CIA fears the chinese overlords

Discussion in 'The Round Robin' started by Apocales, Mar 9, 2017.

  1. Apocales 4:35a.m. just one more episode..

    Member Since:
    Apr 20, 2010
    Message Count:
    Your head - rent free.
    Ratings Received:
    +13,269 / 84 / -145
    How do you frustrate a CIA hacker? Show them Chinese

    New WikiLeaks documents reveal US government agent stymied by a dialogue box in Chinese during an attempted hack


    How do you frustrate a CIA hacker? Show them Chinese. In one of the 8,761 new documents released by WikiLeaks on Tuesday, which exposed the CIA’s global cyberespionage operations on an unprecedented scale, an agent on China missions lamented the language barrier. “I do not speak Chinese,” he wrote in an internal post in 2014. The confidential documents and files released by WikiLeaks were said to have come from an isolated, high-security cyberattack facility operated by the CIA’s Centre for Cyber Intelligence in Langley, Virginia. WikiLeaks had replaced the names of actual persons with code numbers.
    A dialogue box in Chinese had kept popping up on screen as the agent tried to install a test program on a computer running the Windows operating system. Unable to understand what the box said, he tried everything from setting the system region to an English-speaking zone to forcing the program installer to use English. The agent seemed to be experienced, having worked at the facility since 2009, according to a log of his or her activities in the WikiLeaks documents. A Chinese-speaking CIA agent eventually translated the dialogue box for his frustrated English-speaking colleague. CIA bypasses encryption of WhatsApp, Signal, Telegram and other messaging apps: Wikileaks Tang Wei, a cybersecurity engineer and the marketing director of Beijing-based security company Rising, said these seemingly trivial antidotes in the WikiLeaks files might contain some valuable information. “The American cyberwar machine has been operating under the hood and it is very difficult for an outsider to get a glimpse of what happens inside an operation centre. These documents revealed the tip of an iceberg,” he said.

    The knowledge of how the CIA cyber units operate and the weaknesses and strengths of their agents will help other parties to come up with more effective defences or counter-attacks, according to Tang. The language barrier, for instance, came as a surprise. The issue rarely entered the heads of cybersecurity experts because nearly all code lines are written in universal languages any programmer in the world can read. But some Chinese software engineers have the habit of inserting Chinese text into source code to aid their memories and communicate with colleagues. This can cause unexpected obstacles for foreign attackers. Wikileaks: CIA’s secret hacking toolkit turned iPhones and smart TVs into spy devices Tang said the WikiLeaks document also confirmed the suspicion that the CIA and other US government agencies had recruited a number of Chinese-speaking hackers to assist in and accelerate China-related operations. Rising, with clients in the Chinese industrial and government sectors, was part of a long list of companies targeted by CIA cyber operatives, according to the leaked files. The files said the CIA had also developed many tools to infiltrate mobile phones, computers and even smart televisions running operating systems from Microsoft, Google, Apple and Samsung. Many of these had already been leaked and were circulating in global black markets, prompting proliferation concerns over global cybersecurity. Weibo, a popular social media app developed by Chinese internet company Sina, might also be compromised, according to the WikiLeaks documents.
  2. billy_boatrocker Virtue Signaler

    Member Since:
    Apr 26, 2010
    Message Count:
    Portland, Oregon
    Ratings Received:
    +3,831 / 10 / -14
    That clown is what... a GS14? Pulling down a nice Government tax-theft paycheck and he's too fucking stoopid to use Google translate. Even if it's not exact in some cases you can figure out the answer by the context. And don't tell me it would violate spook security to use Google.
    Latest Given Reputation Points:
    Giada: 91,767 Points (or pay $45k for a translator.) Mar 10, 2017

Share This Page