Wikileaks released new Vault 7 documents on Thursday, which discloses information on the CIA’s “Marble” software, used to disguise cyber attacks.
The documents that were published give insight on the CIA’s code-named ‘Dumbo’ project.
From a WikiLeaks press release:
Dumbo is a capability to suspend processes utilizing webcams and corrupt any video recordings that could compromise a PAG deployment. The PAG (Physical Access Group) is a special branch within the CCI (Center for Cyber Intelligence); its task is to gain and exploit physical access to target computers in CIA field operations.
Dumbo can identify, control and manipulate monitoring and detection systems on a target computer running the Microsoft Windows operating system. It identifies installed devices like webcams and microphones, either locally or connected by wireless (Bluetooth, WiFi) or wired networks. All processes related to the detected devices (usually recording, monitoring or detection of video/audio/network streams) are also identified and can be stopped by the operator. By deleting or manipulating recordings the operator is aided in creating fake or destroying actual evidence of the intrusion operation.
The first Vault 7 release in March contained some 8,761 documents.
According to Sputniknews.com “Some of the latest releases were dedicated to a CIA project targeting SMS messages sent and received on Android devices and to CIA tools for stealthy hacking of Apple’s operating system.”
The released documents include Dumbo ‘field guides,’ ‘user guides,’ and ‘briefings‘ which say Dumbo is “designed as a PAG entry-operation utility that targets webcams and other monitoring software” and states “PAG requests this capability to deter home security systems that may identify officers or prevent operations.”
According to a released briefing from 2012, “Dumbo is designed to be configured with a set of processes, installed and run from a thumbdrive, and exits upon removal of the drive” and “Dumbo will immediately terminate all configured processes, and disable all NICs for the duration of the operation.”
An NIC is a network interface controller, a hardware device which allows for a computer-to-computer network.
The document release reveals more information on what federally used technologies are capable of doing. An earlier release revealed that they can track the location of a laptop by seeing what WiFi is available to it.
The latest release shows that the CIA is capable of accessing installed devices, including webcams, and can even delete or manipulate recordings.
Be sure to let us know what you think of this shocking revelation; sound off in the comments below.