- Joined
- Dec 19, 2008
- Messages
- 24,380
- Reaction score
- 7,805
- Location
- Worldwide
- Gender
- Undisclosed
- Political Leaning
- Conservative
The CIA has a program which imitates Russian hackers called UMBRAGE.
During the election, I recalled one of those in-the-know claiming Hillary's email release could have been an inside job... inside the US Intel services.
Assange also said the emails did not come from the Russians.
The idea that Trump colluded with the Russians is beyond bizarre, but it's all the Demokrats have. When this blows-up in their faces, they're going to have blown a hole double the depth and width for their party to get out of.
To think the Russians didn't want Hillary, who gave them 20% of US Uranium, someone bought off by numerous foreign entities, and is corrupt and pliable is also beyond odd.
Obama, caught on a hot mic told Medvedev to tell Putin he'd have more flexibility to disarm (unilaterally) after the election.
Demokrats have been world-wide Commi Lovers for decades... and now they don't like Russians!!! Find them a threat?!!! ROTFLOL
During the election, I recalled one of those in-the-know claiming Hillary's email release could have been an inside job... inside the US Intel services.
Assange also said the emails did not come from the Russians.
The idea that Trump colluded with the Russians is beyond bizarre, but it's all the Demokrats have. When this blows-up in their faces, they're going to have blown a hole double the depth and width for their party to get out of.
To think the Russians didn't want Hillary, who gave them 20% of US Uranium, someone bought off by numerous foreign entities, and is corrupt and pliable is also beyond odd.
Obama, caught on a hot mic told Medvedev to tell Putin he'd have more flexibility to disarm (unilaterally) after the election.
Demokrats have been world-wide Commi Lovers for decades... and now they don't like Russians!!! Find them a threat?!!! ROTFLOL
[h=3]https://wikileaks.org/ciav7p1/
UMBRAGE[/h]The CIA's hand crafted hacking techniques pose a problem for the agency. Each technique it has created forms a "fingerprint" that can be used by forensic investigators to attribute multiple different attacks to the same entity.
This is analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible. As soon one murder in the set is solved then the other murders also find likely attribution.
The CIA's Remote Devices Branch's UMBRAGE group collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation.
With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the "fingerprints" of the groups that the attack techniques were stolen from.
UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.