Donald Trump and US politics

"
ScrotieMcB schrieb:

My solution to the noise problem is: if Wikileaks dumps dirt on Trump, I'll believe it. Until then, I'm not going to be concerned. Take that as you will.


It's funny how the left used to love Wikileaks, until Wikileaks exposed Hillary Clinton. Now they're alt-right media. LMAO.
"
MrSmiley21 schrieb:
It's funny how the left used to love Wikileaks, until Wikileaks exposed Hillary Clinton. Now they're alt-right media. LMAO.
Speaking of the devil... Holy fuckballs.
"
In what is surely one of the most astounding intelligence own goals in living memory, the CIA structured its classification regime such that for the most market valuable part of "Vault 7" — the CIA's weaponized malware (implants + zero days), Listening Posts (LP), and Command and Control (C2) systems — the agency has little legal recourse.

The CIA made these systems unclassified.

Why the CIA chose to make its cyberarsenal unclassified reveals how concepts developed for military use do not easily crossover to the 'battlefield' of cyber 'war'.

To attack its targets, the CIA usually requires that its implants communicate with their control programs over the internet. If CIA implants, Command & Control and Listening Post software were classified, then CIA officers could be prosecuted or dismissed for violating rules that prohibit placing classified information onto the Internet. Consequently the CIA has secretly made most of its cyber spying/war code unclassified. The U.S. government is not able to assert copyright either, due to restrictions in the U.S. Constitution. This means that cyber 'arms' manufactures and computer hackers can freely "pirate" these 'weapons' if they are obtained. The CIA has primarily had to rely on obfuscation to protect its malware secrets.

Conventional weapons such as missiles may be fired at the enemy (i.e into an unsecured area). Proximity to or impact with the target detonates the ordnance including its classified parts. Hence military personnel do not violate classification rules by firing ordnance with classified parts. Ordnance will likely explode. If it does not, that is not the operator's intent.

Over the last decade U.S. hacking operations have been increasingly dressed up in military jargon to tap into Department of Defense funding streams. For instance, attempted "malware injections" (commercial jargon) or "implant drops" (NSA jargon) are being called "fires" as if a weapon was being fired. However the analogy is questionable.

Unlike bullets, bombs or missiles, most CIA malware is designed to live for days or even years after it has reached its 'target'. CIA malware does not "explode on impact" but rather permanently infests its target. In order to infect target's device, copies of the malware must be placed on the target's devices, giving physical possession of the malware to the target. To exfiltrate data back to the CIA or to await further instructions the malware must communicate with CIA Command & Control (C2) systems placed on internet connected servers. But such servers are typically not approved to hold classified information, so CIA command and control systems are also made unclassified.
"
The CIA's hand crafted hacking techniques pose a problem for the agency. Each technique it has created forms a "fingerprint" that can be used by forensic investigators to attribute multiple different attacks to the same entity.

This is analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible. As soon one murder in the set is solved then the other murders also find likely attribution.

The CIA's Remote Devices Branch's UMBRAGE group collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation.

With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the "fingerprints" of the groups that the attack techniques were stolen from.
When Stephen Colbert was killed by HYDRA's Project Insight in 2014, the comedy world lost a hero. Since his life model decoy isn't up to the task, please do not mistake my performance as political discussion. I'm just doing what Steve would have wanted.
Zuletzt bearbeitet von ScrotieMcB#2697 um 07.03.2017, 15:52:37
Crazy, innit?

Been working my way through it for the last few hours.


Is your TV Off?

On?

Or Fake Off?

:O
Casually casual.

Zuletzt bearbeitet von TheAnuhart#4741 um 07.03.2017, 16:01:34
Regarding CIA:



TL;DR: the CIA can make their own hacks look like foreign hacks. The whole Russia narrative never really had a leg to stand on, but now with Wikileaks releasing Vault 7, it falls apart entirely. Libs who still yell "muh Russia" are literally Alex Jones tier.
GGG banning all political discussion shortly after getting acquired by China is a weird coincidence.
Zuletzt bearbeitet von Xavderion#3432 um 07.03.2017, 16:15:05
"
soneka101 schrieb:
I love how we've got our little kids table watching children's shows as the grown-ups attend to the news.
When Stephen Colbert was killed by HYDRA's Project Insight in 2014, the comedy world lost a hero. Since his life model decoy isn't up to the task, please do not mistake my performance as political discussion. I'm just doing what Steve would have wanted.
DP
Casually casual.

Zuletzt bearbeitet von TheAnuhart#4741 um 07.03.2017, 18:30:57
President Bannon.

Fixed link.

Casually casual.

Zuletzt bearbeitet von TheAnuhart#4741 um 07.03.2017, 18:37:09
"
ScrotieMcB schrieb:
"
soneka101 schrieb:
I love how we've got our little kids table watching children's shows as the grown-ups attend to the news.


Underrated post
Multi-Demi Winner
Very Good Kisser
Alt-Art Alpha’s Howl Winner
Former Dominus Multiboxer
Zuletzt bearbeitet von Manocean#0852 um 07.03.2017, 19:17:26

Beitrag melden

Konto melden:

Meldegrund

Weitere Informationen: