{"id":32892,"date":"2017-08-07T17:43:11","date_gmt":"2017-08-07T21:43:11","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/wikileaks-cias-dumbo-project-can-hack-webcams-and-corrupt-recordings-betanews.php"},"modified":"2017-08-07T17:43:11","modified_gmt":"2017-08-07T21:43:11","slug":"wikileaks-cias-dumbo-project-can-hack-webcams-and-corrupt-recordings-betanews","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/wikileaks\/wikileaks-cias-dumbo-project-can-hack-webcams-and-corrupt-recordings-betanews.php","title":{"rendered":"WikiLeaks: CIA&#8217;s Dumbo project can hack webcams and corrupt recordings &#8211; BetaNews"},"content":{"rendered":"<p><p>    WikiLeaks has published the latest installment of its cache of    CIA documentation known as Vault 7. This time around we learn    about Project Dumbo, a hacking tool which allows for the    control of webcams and microphones.  <\/p>\n<p>    Wired, Bluetooth and wireless devices can all be detected by    Dumbo. In addition to this, Dumbo gives the CIA the ability to    delete or corrupt recordings that have been made. WikiLeaks has    published user guides for three versions of Dumbo, the most    recent of which is dated June 2015.  <\/p>\n<p>    SEE ALSO:  <\/p>\n<p>    Like some of the other CIA exploits WikiLeaks has revealed so    far, executing Dumbo requires not only physical access to a    computer, but also administrator privileges. Rather than being    used to gather evidence or carry out surveillance, the aim of    Dumbo is to detect and wipe out recordings made by others. The    documentation for Dumbo 3.0 includes the following description:  <\/p>\n<p>      Dumbo runs on a target to which we have physical access,      mutes all microphones, disables all network adapters,      suspends any processes using a camera recording device, and      notifies the operator of any files to which those processes      were actively writing so that they may be selectively      corrupted or deleted.    <\/p>\n<p>    WikiLeaks explains a little about the contents of the    documentation:  <\/p>\n<p>      Dumbois a capability to suspend processes      utilizing webcams and corrupt any video recordings that could      compromise a PAG deployment. The PAG (Physical Access Group)      is a special branch within the CCI (Center for Cyber      Intelligence); its task is to gain and exploit physical      access to target computers in CIA field operations.    <\/p>\n<p>      Dumbocan identify, control and manipulate      monitoring and detection systems on a target computer running      the Microsoft Windows operating sytem. It identifies      installed devices like webcams and microphones, either      locally or connected by wireless (Bluetooth, WiFi) or wired      networks. All processes related to the detected devices      (usually recording, monitoring or detection of      video\/audio\/network streams) are also identified and can be      stopped by the operator. By deleting or manipulating      recordings the operator is aided in creating fake or      destroying actual evidence of the intrusion operation.    <\/p>\n<p>      Dumbois run by the field agent directly from      an USB stick; it requires administrator privileges to perform      its task. It supports 32bit Windows XP, Windows Vista, and      newer versions of Windows operating system. 64bit Windows XP,      or Windows versions prior to XP are not supported.    <\/p>\n<p>    You can read through the Dumbo documentation over on WikiLeaks' Vault 7 pages.  <\/p>\n<p>    Image credit: Piotr Adamowicz \/ Shutterstock  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>The rest is here:<br \/>\n<a target=\"_blank\" href=\"https:\/\/betanews.com\/2017\/08\/04\/wikileaks-vault-7-dumbo-webcam-control\/\" title=\"WikiLeaks: CIA's Dumbo project can hack webcams and corrupt recordings - BetaNews\">WikiLeaks: CIA's Dumbo project can hack webcams and corrupt recordings - BetaNews<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> WikiLeaks has published the latest installment of its cache of CIA documentation known as Vault 7. This time around we learn about Project Dumbo, a hacking tool which allows for the control of webcams and microphones. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[50],"tags":[],"class_list":["post-32892","post","type-post","status-publish","format-standard","hentry","category-wikileaks"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32892"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=32892"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32892\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=32892"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=32892"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=32892"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}