This article is from the source 'rtcom' and was first published or seen on . It last changed over 40 days ago and won't be checked again for changes.
You can find the current article at its original source at https://www.rt.com/viral/379864-vault7-pocket-putin-cia/
The article has changed 2 times. There is an RSS feed of changes available.
Previous version
1
Next version
Version 0 | Version 1 |
---|---|
#Vault7: ‘Pocket Putin’ – CIA’s covert listening tool revealed | #Vault7: ‘Pocket Putin’ – CIA’s covert listening tool revealed |
(35 minutes later) | |
WikiLeaks’ massive ‘Year Zero’ release on the CIA’s secret hacking techniques has revealed a covert listening post used by agents which may be named after Russian President Vladimir Putin. | |
According to the confidential data release, the CIA has five secret “listening posts” called ‘Pocket Putin.’ | According to the confidential data release, the CIA has five secret “listening posts” called ‘Pocket Putin.’ |
Listening posts are used to monitor devices, such as computers and phones, which have been hacked with the CIA’s malware implants. Malware is a malicious software used to disrupt or infiltrate computers and mobile devices. | Listening posts are used to monitor devices, such as computers and phones, which have been hacked with the CIA’s malware implants. Malware is a malicious software used to disrupt or infiltrate computers and mobile devices. |
The ‘Pocket Putin’ listening posts are virtual and are stored on a CIA server. | The ‘Pocket Putin’ listening posts are virtual and are stored on a CIA server. |
The posts named after the Russian leader are used by the Operational Support Branch (OSB) of the CIA, which acts as a middleman between CIA operational staff and the agency’s technical support staff. | The posts named after the Russian leader are used by the Operational Support Branch (OSB) of the CIA, which acts as a middleman between CIA operational staff and the agency’s technical support staff. |
CIA case officers make requests to the OSB who then help turn those requests into hacking attacks on CIA targets. | CIA case officers make requests to the OSB who then help turn those requests into hacking attacks on CIA targets. |
The Putin listening posts are stored on the OSB’s big server, known as the ESXi, which is used to deploy and service an array of virtual computers operated by the spy agency. | The Putin listening posts are stored on the OSB’s big server, known as the ESXi, which is used to deploy and service an array of virtual computers operated by the spy agency. |
While the documents don’t detail where the ‘Pocket Putins’ are used, or the content they collect, listening posts are used to monitor and communicate with malware which has already infected computers and other devices. | While the documents don’t detail where the ‘Pocket Putins’ are used, or the content they collect, listening posts are used to monitor and communicate with malware which has already infected computers and other devices. |
According to the documents, the OSB boasts that its projects have “the dankest Trojans and collection tools.” | According to the documents, the OSB boasts that its projects have “the dankest Trojans and collection tools.” |
The ‘Pocket Putin’ appears to be important, as it’s mentioned in the OSB documents warning that the ESXi Server can’t be updated when someone is “utilizing the shellterm, pocket putin etc.” | The ‘Pocket Putin’ appears to be important, as it’s mentioned in the OSB documents warning that the ESXi Server can’t be updated when someone is “utilizing the shellterm, pocket putin etc.” |
Previous version
1
Next version