> He claimed that an anti-virus expert, who was not named, had come forward to say that he believed sophisticated malware that he had previously attributed to Iran, Russia and China, now looked like something that the CIA had developed.
That sounds very like something I read on Robert Graham's Mar 7 comments[1] on the leak:
> Already, one AV researcher has told me that a virus they once suspected came from the Russians or Chinese can now be attributed to the CIA, as it matches the description perfectly to something in the leak.
> There's no false flags. In several places, the CIA talks about making sure that what they do isn't so unique, so it can't be attributed to them. However, Wikileaks's press release hints that the "UMBRAGE" program is deliberately stealing techniques from Russia to use as a false-flag operation. This is nonsense. For example, the DNC hack attribution was live command-and-control servers simultaneously used against different Russian targets -- not a few snippets of code.
It wouldn't surprise me - a lot of the stuff they use to identify a malware source just isn't that accurate. Anyone can buy a server from the other side of the world, anyone can put strings in another language into malware and anyone can target a source country starting from a specific provider or VPN.
Once you admit that keeping secret and controlling the release of sensitive information has some 'harm minimization effect' - and therefore that releasing information in the wrong way or to the wrong people is potentially harmful - exactly where does that take the philosophy of 'radical transparency?'
They're advocating for radical transparency of governments and corporations, not individuals - there's a significant difference. Releasing these exploits as is would result in harm to individuals who are unrelated entirely to the CIA or government.
Harmful to whom may be the important question here. I thought the underlying premise of radical transparency was to make it sufficiently difficult to maintain state and corporate secrets that they either give up trying to keep secrets entirely or at least learn to avoid conducting truly shady activities because secrecy is no longer a guaranteed. If that's true then I'd say that admission is a strong endorsement that the practice is at least on sound theoretical ground.
It tells you that the person advocating that philosophy has given themselves license to wield all of that enormous power you're describing, without check or balance.
Wikileaks stopped being about 'radical transparency' when Julian Assange felt personally threatened by Hillary Clinton and Google. Since then the Wikileaks agenda appears to be more about attacking and undermining US policy and standing wherever it can.
Yeah, it'll be interesting here though - they potentially have some pretty major remote exploits and tech firms might be resistant to even patch as those who are unpatched will be left vulnerable to attack. The standard route then is to threaten to publish anyways... This will involve very careful treading on the parts of both wikileaks and the firms involved.
> "a whole section of the CIA is working on Umbrage, a system that attempts to trick people into thinking that they had been hacked by other groups or countries by collecting malware from other nation states, such as Russia."
Wikileaks is dramatically misrepresenting what Umbrage is. There are descriptive documents that explain exactly what it is and how it's meant to be used that were also leaked. Even the Intercept, who aren't exactly friendly to intelligence sources took umbrage (ha) with WL's characterization:
> It would be possible to leave such fingerprints if the CIA were re-using unique source code written by other actors to intentionally implicate them in CIA hacks, but the published CIA documents don’t say this. Instead they indicate the UMBRAGE group is doing something much less nefarious.
> They say UMBRAGE is borrowing hacking “techniques” developed or used by other actors to use in CIA hacking projects. This is intended to save the CIA time and energy by copying methods already proven successful. If the CIA were actually re-using source code unique to a specific hacking group this could lead forensic investigators to mis-attribute CIA attacks to the original creators of the code. But the documents appear to say the UMBRAGE group is writing snippets of code that mimic the functionality of other hacking tools and placing it in a library for CIA developers to draw on when designing custom CIA tools.
I think it's going to be severely abused politically.
I've already seen a few people on the right saying it means the DNC hack was 100% fake.
And I've already seen a security researcher on the left saying it has nothing to do with the results because "they found running C&C servers in that case", like you can't buy C&C servers anywhere in the world that you want.
Neither claim makes any verifiable sense. Hacking attribution is somewhere between hard and impossible if your opponent doesn't want to be found or wants you to find someone else instead.
