I'm not sure if WikiLeaks is blocked on my network, and I don't care to find out the hard way.
Anyone care to recap?
Just the highlights.
I'm not sure if WikiLeaks is blocked on my network, and I don't care to find out the hard way.
Anyone care to recap?
Just the highlights.
Well, for one,
Hack your phone, my phone, everyone's phone. Computers, TV's, your toaster.
They have the ability to steal, for example, Russian hacking software and compromise it and thus be able to say, hack the DNC and make it look like someone else did it AND be pretty bad ass at Call of Duty 5...at the same time.
Now this is interesting.
Overall it sounds like the Actual CIA is pretty much the same as the Hollywood Movie Version of the CIA.
The CIA's Remote Devices Branch's UMBRAGE group collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation.
With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the "fingerprints" of the groups that the attack techniques were stolen from.
And I have no doubt that the Russians have hackers who can hack .....
I wonder if the CIA could have "hacked" our own election with Russian "fingerprints".
this is why the whole 'Russians hacked the Election' meme is stupid, there is NO WAY the GRU / FSB would leave any finger prints like 'hacking' from Russian IP's
I wonder if the CIA could have "hacked" our own election with Russian "fingerprints".
The biggest problem with the whole hacking thing is that the people who got the files said they got them from DNC insiders. While the DNC (and others) may have been hacked, that seems to have nothing to do with the release of the information.
It's the damnedest thing how this story has evolved. It is THE 'fake' news example of our era.
And I have no doubt that the Russians have hackers who can hack the stuff CIA hacked so that they can make it look like we were trying to make it look like they did it. So, in effect, they get what they want, the hack, and we get the blame because they can make our hack of their hack look like...a hack. As far as we know....