It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Among the key topical revelations is that the CIA can engage in "false flag" cyberattacks which portray Russia as the assailant. Discussing the CIA's Remote Devices Branch's UMBRAGE group, Wikileaks' source notes that it "collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation.Wikileaks' source notes that it "collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation.
originally posted by: introvert
a reply to: RickinVa
Among the key topical revelations is that the CIA can engage in "false flag" cyberattacks which portray Russia as the assailant. Discussing the CIA's Remote Devices Branch's UMBRAGE group, Wikileaks' source notes that it "collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation.Wikileaks' source notes that it "collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation.
So this release has only told us that the CIA "can" engage in false flag cyber attacks and they maintain a library of "attack techniques"?
They "can", but did they offer proof that they actually did engage in those attacks? Also, it does not seem unreasonable that they would catalog those techniques.
Trump isn't just anti-establishment, he's also the destroyer. He will usher in year zero.
Anti-American.. Enjoy it while you have it bc your days are numbered. Give it or we'll take it. Whatever.
www.zerohedge.com...
The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell's 1984, but "Weeping Angel", developed by the CIA's Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.
The attack against Samsung smart TVs was developed in cooperation with the United Kingdom's MI5/BTSS. After infestation, Weeping Angel places the target TV in a 'Fake-Off' mode, so that the owner falsely believes the TV is off when it is on. In 'Fake-Off' mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.
As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.
In other words, the CIA has the ability to hack someone and make it look like the Russians did it.
What if all of this talk of Russia hacking the DNC was actually just the CIA framing Russia. Clearly they have the tech for it.
This could be huge.
originally posted by: butcherguy
originally posted by: introvert
a reply to: RickinVa
Among the key topical revelations is that the CIA can engage in "false flag" cyberattacks which portray Russia as the assailant. Discussing the CIA's Remote Devices Branch's UMBRAGE group, Wikileaks' source notes that it "collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation.Wikileaks' source notes that it "collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation.
So this release has only told us that the CIA "can" engage in false flag cyber attacks and they maintain a library of "attack techniques"?
They "can", but did they offer proof that they actually did engage in those attacks? Also, it does not seem unreasonable that they would catalog those techniques.
I suppose this is where you have to decide how much to trust that the CIA has everyone's best interests at heart.
One day during a Passover, Union soldier Myer Levy of Philadelphia was walking through a captured Virginia town, when he saw a boy sitting on the steps of his house and eating matza. When Levy asked for some, the boy leaped up and ran into the house shouting, “Mother, there’s a damn-Yankee Jew outside!” The boy’s mother came out and invited Levy to return that evening for a Passover meal.
Lingua is composed of two 16' tall cylinders, with text cut with a water jet cutter in Russian, Mandarin Chinese, Ethiopian, French, Spanish, Latin, Greek, and Iroquois.[1] The texts are historical texts from as far back as 1400 BC.[2] The Russian-language section is a quote from Leo Tolstoy's War and Peace (Volume 3, Part 1, beginning of chapter XXII).
Meanwhile, the Russian army is split between three generals, there’s no one commander in chief, and no one is making any preparations for war. While Emperor Alexander is in Poland there’s a ball in his honor.
On the same day Napoleon is crossing the Niemen River, Alexander is partying with his generals in a palace in the city of Vilno.
Helene is there.
Boris is also there, without his wife. Now that he’s rich, he’s not quite so obvious a striver, but he still keeps his eyes on the emperor the whole time he’s in sight.
Suddenly, Alexander is called away by some urgent message.
Boris figures out a way to sneak out into the garden after them and overhears the news about Napoleon advancing with his army.
Alexander is angry and takes it personally.
He writes a sarcastic and angry letter to Napoleon, basically calling him out for being a jerk and not letting diplomacy work. Alexander adds that now there can’t be peace until every single armed Frenchman is out of Russia.
originally posted by: theantediluvian
a reply to: Grambler
In other words, the CIA has the ability to hack someone and make it look like the Russians did it.
What if all of this talk of Russia hacking the DNC was actually just the CIA framing Russia. Clearly they have the tech for it.
This could be huge.
It's possible that the CIA (or another agency) hacked the DNC and framed Russia but is it likely? Nothing (from this release anyway) adds any evidence to advance that particular hypothesis. I scanned through UMBRAGE component library index and I didn't see anything matching what was recovered from the DNC hacks (there were two by all accounts) or for that matter, associated with Cozy Bear/Fancy Bear.
I might have missed something but I also didn't see anything in the text/notes about using the malware captured in the wild for misdirection of attribution.
There might be something else coming down the pipe but it seems to me at least that if WL had anything that pointed to the CIA being behind the hacks, they'd have led with that and it would be getting a LOT of hype.
This just seems like leading commentary by WL to foster an idea that it's possible.
originally posted by: introvert
originally posted by: butcherguy
originally posted by: introvert
a reply to: RickinVa
Among the key topical revelations is that the CIA can engage in "false flag" cyberattacks which portray Russia as the assailant. Discussing the CIA's Remote Devices Branch's UMBRAGE group, Wikileaks' source notes that it "collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation.Wikileaks' source notes that it "collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation.
So this release has only told us that the CIA "can" engage in false flag cyber attacks and they maintain a library of "attack techniques"?
They "can", but did they offer proof that they actually did engage in those attacks? Also, it does not seem unreasonable that they would catalog those techniques.
I suppose this is where you have to decide how much to trust that the CIA has everyone's best interests at heart.
True.
What's important here is that this does not contain proof.
Until such proof is provided, this is not even close to being a smoking gun.