0:00
some of these tools include Hive
0:02
scribbles fine dining Sonic Screwdriver
0:05
night skies and weeping angel Hive was a
0:08
command and control framework used to
0:10
manage malware implants on compromised
0:12
systems a command and control framework
0:14
allows an attacker or in this case the
0:16
CIA to essentially communicate and send
0:19
commands to malware they've implanted on
0:21
a system I've allowed the CIA to do all
0:23
of this through websites that appeared
0:25
ordinary to anybody who came across the
0:27
connection it would appear to just be a
0:28
normal link to maybe a software website
0:31
when the underlying traffic would
0:32
actually be extracting sensitive
0:34
information from the targeted devices
0:36
back to the CIA servers scribbles dub
0:38
the Snowden stopper is a tool that
0:40
embedded web Beacon tags into
0:42
confidential documents that were likely
0:44
to be stolen the purpose of this is to
0:47
track access by whistleblowers and
0:48
foreign spies it would generate
0:50
invisible unique watermarks for
0:53
Microsoft Office documents which when
0:55
opened sent information back to the CIA
0:57
about the viewer fine dining hey
1:00
collection of malware laced applications
1:02
that were disguised as legitimate
1:03
programs agents could use these apps
1:06
stored on a USB drive to infect the
1:08
target's computer while appearing to
1:10
just run normal software the list of
1:11
decoy apps include VLC Google Chrome
1:14
Opera and Firefox Libre office prei
1:17
Skype 7zip the game 2048 and even some
1:20
antivirus software Sonic Screwdriver was
1:22
a tool that manipulated the firmware of
1:25
Apple's Thunderbolt to ethernet adapters
1:27
making them store and execute malicious
1:28
code during a Max boot process this
1:31
means it would bypass security
1:32
mechanisms like firmware passwords
1:34
taking control of the system before the
1:35
operating system even loads and because
1:37
the attacks Target the low-level
1:39
firmware of the computer the malicious
1:40
code would persist even after the
1:42
operating system is completely
1:44
reinstalled continuing with the Apple
1:46
attack night skies works like a basic
1:48
command and control system but it can
1:49
also uniquely embed itself into the
1:52
iTunes application this allows the CIA
1:54
to Monitor and control not just the Mac
1:56
but also any iPhone that's synced with
1:58
it and most famously weeping angel
2:00
weeping angel was a software suite
2:02
developed in partnership with Britain's
2:04
MI5 that would allow Samsung TVs to be
2:06
turned into listening devices even when
2:08
they appear to be turned off