Online:
Visits:
Stories:
Profile image
By The Daily Sheeple
Contributor profile | More stories
Story Views

Now:
Last Hour:
Last 24 Hours:
Total:

#DarkSeaSkies: How the CIA Can Control Your MacBook in Just 29 Seconds

Friday, March 24, 2017 10:58
% of readers think this story is Fact. Add your two cents.

(Before It's News)

iPhone

It’s known as DarkSeaSkies…. Hacking tools that allows the CIA access to Apple products. One knicknamed the “Sonic Screwdriver” gives an agent the ability to hack and remotely control a MacBook Air in less than half a minute.

Delivered via “supply chain intercept or gift to the target,” DarkSeaSkies runs in the background and gives the CIA remote control of the laptop. The 2009 “user requirements” make it sound like this one requires a thumb drive: “It is assumed that an operator or asset has one-time physical access to the target system and can boot the target system to an external flash drive.”

Well, at least they required physical proximity to your laptop for at least 29 seconds eight years ago.

Now? Well, technology has come a long way in just a decade.

RT reports:

DarkSeaSkies is actually made up of three components, Dark Matter, SeaPea and NightSkies.

DarkMatter is installed in a computer’s kernal-space (core of computer’s operating system, usually in protected area of memory). It then installs the other two components of the tool, SeaPea and NightSkies.

SeaPea is installed in the kernal and executes and hides NightSkies, which is implanted in the user the space (computer’s memory area that deals with apps and software).

“All files, network connections, and processes associated with the NightSkies beacon are hidden by the SeaPea root-kit,” the document reads. NightSkies is the beaconing tool used to monitor and send information from the phone to a Listening Post (LP), which collects the incoming data.

And that’s that. NightSkies, made up of an implant that runs undetected, a Listening Post (LP) and a post-processing program is used by the CIA to infiltrate, track, and remotely control iPhones. The LP works like a “drop box,” sucking up a persons email metadata, their browser histories including Internet and YouTube… you name it.

The kicker?

RT notes Apple’s supply chain had to have been compromised by the CIA long before 2008, however:

The revelation that the CIA is physically infiltrating factory fresh phones suggests it has accessed the organization’s supply chain, meaning they may be accessing phones as they are shipped to targets, with CIA agents or assets physically tampering with suspects’ phones before they even receive them.

The fact that NightSkies was on version 1.2 by 2008 suggests it had been employed before then. The document references a 1.1 version, and explains that NightSkies has the capability to self-upgrade once installed.

You have to wonder: has it really dawned on people how late in the game we are at this point if the government has direct access and control of your computer and phone???

Delivered by The Daily Sheeple

We encourage you to share and republish our reports, analyses, breaking news and videos (Click for details).


Contributed by The Daily Sheeple of www.TheDailySheeple.com.

This content may be freely reproduced in full or in part in digital form with full attribution to the author and a link to www.TheDailySheeple.com.



Source: http://www.thedailysheeple.com/darkseaskies-how-the-cia-can-control-your-macbook-in-just-29-seconds_032017

Report abuse

Comments

Your Comments
Question   Razz  Sad   Evil  Exclaim  Smile  Redface  Biggrin  Surprised  Eek   Confused   Cool  LOL   Mad   Twisted  Rolleyes   Wink  Idea  Arrow  Neutral  Cry   Mr. Green

Top Stories
Recent Stories

Register

Newsletter

Email this story
Email this story

If you really want to ban this commenter, please write down the reason:

If you really want to disable all recommended stories, click on OK button. After that, you will be redirect to your options page.