that tracking data is omitting a quick stop off at the NSA. According to a new report in Der Spiegel, the NSA regularly intercepts shipments of laptops and other electronic devices in order to implant physical listening devices and install advanced malware. This process, called interdiction, can give authorities instant remote access to a subject’s computer without them being any the wiser.
Interdiction is undertaken by the NSA’s superhacker team known at Tailored Access Operations (TAO). It is not impossible to deliver malware to a target computer after the fact, but the risk is far lower if the surveillance tools can be installed before a device reaches the buyer. TAO is reportedly able to divert a package to its network of secret workshops where the modifications can be made before returning the packages to the shipping company.
The NSA has what Der Spiegel describes as a catalog of spy tools with pricing and feature details. The 50-page document lists tools to compromise hardened systems made by the likes of Cisco, Juniper Networks, Huawei, Western Digital, Microsoft, and Samsung. The prices for these attacks, maintained by an internal group known as ANT, can reach as high as $250,000. Although, when it comes to secret NSA software vulnerabilities, you get what you pay for.
When the NSA is unable to get its hands on a device as it is being shipped, it will sometimes attempt to gain physical access with the help of the CIA and FBI. Agents from the NSA are occasionally ferried around on FBI jets to plant wiretaps, which may only take a few minutes. With the work done, the agent will hop another FBI plane and vanish like a specter in the night.