Difference between revisions of "Wikileaks/Vault 7"
m (→Revelations: typo) |
|||
Line 12: | Line 12: | ||
Vault 7 revealed that [[CIA]] [[malware]] has been infecting Wi-Fi routers since [[2007]]<ref>https://arstechnica.com/security/2017/06/advanced-cia-firmware-turns-home-routers-into-covert-listening-posts/</ref> and that at least since [[2012]] it has had a simple tool to try to collect data from air gapped computers.<ref>https://www.theregister.co.uk/2017/06/22/wikileaks_cia_brutal_kangaroo/</ref> | Vault 7 revealed that [[CIA]] [[malware]] has been infecting Wi-Fi routers since [[2007]]<ref>https://arstechnica.com/security/2017/06/advanced-cia-firmware-turns-home-routers-into-covert-listening-posts/</ref> and that at least since [[2012]] it has had a simple tool to try to collect data from air gapped computers.<ref>https://www.theregister.co.uk/2017/06/22/wikileaks_cia_brutal_kangaroo/</ref> | ||
− | + | If they had abilities to hack into vehicles, that would allow them to carry out “nearly undetectable assassinations”, as [[Wikileaks]] put it, re-igniting debate about the fate of [[Michael Hastings]] who died in a single vehicle car crash in which he sped up and drove into a tree.<ref>http://www.news.com.au/finance/business/media/wikileaks-vault-7-dump-reignites-conspiracy-theories-surrounding-death-of-michael-hastings/news-story/0df1d06403d0223ce1cfc286a1e75325</ref> | |
==Spin== | ==Spin== | ||
''[[The Register]]'' accused Wikileaks of "spinning" some of the data from Vault 7.<ref>http://www.theregister.co.uk/2017/03/31/wikileaks_cia/</ref> | ''[[The Register]]'' accused Wikileaks of "spinning" some of the data from Vault 7.<ref>http://www.theregister.co.uk/2017/03/31/wikileaks_cia/</ref> | ||
+ | |||
+ | ==[[Limited Hangout]]== | ||
+ | |||
+ | A closer look reveals Wikileaks - as in the leaks before - does not provide any new information. That routers that have a feature called "universal plug and play" turned on - which allows the firmware to be updated remotly - are vulnerable is known since these devices were released 15 years ago. Also, Wikileaks does not provide any source code, which could in fact bother the CIA. | ||
+ | |||
+ | The information that "As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks" is self evident, because that's the job of any intelligence agency. The time frame "since 2014" is likely missinformation, because car computers were "hacked" much earlier - simply by using the proprietary control software provided by vendors. | ||
+ | |||
+ | However, the speculative wording what "could" be done "would permit"... may instill feelings of exitement, fear, powerlessness and helplessness in people who are not aware of technical details (in contrast to an all powerfull state apparatus), which fits in the bigger picture of a [[strategy of tension]]. | ||
+ | |||
+ | |||
{{SMWDocs}} | {{SMWDocs}} | ||
==References== | ==References== | ||
{{reflist}} | {{reflist}} |
Revision as of 07:45, 2 December 2017
Date | 7 March 2017 - Present |
---|
Wikileaks' Vault 7 is a series of documents that WikiLeaks began to release on 7 March 2017. It was followed up by Wikileaks/Vault 8 which released source code of some of these exploits.
Contents
Revelations
Vault 7 revealed that CIA malware has been infecting Wi-Fi routers since 2007[1] and that at least since 2012 it has had a simple tool to try to collect data from air gapped computers.[2]
If they had abilities to hack into vehicles, that would allow them to carry out “nearly undetectable assassinations”, as Wikileaks put it, re-igniting debate about the fate of Michael Hastings who died in a single vehicle car crash in which he sped up and drove into a tree.[3]
Spin
The Register accused Wikileaks of "spinning" some of the data from Vault 7.[4]
Limited Hangout
A closer look reveals Wikileaks - as in the leaks before - does not provide any new information. That routers that have a feature called "universal plug and play" turned on - which allows the firmware to be updated remotly - are vulnerable is known since these devices were released 15 years ago. Also, Wikileaks does not provide any source code, which could in fact bother the CIA.
The information that "As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks" is self evident, because that's the job of any intelligence agency. The time frame "since 2014" is likely missinformation, because car computers were "hacked" much earlier - simply by using the proprietary control software provided by vendors.
However, the speculative wording what "could" be done "would permit"... may instill feelings of exitement, fear, powerlessness and helplessness in people who are not aware of technical details (in contrast to an all powerfull state apparatus), which fits in the bigger picture of a strategy of tension.
References
- ↑ https://arstechnica.com/security/2017/06/advanced-cia-firmware-turns-home-routers-into-covert-listening-posts/
- ↑ https://www.theregister.co.uk/2017/06/22/wikileaks_cia_brutal_kangaroo/
- ↑ http://www.news.com.au/finance/business/media/wikileaks-vault-7-dump-reignites-conspiracy-theories-surrounding-death-of-michael-hastings/news-story/0df1d06403d0223ce1cfc286a1e75325
- ↑ http://www.theregister.co.uk/2017/03/31/wikileaks_cia/