BE-related

Paul Mackin mackin.paul at gmail.com
Fri Mar 10 11:11:51 CST 2017


How about this from the NY Times:

The media, to its credit, eventually sorts things out
<https://www.wired.com/2017/03/wikileaks-cia-hack-signal-encrypted-chat-apps/>
—
as it has belatedly started to do with the supposed C.I.A. cache. But by
then, the initial burst of misinformation has spread. On social media in
particular, the spin and distortion continues unabated. This time around,
for example, there are widespread claims on social media that these leaked
documents show that it was the C.I.A. that hacked the Democratic National
Committee, and that it framed Russia for the hack. (The documents in the
cache reveal nothing of the sort.)

https://www.nytimes.com/2017/03/09/opinion/the-truth-about-the-wikileaks-cia-cache.html?ref=opinion

You have to read the whole thing to get her reasoning.

On Fri, Mar 10, 2017 at 10:46 AM, Kai Frederik Lorentzen <
lorentzen at hotmail.de> wrote:

>
> Jamie: "Call me cynical, but I fail to see how any of this wikileaks dump
> is new or surprising information.Of course they are doing that. Have been
> for years ... "
>
> Let me reintroduce the emphasized part of my quote:
>
> > The CIA's Remote Devices Branch's UMBRAGE group collects and maintains a
> substantial library of attack techniques 'stolen' from malware produced in
> other states including the Russian Federation.
>
> With UMBRAGE and related projects the CIA cannot only increase its total
> number of attack types but also misdirect attribution by leaving behind the
> "fingerprints" of the groups that the attack techniques were stolen from. <
>
> So "Russian hacking" must in general be considered to be CIA hacking?
> Well, that's OK with me, but ...
>
> Am 09.03.2017 um 17:25 schrieb Jamie Anderson:
>
> Call me cynical, but I fail to see how any of this wikileaks dump is new
> or surprising information. Of course they are doing that. Have been for
> years. What should my response be?
>
> On Wed, Mar 8, 2017 at 1:00 AM, pynchon-l-digest <
> owner-pynchon-l-digest at waste.org> wrote:
>
>>
>> pynchon-l-digest      Wednesday, March 8 2017      Volume 02 : Number
>> 13324
>>
>>
>>
>> [none]
>>
>> ----------------------------------------------------------------------
>>
>> Date:
>> From:
>> Subject: [none]
>>
>> '"Year Zero" introduces the scope and direction of the
>> CIA's global covert hacking program, its malware arsenal
>> and dozens of "zero day" weaponized exploits against a
>> wide range of U.S. and European company products, include
>> Apple's iPhone, Google's Android and Microsoft's Windows
>> and even Samsung TVs, which are turned into covert
>> microphones.'
>>
>> https://wikileaks.org/ciav7p1/
>>
>> The passphrase has some historical significance:
>>
>> SplinterItIntoAThousandPiecesAndScatterItIntoTheWinds
>> -
>> Pynchon-l / http://www.waste.org/mail/?list=pynchon-l
>>
>> ------------------------------
>>
>> End of pynchon-l-digest V2 #13324
>> *********************************
>>
>>
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://waste.org/pipermail/pynchon-l/attachments/20170310/bbe2c5b1/attachment.html>


More information about the Pynchon-l mailing list