CIA Used ‘UMBRAGE’ Program To Penetrate Network Servers!

57
0
SHARE

Only so many things can shock us nowadays if we have in mind our crazy political life.

However, the realization that the CIA may have been involved in Obama’s wiretapping affair just blew our minds- this has the potential to become the biggest scandal in America.

The CIA is the most unstable political security organization at the moment- even the FBI is not as involved in all safety issues as the CIA is.

The latest  “UMBRAGE” program is the biggest proof of that.

On Thursday, Wikileaks majorly exposed the CIA and released thousands of documents from within the CIA.

This mission is known as “Vault 7.”

The UMBRAGE program allows the CIA to meddle in different networks, and to imitate hacking techniques known all over the world.

However, these methods always leave a “fingerprint” behind.

Imagine how Trump must have been inspected illegally when it was speculated that he had been communicating with Russia!

First off, the CIA was responsible for hacking into the DNC and for leaking Clinton’s emails. The CIA repeated the process with the Russians. Still, the CIA tried to pin all of this on the Russians. When that failed, they tried to blame Trump of having collaborated with Russia.

Below you will find Wikileaks’ revelations about this program: “The CIA’s hand crafted hacking techniques pose a problem for the agency. Each technique it has created forms a “fingerprint” that can be used by forensic investigators to attribute multiple different attacks to the same entity.

“This is analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible. As soon one murder in the set is solved then the other murders also find likely attribution.

“The CIA’s Remote Devices Branch’s UMBRAGE group collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.”

“With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from.”

“UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.”

Well, how about that? isn’t that disgusting?

What do you think of the CIA’s spying techniques? How should they be treated by the country?