Saturday, March 25, 2017

#DarkSeaSkies: How the CIA Can Control Your MacBook in Just 29 Seconds

Image Source

(The Daily SheepleIt’s known as DarkSeaSkies…. Hacking tools that allows the CIA access to Apple products. One knicknamed the “Sonic Screwdriver” gives an agent the ability to hack and remotely control a MacBook Air in less than half a minute.


Related iSpy: Wikileaks New CIA “Dark Matter” #Vault7 Release Shows Agency Infected Apple

Source - The Daily Sheeple

by Staff Writer, March 24th, 2017

Delivered via “supply chain intercept or gift to the target,” DarkSeaSkies runs in the background and gives the CIA remote control of the laptop. The 2009 “user requirements” make it sound like this one requires a thumb drive: “It is assumed that an operator or asset has one-time physical access to the target system and can boot the target system to an external flash drive.”
Well, at least they required physical proximity to your laptop for at least 29 seconds eight years ago.

Now? Well, technology has come a long way in just a decade.




RT reports:
DarkSeaSkies is actually made up of three components, Dark Matter, SeaPea and NightSkies.

DarkMatter is installed in a computer’s kernal-space (core of computer’s operating system, usually in protected area of memory). It then installs the other two components of the tool, SeaPea and NightSkies.

SeaPea is installed in the kernal and executes and hides NightSkies, which is implanted in the user the space (computer’s memory area that deals with apps and software).

“All files, network connections, and processes associated with the NightSkies beacon are hidden by the SeaPea root-kit,” the document reads. NightSkies is the beaconing tool used to monitor and send information from the phone to a Listening Post (LP), which collects the incoming data.
And that’s that. NightSkies, made up of an implant that runs undetected, a Listening Post (LP) and a post-processing program is used by the CIA to infiltrate, track, and remotely control iPhones. The LP works like a “drop box,” sucking up a persons email metadata, their browser histories including Internet and YouTube… you name it.
The kicker?




RT notes Apple’s supply chain had to have been compromised by the CIA long before 2008, however:
The revelation that the CIA is physically infiltrating factory fresh phones suggests it has accessed the organization’s supply chain, meaning they may be accessing phones as they are shipped to targets, with CIA agents or assets physically tampering with suspects’ phones before they even receive them.

The fact that NightSkies was on version 1.2 by 2008 suggests it had been employed before then. The document references a 1.1 version, and explains that NightSkies has the capability to self-upgrade once installed.
You have to wonder: has it really dawned on people how late in the game we are at this point if the government has direct access and control of your computer and phone???

Related SNOWDEN: Solution To ‘Fake News’ Is Critical Thinking, Not Censorship -- It's Time to Become Masters of Discernment
_________________________
Stillness in the Storm Editor's note: Did you find a spelling error or grammar mistake? Do you think this article needs a correction or update? Or do you just have some feedback? Send us an email at sitsshow@gmail.com with the error, headline and urlThank you for reading.
________________________________________________________________
Question -- What is the goal of this website? Why do we share different sources of information that sometimes conflicts or might even be considered disinformation? 
Answer -- The primary goal of Stillness in the Storm is to help all people become better truth-seekers in a real-time boots-on-the-ground fashion. This is for the purpose of learning to think critically, discovering the truth from within—not just believing things blindly because it came from an "authority" or credible source. Instead of telling you what the truth is, we share information from many sources so that you can discern it for yourself. We focus on teaching you the tools to become your own authority on the truth, gaining self-mastery, sovereignty, and freedom in the process. We want each of you to become your own leaders and masters of personal discernment, and as such, all information should be vetted, analyzed and discerned at a personal level. We also encourage you to discuss your thoughts in the comments section of this site to engage in a group discernment process. 

"It is the mark of an educated mind to be able to entertain a thought without accepting it." – Aristotle

The opinions expressed in this article do not necessarily reflect the views of Stillness in the Storm, the authors who contribute to it, or those who follow it. 

View and Share our Images
Curious about Stillness in the Storm? 
See our About this blog - Contact Us page.

If it was not for the gallant support of readers, we could not devote so much energy into continuing this blog. We greatly appreciate any support you provide!

We hope you benefit from this not-for-profit site 

It takes hours of work every day to maintain, write, edit, research, illustrate and publish this blog. We have been greatly empowered by our search for the truth, and the work of other researchers. We hope our efforts 
to give back, with this website, helps others in gaining 
knowledge, liberation and empowerment.

"There are only two mistakes one can make along the road to truth; 
not going all the way, and not starting." — Buddha

If you find our work of value, consider making a Contribution.
This website is supported by readers like you. 

[Click on Image below to Contribute]

Support Stillness in the Storm

Sign up for Gaia TV

Sign up for Gaia TV
By signing up through this link you also support SITS