It's a legitimately interesting program and something to consider when these claims get made. But don't listen the politics of it. It'll be a nightmare.
The CIA pretending to be China, or China pretending to be the CIA, or someone else entirely pretending to be China pretending to be the CIA, or vice versa.
So what are you implying with that ambigous and opaque statement ?
Some possible reasons:
* They comparmentalise information better?
* They don't use private contractors ?
* It's more dangerous to leak material in those countries ?
* ...
* ...
* ...
Likely has a lot to do with the countries themselves. Russia and China have much stricter governments and the values on freedom and privacy aren't as widely respected - so not as many leakers pop up.
Definitely a coincidence that it was within a week of Sessions being taken to task over his involvement with Russia and a Trump adviser being told by the SSCI to retain information about contact with Russia.
We all know there's no chance this is smearing US intel agencies during an investigation.
Don't believe anything from Assange until it's confirmed by the tech companies themselves. Ask the security teams at each of these companies if they received any information from Wikileaks. From the people I know at the affected companies, no one has heard anything yet. Assange should not get the benefit of our trust.
Please make a list of firms which have provided these comments denying that Wikileaks has provided them with information while claiming to have done so. This way others are able to confirm your comment. Otherwise it's really hard to take your comment seriously.
I know it's not normally a good idea to comment about voting and comment position, but there are a lot of people talking about this issue on HN and this comment is one of the few written by someone directly engaged with these issues. If Dan says he hasn't heard anything from any security team he's familiar with, that's not dispositive, but given how connected Dan is, it's certainly a real data point.
I say this because it would make sense to vote a comment like this down if it was just a random opinion. I agree: "don't trust Assange" is kind of a banal sentiment (I share it, but I wouldn't claim it was interesting enough to showcase). But that's not all Dan is saying.
(I haven't heard anything either but, I mean, I've only known about this for about 3 minutes now).
Very few people at these companies would have any idea about the vulnerabilities and even less would know where the reports came from. Big tech companies realize that they employee a lot of people and heavily restrict who can know about the reported vulnerabilities,me specially before they're patched. To think that those "privileged" people would tell you about it is asinine, especially regarding this very high profile event.
"Companies to get" implies future tense, not past. Thus it makes sense the companies have not received them yet. But I agree that confirmation from the companies once they receive would be very nice.
"Assange" the person may not be trustworthy, but Wikileaks the organization he created is, so far, beyond reproach. They have never released false data.
[+] [-] ttctciyf|9 years ago|reply
> He claimed that an anti-virus expert, who was not named, had come forward to say that he believed sophisticated malware that he had previously attributed to Iran, Russia and China, now looked like something that the CIA had developed.
That sounds very like something I read on Robert Graham's Mar 7 comments[1] on the leak:
> Already, one AV researcher has told me that a virus they once suspected came from the Russians or Chinese can now be attributed to the CIA, as it matches the description perfectly to something in the leak.
1: http://blog.erratasec.com/2017/03/some-comments-on-wikileaks...
[+] [-] mikeyouse|9 years ago|reply
> There's no false flags. In several places, the CIA talks about making sure that what they do isn't so unique, so it can't be attributed to them. However, Wikileaks's press release hints that the "UMBRAGE" program is deliberately stealing techniques from Russia to use as a false-flag operation. This is nonsense. For example, the DNC hack attribution was live command-and-control servers simultaneously used against different Russian targets -- not a few snippets of code.
[+] [-] problems|9 years ago|reply
[+] [-] Aqueous|9 years ago|reply
[+] [-] problems|9 years ago|reply
[+] [-] knieveltech|9 years ago|reply
[+] [-] 0xfeba|9 years ago|reply
Uh huh. After the US Election debacle, I'm not so sure of that.
