LIBERTY DOGS DIGS INTO VAULT 7, PART 2: “PRIVILEGE ESCALATION COMPONENTS”

Jack Shearing (3/13/2017)

The information transparency and government accountability watchdog organization, WikiLeaks, has just released a major bombshell, the “Vault 7” CIA documents. These documents are TOP SECRET and incredibly incriminating. The Wikileaks press release says, “Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized ‘zero day’ exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.” Liberydogsnews.com has delved deep into these TOP SECRET documents and will be releasing over the coming days in depth analysis’ of some of the most intriguing aspects of these documents. Join us for Part 2 of our research analysis into the CIA’s lost treasure trove of secret documents.

Perhaps some of the most heinous hacking techniques utilized by the CIA against the citizens its tasked with protecting are “Privilege Escalation Maneuvers”,

The files cataloged here are used roadmaps to be used by CIA agents who wish to remotely control the computers of American citizens. “Privilege Escalation” is a type of hacking that exploits bugs or design flaws in a computers operating system to grant outside actors control over a computer in the same way a user has control over his or her system. As a result, these hacks permit CIA agents direct control over the targeted device without the permission or consent of the user.

Here is a snippet of the code ultilized by the CIA,

While it appears to look like nonsense, it’s actually the executable backdoor developed by the CIA to remotely take control over windows devices.  The overview provided to agents in the leaked files explains how it works. UAC means “User Access Controls”, “Windows 7 includes a feature that enables approved applications running with Admin privileges to perform system operations without the UAC prompt. One method an application can use to do this is to create an “Elevated COM Object” and use it to perform the operation. For example, a DLLloaded into explorer.exe can create an elevated IFileOperation object and use it to delete a file from the Windows directory. This technique can be combined with process injection to produce a more direct UAC bypass.”

Here they state clearly that their goal is with this program to bypass Windows 7’s UAC security. Thereby granting the CIA the ability to plant pictures, delete stored documents, take pictures or access the devices webcam.

Before these leaks, I thought stuff like this was all science fiction. Alas, the old moniker, “truth is stranger than fiction” prevails again. One reason why this is so scary is because these tools have been kept away from public inquiry or investigation. If these tools were being used lawfully why not disclose their existence?

 

 

Leave a reply

Your email address will not be published. Required fields are marked *