-->
Wikileaks Unveils Projection Protego: Cia's Undercover Missile Command System

Wikileaks Unveils Projection Protego: Cia's Undercover Missile Command System

Wikileaks Unveils Projection Protego: Cia's Undercover Missile Command System

 Every calendar week since March Wikileaks has been leaking secrets from the U.S. Central  Wikileaks Unveils Project Protego: CIA's Secret Missile Control System
Every calendar week since March Wikileaks has been leaking secrets from the U.S. Central Intelligence Agency (CIA), which mainly focus on surveillance techniques in addition to hacking tools employed past times its agents.

However this time, the whistleblower arrangement has Vault seven leaks, because it's non almost hacking in addition to spying; instead, it's a—Missile Control System.

Dubbed Project Protego, the PIC-based missile command scheme is installed on-board a Pratt in addition to Whitney Aircraft (PWA) equipped alongside missile launch system, which gives it mightiness to hitting air-to-air in addition to air-to-ground targets.

The latest leak contains 4 hole-and-corner documents inwards total from the projection Protego, along alongside "37 related documents (proprietary hardware/software manuals from Microchip Technology Inc)," WikiLeaks says.
 Every calendar week since March Wikileaks has been leaking secrets from the U.S. Central  Wikileaks Unveils Project Protego: CIA's Secret Missile Control System
Leaked documents reveal scheme design, a conduct on how to configure in addition to laid Protego images, in addition to also propose that all micro-controller units telephone substitution information in addition to signals over encrypted in addition to authenticated channels.
"The missile scheme has micro-controllers for the missile itself ('Missile Smart Switch', MSS), the metro ('Tube Smart Switch', TSS) in addition to the neckband (which holds the missile earlier in addition to at launch time)."
The missile launches entirely when the Master Processor (MP) unit of measurement receives 3 valid signals from a beacon, including 'In Border,' 'Valid GPS,' in addition to 'No End of Operational Period.'

WikiLeaks is non certain why the hole-and-corner documents of projection Protego were the utilisation of repositories that belongs to the CIA's Engineering Development Group, who are obviously known for developing malware in addition to hacking tools for the agency.

However, notably, the CIA has developed Protego missile command scheme inwards partnership alongside 1 of a major U.S. defense strength contractor, Raytheon, who was also mentioned inwards a previous CIA leak.

Raytheon is the same fellowship that the way hired for analysing advanced malware in addition to hacking techniques beingness used inwards the wild past times hackers in addition to cyber criminals.

It seems the name, Protego, has been inspired from the magical Shield Charm used inwards Harry Potter movies, which helped from physical attacks every bit wells every bit magical.

If so, in addition to thus the primary objective of this missile command scheme could move to defend something (secret facility or base), from external physical attacks.

Previous Vault seven Leaks


Last week, WikiLeaks published some other CIA project, dubbed AngelFire, which is an implant developed past times the way to implant a persistent backdoor on the target Windows computers past times modifying their division kick sector.

Since March, WikiLeaks has published 23 batches of "Vault 7" series, which includes the latest in addition to concluding calendar week leaks, along alongside the next batches:
  • ExpressLane — detailed almost the spying software that the way used to spy on their word partners some the world, including the FBI, DHS in addition to NSA.
  • CouchPotato — Influenza A virus subtype H5N1 CIA projection that revealed its mightiness to spy on video streams remotely inwards real-time.
  • Dumbo — Influenza A virus subtype H5N1 CIA projection that revealed the CIA's mightiness to hijack in addition to manipulate microphones in addition to webcams to corrupt or delete recordings.
  • Imperial — Influenza A virus subtype H5N1 CIA projection that disclosed details of at to the lowest degree 3 CIA-developed hacking tools in addition to implants designed to target computers which run Apple Mac OS X in addition to dissimilar flavours of Linux OS.
  • UCL/Raytheon — Influenza A virus subtype H5N1 CIA contractor, which analysed in-the-wild advanced malware in addition to hacking tools for assist the way prepare its ain malware.
  • Highrise — An alleged CIA projection that allow the spying way stealthy collect in addition to post stolen information from compromised smartphones to its server through SMSs.
  • BothanSpy in addition to Gyrfalcon — Two implants that allowed the CIA agents to intercept in addition to exfiltrate SSH credentials from targeted Windows in addition to Linux systems using dissimilar assail vectors.
  • OutlawCountry — An alleged CIA projection that allow the spying way hack in addition to remotely spy on PCs running Linux OS.
  • ELSA — Alleged CIA malware that allows the way to rail geolocation of targeted laptops in addition to PCs running the Microsoft Windows OS.
  • Brutal Kangaroo — An alleged tool suite for Microsoft Windows operating scheme used past times the CIA agents to target air-gap computers within an arrangement or firm without needing whatever straight access.
  • Cherry Blossom — Influenza A virus subtype H5N1 framework employed past times the CIA to monitor the Internet activity of the targeted systems past times exploiting vulnerabilities inwards Wi-Fi devices.
  • Pandemic — Influenza A virus subtype H5N1 CIA projection that allowed the United States of America word way to plough Windows file servers into covert assail machines that tin silently infect other systems within the same network.
  • Athena — Influenza A virus subtype H5N1 framework that the way designed to remotely spy in addition to accept total command of the infected Windows systems in addition to works on every version of Windows OS—from Windows XP to Windows 10.
  • AfterMidnight in addition to Assassin — Two alleged CIA malware frameworks for Microsoft Windows that's designed to monitor in addition to study dorsum actions on the infected remote host PC in addition to execute malicious tasks.
  • Archimedes — Man-in-the-middle assail tool allegedly developed past times the spying way to target PCs within a Local Area Network (LAN).
  • Scribbles — Software allegedly designed to embed 'web beacons' into confidential documents, making the CIA agents able to rail insiders in addition to whistleblowers.
  • Grasshopper — Influenza A virus subtype H5N1 framework which allow the spying way easily practice custom malware for breaking into Windows operating scheme in addition to bypassing antivirus protection.
  • Marble — Source code of a hole-and-corner anti-forensic tool used past times the spying way to shroud the actual source of its malware.
  • Dark Matter — Several hacking exploits the spying way designed to target iPhones in addition to Macs.
  • Weeping Angel — Influenza A virus subtype H5N1 spying tool used past times the intel way to infiltrate smart TV's in addition to transform them into covert microphones.
  • Year Zero — CIA hacking exploits for pop hardware every bit good every bit software.
Blogger
Disqus
Pilih Sistem Komentar

No comments

Advertiser