[+] [-] M_Grey|9 years ago|reply
[+] [-] iaw|9 years ago|reply
[+] [-] tssva|9 years ago|reply
[+] [-] Iv|9 years ago|reply
[+] [-] moo|9 years ago|reply
[deleted]
[+] [-] unknown|9 years ago|reply
[deleted]
[+] [-] sand500|9 years ago|reply
[+] [-] cracell|9 years ago|reply
[+] [-] problems|9 years ago|reply
[+] [-] therealmarv|9 years ago|reply
[+] [-] devy|9 years ago|reply
What do you think of Umbrage?
[+] [-] mikeyouse|9 years ago|reply
> It would be possible to leave such fingerprints if the CIA were re-using unique source code written by other actors to intentionally implicate them in CIA hacks, but the published CIA documents don’t say this. Instead they indicate the UMBRAGE group is doing something much less nefarious.
> They say UMBRAGE is borrowing hacking “techniques” developed or used by other actors to use in CIA hacking projects. This is intended to save the CIA time and energy by copying methods already proven successful. If the CIA were actually re-using source code unique to a specific hacking group this could lead forensic investigators to mis-attribute CIA attacks to the original creators of the code. But the documents appear to say the UMBRAGE group is writing snippets of code that mimic the functionality of other hacking tools and placing it in a library for CIA developers to draw on when designing custom CIA tools.
https://theintercept.com/2017/03/08/wikileaks-files-show-the...
[+] [-] problems|9 years ago|reply
I've already seen a few people on the right saying it means the DNC hack was 100% fake.
And I've already seen a security researcher on the left saying it has nothing to do with the results because "they found running C&C servers in that case", like you can't buy C&C servers anywhere in the world that you want.
Neither claim makes any verifiable sense. Hacking attribution is somewhere between hard and impossible if your opponent doesn't want to be found or wants you to find someone else instead.
It's a legitimately interesting program and something to consider when these claims get made. But don't listen the politics of it. It'll be a nightmare.
[+] [-] 086421357909764|9 years ago|reply
[+] [-] swalsh|9 years ago|reply
[+] [-] rfrank|9 years ago|reply
[+] [-] celticninja|9 years ago|reply
[+] [-] ikeyany|9 years ago|reply
Back to pen and paper we go, until that can be compromised too.
[+] [-] plandis|9 years ago|reply
It's probably just a coincidence.
[+] [-] mickronome|9 years ago|reply
Some possible reasons: * They comparmentalise information better? * They don't use private contractors ? * It's more dangerous to leak material in those countries ? * ... * ... * ...
[+] [-] problems|9 years ago|reply
[+] [-] Florin_Andrei|9 years ago|reply
[+] [-] SomeStupidPoint|9 years ago|reply
We all know there's no chance this is smearing US intel agencies during an investigation.
[+] [-] dguido|9 years ago|reply
[+] [-] Ninn|9 years ago|reply
[+] [-] tptacek|9 years ago|reply
I say this because it would make sense to vote a comment like this down if it was just a random opinion. I agree: "don't trust Assange" is kind of a banal sentiment (I share it, but I wouldn't claim it was interesting enough to showcase). But that's not all Dan is saying.
(I haven't heard anything either but, I mean, I've only known about this for about 3 minutes now).
[+] [-] saranagati|9 years ago|reply
[+] [-] filoleg|9 years ago|reply
[+] [-] unknown|9 years ago|reply
[deleted]
[+] [-] Karunamon|9 years ago|reply
[+] [-] unknown|9 years ago|reply
[deleted]
[+] [-] WillyOnWheels|9 years ago|reply
[+] [-] greenyoda|9 years ago|reply
"WikiLeaks was originally established with a "wiki" communal publication method..."
https://en.wikipedia.org/wiki/WikiLeaks#Staff.2C_name_and_fo...
[+] [-] pinaceae|9 years ago|reply
[+] [-] dglass|9 years ago|reply
https://wikileaks.org/-Leaks-.html
[+] [-] unknown|9 years ago|reply
[deleted]