Julian Assange promised 2017 will be a big year for WikiLeaks and it appears they’re building up to a coming big release by tweeting cryptic messages.
A photograph of the Svalbard Global Seed Vault tweeted on Feb 4th.
https://jimmysllama.files.wordpress....7-pm.png?w=748
A photograph of the Merker Mine in Germany tweeted on Feb 5th.
https://jimmysllama.files.wordpress....1-pm.png?w=748
A photograph of a Pratt & Whitney F119 jet engine being tested in a “Hush House” at Langley Air Force Base tweeted on Feb 6th.
https://jimmysllama.files.wordpress....5-pm.png?w=748
Short biographies of Bradley Manning, Julian Assange, and Edward Snowden tweeted on Feb 7th.
https://jimmysllama.files.wordpress....4-am.png?w=748
A photograph taken on February 27, 2013, of Staff Sgt. Boyd, 509th Civil Engineer Squadron structural supervisor, welding a box blade for a snow plow tweeted on Feb 8th.
https://jimmysllama.files.wordpress....9-am.png?w=748
Credit for images of tweets and information about the featured photographs goes to this report HERE. The report contains a little more information on the photographs and other information, including information about another account on Twitter who claims to have solved the riddle of #Vault7 and has been tweeting out hints.
Update:
A photograph, originally taken by the secret police of East Germany (STASI), was discovered by photographer Simon Menner after searching the Secret STASI archives, tweeted on Feb 9th.
https://s27.postimg.org/kx09i10ib/vault76_2.jpg
* * *
UPDATE : RELEASE: CIA espionage orders for the 2012 French presidential election (Feb 18, 2017)
All major French political parties were targeted for infiltration by the CIA's human and electronic spies in the seven months leading up to France's 2012 presidential election.
See post #41 for details.
UPDATE : RELEASE: Vault 7: CIA Hacking Tools Revealed - Year Zero (March 6th, 2017)
A series of leaks on the U.S. Central Intelligence Agency. Code-named "Vault 7" by WikiLeaks, it is the largest ever publication of confidential documents on the agency.
See post #54 for details.
UPDATE : RELEASE: Vault 7: Projects - Dark Matter (Mar 23, 2017)
Today, March 23 2017, WikiLeaks releases Vault 7 "Dark Matter", which contains documentation for several CIA projects that infect Apple Mac Computer firmware.
See post #201 for details (see also #200).
UPDATE : RELEASE: Vault 7: Projects - Marble Framework (Mar 31, 2017)
Today, March 31st 2017, WikiLeaks releases Vault 7 "Marble" -- 676 source code files for the CIA's secret anti-forensic Marble Framework.
See post #209 for details (see also #208).
UPDATE : RELEASE: Vault 7: Projects - Grasshopper (April 7, 2017)
Today, April 7th 2017, WikiLeaks releases Vault 7 "Grasshopper" -- 27 documents from the CIA's Grasshopper framework, a platform used to build customized malware payloads for Microsoft Windows operating systems.
See post #218 for details.
UPDATE : RELEASE: Vault 7: Projects - Hive (April 14, 2017)
Six documents from the CIA's HIVE project created by its "Embedded Development Branch" (EDB). HIVE is a back-end infrastructure malware with a public-facing HTTPS interface which is used by CIA implants to transfer exfiltrated information from target machines to the CIA and to receive commands from its operators to execute specific tasks on the targets.
See post #235 for details.
UPDATE : RELEASE: Vault 7: Projects - Weeping Angel (April 21, 2017)
The User Guide for CIA's "Weeping Angel" tool - an implant designed for Samsung F Series Smart Televisions. Based on the "Extending" tool from MI5/BTSS, the implant is designed to record audio from the built-in microphone and egress or store the data.
See post #244 for details.
UPDATE : RELEASE: Vault 7: Projects - Scribbles (April 28, 2017)
Documentation and source code for CIA's "Scribbles" project, a document-watermarking preprocessing system to embed "Web beacon"-style tags into documents that are likely to be copied by Insiders, Whistleblowers, Journalists or others. The released version (v1.0 RC1) is dated March, 1st 2016 and classified SECRET//ORCON/NOFORN until 2066.
See post #264 for details (see also #263).
UPDATE : RELEASE: Vault 7: Projects - Archimedes (May 5, 2017)
"Archimedes" is a tool used by the CIA to attack a computer inside a Local Area Network (LAN), usually used in offices.
See post #271 for details (see also #269 & #270).
UPDATE : RELEASE: Vault 7: Projects - AfterMidnight (May 12, 2017)
"AfterMidnight" and "Assassin", are two CIA malware frameworks for the Microsoft Windows platform.
See post #278 for details (see also #277).
UPDATE : RELEASE: Vault 7: Projects - Athena (May 19, 2017)
"Athena" - like the related "Hera" system - provides remote beacon and loader capabilities on target computers running the Microsoft Windows operating system (from Windows XP to Windows 10).
See post #279 for details.
UPDATE : RELEASE: Vault 7: Projects - Pandemic (June 1, 2017)
"Pandemic" is a persistent implant for Microsoft Windows machines that share files (programs) with remote users in a local network.
See post #284 for details.
