WikiLeaks: CIA tool to track FBI and NSA

WikiLeaks has just published another hacking tool developed by the CIA. But this time the intelligence does not target companies or citizens of the United States, but colleagues from other intelligence agencies such as the NSA, the FBI and the Department of Homeland Security.

The tool was named ExpressLane, and was created to help the CIA access information that other services refused to share with them, such as biometric data.WikiLeaks

The CIA provided cooperating agencies with technical support for one collection of biometric data. As part of this cooperation with other intelligence agencies, the NSA and the FBI have agreed to share the biometric data they collect with the CIA. However, in the event that any of the above services did not deliver the agreed data, the CIA had a backup plan.

The ExpressLane is available as an up-to-date version of the biometric data collection software, so every time an update was circulated, checks were automatically made on what each partner is hiding.

WikiLeaks says this update did not make any changes to the program itself, which could trigger the IT security solutions but collected the data on a USB stick for agents to inspect later.

In addition, the ExpressLane application was developed from scratch to be undetectable, and if some CIA partners found anything suspicious, it could self-destruct.

"The key components of the OTS system are based on the products of Cross Match, an American company specializing in biometric software for law enforcement and the Information Community.

"In 2011 there were headlines that the US military used a Cross Match product to track down Osama bin Laden during the assassination operation in Pakistan," WikiLeaks reported.

The current leak is part of a larger series called Vault 7.

Please be reminded that Wikileaks is releasing documents in the Vault 7 series from 7 2017 March, expounding more and more Coca-Cola tools.

Year Zero: CIA exploits popular hardware and software.
Weeping Angel: the spy tool that the service uses to infiltrate televisions, turning them into covert microphones.
Dark Matter: exploits targeting iPhones and Mac.
Marble: the source code of a secret anti-forensic framework. It is basically a obfuscator that CIA uses to hide the real source of malware.
Grasshopper: a framework that allows the information service to easily create custom malicious software to violate Microsoft Windows and bypass any virus protection.
Archimedes: a MitM attack tool allegedly created by the CIA for targeting computers within a local area network (LAN).
Scribbles: a software designed to add 'web beacons' to classified documents to allow intelligence to monitor leaks.
Athena:is designed to fully acquire full control over infected Windows computers, allowing the CIA to perform many functions on the target machine, such as deleting data or installing malicious software, data theft, and sending them to CIA servers.
CherryBlossom: a tool that tracks the online activity of a target, redirects the browser, crawls e-mail addresses and phone numbers, and more through the router.
Brutal Kangaroo:tool that can be used to infect computers with malware.
ELSA: Windows malware used by the CIA to identify the location of a particular user using his computer's Wi-Fi.
OutlawCountry: Linux malware that the CIA uses to determine the location of a particular user using its computer's Wi-Fi.
BothanSpy - Gyrfalcon: for SSH authentication theft from Windows and Linux respectively
HighRise: the CIA tool for tracking and redirecting SMS messages to a remote server.
Achilles, Aeris and SeaPea: malicious spyware and data transfer software from MacOS and Linux

Dumbo: blocks cameras, microphones, and surveillance software.
CouchPotato: CIA tool for stealing streaming video from IP Webcams
ExpressLane: CIA tool to monitor colleagues at the FBI and the NSA

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).