CIA hacker arsenal is very rich
The CIA’s hacking weapons program is huge, and the UK is also involved in research and development.
According to the Wall Street Journal reported on the 9th, the document disclosed by WikiLeaks contains about 500 items of the CIA, each with its own sub-projects, malware and hacking tools. It is reported that the popular Android, Windows, Apple iOS, OSX and Linux operating systems, as well as Internet routers and other network nodes, are the targets of the CIA hacking tools. Xinhua News Agency reported on the 8th that as of the end of 2016, the CIA Network Intelligence Center had more than 5,000 employees, and designed more than 1000 Trojans, viruses and other "weaponized" malicious code.
US White House spokesman Spieser refused to confirm the authenticity of the documents on the 8th, but said that Trump was very worried about the disclosure of the CIA documents. However, former CIA employee Edward Snowden told the Russian satellite network on the 9th that there is no place to suspect the authenticity of these documents.
The Washington Post said on the 8th that people familiar with the matter said that the FBI is preparing a major "hunting activity" to catch the leakers. "WikiLeaks" did not publish its source of documents, but said in its statement that the documents were obtained from the "in an isolated, highly secure network" of the CIA Network Intelligence Center, "the hackers and contractors who worked for the government." The middle of the business was circulated in an unauthorized manner, and one of them provided some files to the 'WikiLeaks'."
A former US intelligence official told the Washington Post that the leak was "very dangerous" and could affect the cooperation between the United States and intelligence agencies such as Australia, Canada, New Zealand, and the United Kingdom.
Electronic enthusiasts eight o'clock: British BBC reported on the 8th that in addition to the malicious program developed by the CIA itself, the British MI5 may also participate in the program development. The BBC also quoted the document as revealed that in addition to the CIA headquarters in Langley, Virginia, the United States has established a second network intelligence base at its consulate in Frankfurt, Germany, responsible for cyber espionage activities in Europe, the Middle East and Africa.The documents revealed revealed that CIA hackers operating in the Frankfurt Consulate were granted diplomatic passports and covered by the US State Department. Once they arrived in Frankfurt, they would not have to go through further border checks to reach the border open countries under the Schengen Agreement.
Reuters reported on the 8th that the German government said on the same day that it is seriously responding to the latest exposure of WikiLeaks, and the Ministry of Foreign Affairs is in close contact with the US authorities on this matter. In 2013, after the “Prism Gate†incident revealed the US’s monitoring behavior against Germany, it caused a diplomatic storm between the two countries.
Major smartphones have vulnerabilities and personal communication records are directly monitored
Following the Snowden incident, the CIA’s vast network of espionage kits was also made public. However, the CIA is clearly not the biggest victim of this incident, but every ordinary person who penetrates the Internet world through various smart terminals.
Integrating the media reports on the CIA hacking toolbox disclosed by WikiLeaks, it is known that cyber espionage mainly includes: developing hacker software that can remotely control smartphones, bypassing mobile phone encryption system to obtain Signal, Weibo, WhatsApp, Telegram and other social software communication content and communication records; trying to invade the car's electronic system, this may be related to assassination; common anti-virus software is not effective for the CIA; CIA has a hacker software library, the software " Stealing from "Russia and other countries, leaving "fake fingerprints" during the attack, misleading investigators.
BBC Technology correspondent Mark Water said that the most interesting thing is the way the CIA deals with Apple and Android smartphones. According to The Washington Post, on the one hand, most smartphones today use iOS and Android operating systems; on the other hand, Apple and Google have always attached importance to protecting their systems. If the "WikiLeaks" broke the news, it will once again intensify the tension between the technology giant and the CIA.
In early 2016, the US Federal Bureau of Investigation asked Apple to develop a software that could unlock Apple's mobile phone to help investigate the Apple phone used by criminal suspects, but Apple rejected the request and said that "this request is too excessive. Will threaten the security of all Apple mobile phone users." Although the two sides disputed this request, the FBI finally found a third party that could unlock the phone.
The New York Times reported on February 23 this year that although the US government did not specify who helped crack the password system of Apple's mobile phone, it was reported that an Israeli security company called Cellebrite helped the FBI.
The US "TC" website reported on the 9th that Apple first gave feedback that most of the vulnerabilities in the Apple system referred to in the "WikiLeaks" public document have been fixed in its latest version, and the company is working hard to solve the new problem. Vulnerability. Google Inc. also said on the 9th that most of the Android systems that have been prepared to fix the file disclosure are missing.
The "WikiLeaks" related documents also specifically pointed out that the hacking program codenamed "Weeping Angel" developed specifically for Samsung Smart TV can set the infected TV to "false shutdown" mode to enable users. I mistakenly think that the TV is off. But in fact, the TV will switch to recording mode in "false shutdown" mode, record the conversation in the room, and send it to a hidden CIA server via the Internet.
In addition, according to the "Wall Street Journal" news, the main hacking procedures disclosed by "WikiLeaks" include "impact drill", "exquisite food", "hive", "shadow" and so on. Among them, "exquisite food" is very deceptive, it seems to be running harmless programs, such as playing slides or playing computer games. The "Hive" is targeted at Internet routers and can establish communication between infected computer systems.
Disclaimer: The electronic reprinted works of E-Commerce Network are as far as possible to indicate the source, and all rights of the owner of the work are not transferred due to the reprint of this site. If the author does not agree to reprint, please inform the site to delete or correct it. Reprinted works may be subject to change in title or content.
Semiconductor Disc Devices(Capsule Type)
Semiconductor Disc Devices(Capsule Type) is the abbreviation of thyristor, also known as silicon controlled rectifier, formerly referred to as thyristor; thyristor is PNPN four-layer semiconductor structure, it has three poles: anode, cathode and control pole; thyristor has silicon rectifier The characteristics of the parts can work under high voltage and high current conditions, and their working processes can be controlled and widely used in electronic circuits such as controlled rectifiers, AC voltage regulators, contactless electronic switches, inverters, and inverters.
Semiconductor Disc Devices,Inverter Thyristor,Phase Control Thyristor,Capsule Type Semiconductor Disc Devices
YANGZHOU POSITIONING TECH CO., LTD. , https://www.cnfudatech.com