'cookieChoices = {};'

Governments are instituted among Men,
deriving their just powers from the consent of the governed,
That whenever any Form of Government becomes destructive of these ends,
it is the Right of the People to alter or to abolish it,
and to institute new Government

Friday, March 31, 2017

WikiLeaks Reveals "Marble": Proof CIA Disguises Their Hacks As Russian, Chinese, Arabic

ZeroHedge: WikiLeaks Reveals "Marble": Proof CIA Disguises Their Hacks As Russian, Chinese, Arabic...
WikiLeaks’ latest Vault 7 release contains a batch of documents, named ‘Marble’, which detail CIA hacking tactics and how they can misdirect forensic investigators from attributing viruses, trojans and hacking attacks to their agency by inserted code fragments in foreign languages. The tool was in use as recently as 2016.
Bookmark and Share
posted by Pastorius at permanent link#


Anonymous Anonymous said...


RELEASE: CIA Vault 7 Part 3 "Marble" -- thousands of CIA viruses and hacking attacks could now be attributed https://wikileaks.org/vault7/?marble9#Marble%20Framework … #Vault7

Marble is used to hamper forensic investigators and anti-virus companies from attributing viruses, trojans and hacking attacks to the CIA

CIA's "Marble Framework" shows its hackers use potential decoy languages
(image: https://pbs.twimg.com/media/C8PlNADXUAE4mZd.jpg )

Friday, March 31, 2017 4:55:00 pm  
Anonymous Anonymous said...

Recall...UKGuardian 9/2016: 'A constitutional crisis': the CIA turns on the Senate

Unbeknownst to Jones, Udall or Feinstein, the public reference to the Panetta Review so alarmed the CIA as to prompt a milestone event in its history. Since 2009, the CIA had maintained a firewalled network on which the Senate could view internal documents relevant to its torture inquiry. It was known as RDINet, for “rendition, detention and interrogation.” By mutual agreement, the CIA was not supposed to access the Senate’s side of the network for any reason aside from picayune IT help. But at least five agency officials would surreptitiously transgress the network firewalls, view the Senate investigators’ work, and reconstruct Jones’s emails.

Friday, March 31, 2017 4:58:00 pm  
Blogger Pastorius said...

I have to admit, I am not following the thread of what you are trying to show me.

I'm guessing it is very important. But I am not much of a strategist, nor am I very cunning. My brain does not think in that way.

So I must admit, I am not able to connect the dots on this.

Could you help me understand?

Friday, March 31, 2017 7:39:00 pm  

Post a Comment

Subscribe to Post Comments [Atom]

<< Home

Older Posts Newer Posts