Wikileaks Releases Vault 8: Covert Communications Platform For CIA Malware

From Wikileaks press release:

Hive

9 November, 2017

Today, 9 November 2017, WikiLeaks publishes the source code and development logs to Hive, a major component of the CIA infrastructure to control its malware.

Hive solves a critical problem for the malware operators at the CIA. Even the most sophisticated malware implant on a target computer is useless if there is no way for it to communicate with its operators in a secure manner that does not draw attention. Using Hive even if an implant is discovered on a target computer, attributing it to the CIA is difficult by just looking at the communication of the malware with other servers on the internet. 

Hive provides a covert communications platform for a whole range of CIA malware to send exfiltrated information to CIA servers and to receive new instructions from operators at the CIA.

By using a series of computers, each containing specific malware implants, the CIA has the ability to control target computers without detection.

The CIA’s “Embedded Development Branch” (EDB) created HIVE as “a back-end infrastructure malware with a public-facing HTTPS interface which is used by CIA implants to transfer exfiltrated information from target machines to the CIA and to receive commands from its operators to execute specific tasks on the targets.” 

Because of the highly sensitive nature of the source code released by Wikileaks it has been zealously guarded by the CIA and is unlikely to have been exfiltrated by hackers. As a result a joint task force between the FBI and the CIA began looking into hundreds of agency members who might’ve had access to the source code in April immediately after Wikileaks released Vault 7.

At that time CIA Director Mike Pompeo made this statement regarding Wikileaks and its founder Julian Assange:

“Assange and his ilk make common cause with dictators today.  Yes, they try unsuccessfully to cloak themselves and their actions in the language of liberty and privacy; in reality, however, they champion nothing but their own celebrity. Their currency is clickbait; their moral compass, nonexistent.”

Perhaps Pompeo had to say that because the CIA, when run by moral and upstanding men, is an important element of maintaining our national security but far too often the CIA has engaged in illegal activities against the American people under the leadership of less than honorable men.

In 1975, Idaho Senator Frank Church chaired what became known as the Church Committee.  He used that platform to explore the depths that the CIA would stoop to propagandize a political debate.

Then CIA Director William Colby admitted to Church’s committee that under his direction the CIA not only used the mainstream media to influence Americans’ opinions regarding foreign entanglements, including war, but it was also actively engaged in using its contacts in the mainstream media to influence domestic policy.

There was no Internet at that time allowing Colby’s CIA to shield LBJ from the criticism he deserved for his deliberate mismanagement of the Viet Nam War. 

Colby was not the only CIA director to conduct nefarious operation against the American people.  John Brennan, who served both George W Bush and Barack Obama as director, ran a massive spy operation on everyone from corporate and government whistleblowers to Senate staffers.

Is it any wonder that Chuck Schumer warned Donald Trump that he was on thin ice for suggesting that our intelligence agencies – including the CIA – were “manufacturing” narratives to damage him?

As CIA director, Brennan also headed one of the 17 intelligence agencies that propagated the Russian hacking and collusion stories used to discredit Donald Trump and that provided false evidence to a FISA court in order to illegally get approval to conduct surveillance on Trump’s campaign team.

So, when Pompeo accuses Assange and his ilk of making common cause with dictators we have to ask when the CIA hasn’t served our own homegrown dictators, Barack Obama and Hillary Clinton included?