UPDATE : RELEASE: Vault 7: Projects - Cherry Blossom (June 15, 2017)
CherryBlossom was developed and implemented with the help of the US nonprofit Stanford Research Institute (SRI International). CherryBlossom provides a means of monitoring the Internet activity of and performing software exploits on Targets of interest. In particular, CherryBlossom is focused on compromising wireless networking devices, such as wireless routers and access points (APs), to achieve these goals.
See post #289 for details.
UPDATE : RELEASE: Vault 7: Projects - Brutal Kangaroo (June 22, 2017)
Brutal Kangaroo is a tool suite for Microsoft Windows that targets closed networks by air gap jumping using thumbdrives. Brutal Kangaroo components create a custom covert network within the target closed network and providing functionality for executing surveys, directory listings, and arbitrary executables.
See post #291 for details.
UPDATE : RELEASE: Vault 7: Projects - Elsa (June 28, 2017)
ELSA is a geo-location malware for WiFi-enabled devices like laptops running the Micorosoft Windows operating system.
See post #302 for details (see also #299).
UPDATE : RELEASE: Vault 7: Projects - OutlawCountry (June 29, 2017)
OutlawCountry is a project of the CIA that targets computers running the Linux operating system. OutlawCountry allows for the redirection of all outbound network traffic on the target computer to CIA controlled machines for ex- and infiltration purposes.
See post #302 for details.
UPDATE : RELEASE: Vault 7: Projects - BothanSpy (July 6, 2017)
Documents from the BothanSpy and Gyrfalcon projects of the CIA. The implants described in both projects are designed to intercept and exfiltrate SSH credentials but work on different operating systems with different attack vectors.
See post #305 for details.
UPDATE : RELEASE: Vault 7: Projects - Highrise (July 13, 2017)
HighRise is an Android application designed for mobile devices running Android 4.0 to 4.3. It provides a redirector function for SMS messaging that could be used by a number of IOC tools that use SMS messages for communication between implants and listening posts. HighRise acts as a SMS proxy that provides greater separation between devices in the field ("targets") and the listening post (LP) by proxying "incoming" and "outgoing" SMS messages to an internet LP. Highrise provides a communications channel between the HighRise field operator and the LP with a TLS/SSL secured internet communication.
See post #306 for details.
UPDATE : RELEASE: Vault 7: Projects - UCL / Raytheon (July 19, 2017)
Raytheon Blackbird Technologies is the CIA contractor for the "UMBRAGE Component Library" (UCL) project. The documents were submitted to the CIA between November 21st 2014 (just two weeks after Raytheon acquired Blackbird Technologies to build a Cyber Powerhouse) and September, 11th 2015. They mostly contain Proof-of-Concept ideas and assessments for malware attack vectors - partly based on public documents from security researchers and private enterprises in the computer security field.
See post #308 for details.
UPDATE : RELEASE: Vault 7: Projects - Imperial (July 27, 2017)
Achilles is a capability that provides an operator the ability to trojan an OS X disk image (.dmg) installer with one or more desired operator specified executables for a one-time execution. Aeris is an automated implant written in C that supports a number of POSIX-based systems (Debian, RHEL, Solaris, FreeBSD, CentOS). SeaPea is an OS X Rootkit that provides stealth and tool launching capabilities.
See post #312 for details (see also #309).
UPDATE : RELEASE: Vault 7: Projects - Dumbo (August 3, 2017)
Dumbo is a capability to suspend processes utilizing webcams and corrupt any video recordings that could compromise a PAG deployment.
See post #312 for details (see also #310).
UPDATE : RELEASE: Vault 7: Projects - CouchPotato (August 10, 2017)
CouchPotato is a remote tool for collection against RTSP/H.264 video streams. It provides the ability to collect either the stream as a video file (AVI) or capture still images (JPG) of frames from the stream that are of significant change from a previously captured frame.
See post #315 for details (see also #314).
UPDATE : RELEASE: Vault 7: Projects - ExpressLane (August 24, 2017)
These documents show one of the cyber operations the CIA conducts against liaison services -- which includes among many others the National Security Agency (NSA), the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI).
See post #317 for details (see also #316).
UPDATE : RELEASE: Vault 7: Projects - Angelfire (August 31, 2017)
Angelfire is an implant comprised of five components: Solartime, Wolfcreek, Keystone (previously MagicWand), BadMFS, and the Windows Transitory File system. Like previously published CIA projects (Grasshopper and AfterMidnight) in the Vault7 series, it is a persistent framework that can load and execute custom implants on target computers running the Microsoft Windows operating system (XP or Win7).
See post #320 for details (see also #318).
UPDATE : RELEASE: Vault 7: Projects - Protego (Sept 7, 2017)
The Protego project is a PIC-based missile control system that was developed by Raytheon. The documents indicate that the system is installed on-board a Pratt & Whitney aircraft (PWA) equipped with missile launch systems (air-to-air and/or air-to-ground).
See post #323 for details.
UPDATE : RELEASE: Vault 8: Hive (Nov 9, 2017)
The source code and development logs to Hive, a major component of the CIA infrastructure to control its malware.
See post #335 for details (see also #333 & #334).
For more information about this thread see post #224 under the "Some information about this thread" heading.