A new file dump from WikiLeaks includes documentation showing how the CIA has the capability of carrying out cyberattacks and then disguising them to make it look like those attacks came from foreign countries like Russia, Iran, China, and North Korea. The 676 new files are the latest release from the so-called “Vault 7” collection of documents WikiLeaks obtained from inside the Central Intelligence Agency.
According to WikiLeaks, these new files show how the CIA uses its Marble software to mask viruses and cyberattacks, preventing forensic analysts from determining where they came from. In the source code, there are examples that show how these attacks can be made to look like they were performed by hackers speaking languages like Chinese or Russian.
“This would permit a forensic attribution double game, for example by pretending that the spoken language of the malware creator was not American English, but Chinese,” said the site.
You don’t have to be a genius to see the not-so-subtle implications of this. If we’re to believe that Julian Assange is in some sort of alliance with Putin, then this is a calculated attempt to cast doubt on Russia’s DNC hack. If we’re to believe that Assange is neutral, then we could take this as a sign that those hacks were indeed, quite possibly, internal in nature. And that would open up a can of worms that could rock the very foundations of this country.
We’re not quite ready to believe that our intelligence agencies would go that far in an attempt to keep Donald Trump out of the White House, especially since the hack itself contibuted to her loss. It doesn’t make a lot of sense when you dig right down into it, although we suppose anything’s possible.
It does mean, however, that not everything in the world of cyber warfare is exactly as it seems. And if the CIA has this capability, who’s to say there are not other countries who are also able to cover their tracks. And if there are countries, might not there be individual hackers as well?
Point being, the Democrats and the media have been very quick to jump to hard conclusions about a subject that goes far deeper than many people realize. They want to put the hacks into a little box, say, “this is what happened,” and be done with it.
But as this investigation plays out, we may soon find it isn’t that simple.