Wikileaks Reveals "Dumbo": Tool That Allows CIA To Shut Down Cameras And Microphones

Tyler Durden's picture

Since Wikileaks began releasing classified CIA documents back in March as part of its “Vault 7” series of leaks, purportedly the largest document dump in the agency’s history, it has publicly unveiled programs with innocent sounding names like “Marble”, “Scribbles” and “Archimedes” that the agency employs to help execute its operations, or to cover its tracks.

On Thursday, the group released the 19th installment in its series by publishing a series of documents detailing how the agency uses a custom-designed hacking exploit called “Dumbo” to destroy, or manufacture, evidence during field operations, according to a Wikileaks press release.

The CIA filed a request that such a tool back in 2012, according to a powerpoint presentations describing what capabilities it would need.

 

In a field guide for the tool, dated July 2015, the agency says “the intelligence community has identified a need…for a capability to suspend processes utilizing webcams and corrupt any video recordings that could compromise a PAG deployment.”   

Once installed on a computer running the Windows operating system via a thumb drive, Dumbo identifies webcams and microphones and stops them from recording. The program notifies its operator of any files that were actively being written so that they can be corrupted or deleted, according to the field manual.

“Dumbo works by discovering which processes have access to the physical camera device and uses that information to corrupt video files.  In some instances, programs emulate a camera input to other programs; such is the case with Fujitsu’s YouCam.exe.  When this occurs, YouCam.exe will have control of the actual webcam, and feed input to other processes that record images to files as needed.  In this scenario, Dumbo will suspend YouCam.exe but will not be able to detect the other processes to which YouCam.exe is feeding images.  Although the camera will not be able to record additional frames, Dumbo will not be able to corrupt files that were written to prior, as it is unaware of the processes writing the video files.  If the operator sees a process using the camera device, but Dumbo detects no files being written, the operator should manually search for video files.

 

In some instances, video recording software has the ability to detect it is not responding, and will restart itself; such is the case with iSpy.exe.  When Dumbo detects a process using a camera device, it also claims control of the device.  If the recording software were to restart itself, it would no longer be able to access the camera until Dumbo exits.  In the case of iSpy,although the program may restart, it will be unable to record any additional frames; it will appear as if it was unable to access the camera, due to it already being in use.”

According to the documents, Dumbo is programmed to operate on 32bit Windows XP, Windows Vista, and newer versions of the Windows operating system, but won’t work with 64bit Windows XP, or Windows versions prior to XP. More dumps are expected in the coming weeks. Wikileaks published a link to its press release, as well as the document cache, in the tweet below.

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.
Son of Captain Nemo's picture

Wow!

This will certainly come in handy when the National Guard camo "protection unit" systematically rounds them up in each neighborhood after SOMETHIN "HAPPENS"!!!

JackT's picture

Now we just need this for smart phones

Manthong's picture

 

Can’t get mine… mofo’s…

 They are all analog and I own them… not you.

BaBaBouy's picture

Wow, it's better than the GET-SMART Shoe Phone...

Eager Beaver's picture

NOW we finally know why there's never any footage of the "terrorists" at the scene.

JSBach1's picture

It already exists...it's Arkancide: (take two to the back of the head and presto.)

goober's picture

You idiot, it already exists in spades and anybody who still has a smarty phone is well past ignorant ! Wake the fuck up finally !

http://www.downtoearththinking.com/the-war-for-our-minds-.html

http://www.downtoearththinking.com/our-government-created-google-and-fac...

Dukes's picture

Trump would benefit by having one of these Dumbo drives in Oval Office

Lumberjack's picture

We need to find out how much the black budget really is and have proof of its effectiveness.

I believe the budget is way too much and the programs are totally useless. Shut them fucking down now.

Lets revist the case of Annie Dookan, the Massachusetts chemist who tampered with drug evidence. All cases sge was involved with were tissed and all convictions nullified. We no longer can rely on government evidence due to the actuvities of 'intelligence' agencies as they have access to all forms of communication, including video, voice and other electronic data.

Shitonya Serfs's picture

"But if you have nothing to hide" --- Every liberal piece of crap...unless the topic is about Voting/VoterID

nope-1004's picture

But crypto's are totally free and out of the hands of .GOV, right?

lol

They care more about the vids you shoot than the currency you use.  LMFAO!

 

debtor of last resort's picture

Tried to buy 50 silver coins with ETH through my joint wallet app but i got the text 'fuck you, pay me'.

I feel sodomized

nope-1004's picture

Yup.  Do Chen mentioned on another thread that Provident doesn't take bigcoin anymore either.  Seems it's beyond acceptable to put capital gains into tangible assets.

 

debtor of last resort's picture

Wait till we see the printed currency vs tangible assets version.

buzzkillb's picture

Yet provident still shows they accept bitcoin.

Looks like the new software to learn how to use is wireshark and how to change router settings based on that.

El Vaquero's picture

No 64 bit, no OSX, and no Linux.  This tool sounds like kind of a dud if you're the CIA.

 

I had to look up PAG:  It's a Political Action Group in the CIA.  It looks like it's some of the people who do the really dirty shit that the CIA does.  

TheRideNeverEnds's picture

Yes, this is a tool for the people who physically infiltrate secure areas in the UN, embassies and federal, state, local US offices to access secure computers on intranet systems for nefarious purposes and hide the fact they were ever there.

ALL of those systems use 32bit windows operating systems.

bluskyes's picture

Now you know why.

The vulnerabilities are features.

I wonder if wikileaks will ever get copies of communication proving that Microsoft got paid by the NSA to leave vulnerabilities un-patched.

RICKYBIRD's picture

It does operate on 64 bit Windows after XP. Go back and read it again.

taggaroonie's picture

Thank heavens. It looks like the spooks will only have political motives.

debtor of last resort's picture

Well, 'they' bought a lot of stocks in those tech companies.

taketheredpill's picture

 

 

Would be great if sometime in the future developers use Quantum computing and statistical blunt methods to unscramble corrupted video/audio files.

 

FUCIA

whatsupdoc's picture

Hahaha

The world that the CIA can infiltrate is getting smaller by the day.  

Hahaha

 

Chupacabra-322's picture

To state the obvious; the CIA has deeply humiliated the American people in their attempt to tie the American people to be responsible for the CIA's crimes against humanity across the world.

The CIA appears to be the world's greatest threat to peace and prosperity. It is the penultimate terrorist organization, being the direct or indirect creator of all other terrorist organizations. It also appears to be the world's penultimate illegal drug smuggler and pusher making all other illegal drug trading possible and instigating the horrors of addiction and suffering around the world.

If I believed that the CIA was working in any way on behalf of the US government and the American people then it would be sad and shameful indeed. However, it is my belief that the CIA instead was captured long ago, as was the secret military operations and now works for a hidden power that wants to dominate or failing that, destroy humanity.

The Agency is Cancer. There should be no question about the CIA's future in the US.
Dissolved & dishonored. Its members locked away or punished for Treason. Their reputation is so bad and has been for so long, that the fact that you joined them should be enough to justify arrest and Execution for Treason, Crimes Against Humanity & Crimes Against The American People.

And yet, there is something positive in this. By experiencing and knowing evil, we can choose the path of light or choose to ignore both dark amd light. It is a choice we all must make if we intend to evolve from being animals ruled by this world and its illusions.

Juggernaut x2's picture

They killed JFK to establish complete control

barysenter's picture

They killed JFK to maintain complete control. ffy

GunnerySgtHartman's picture

The CIA has been out of control for over 50 years.  The Bay of Pigs fiasco should have been enough to shut it down, but even then the Deep State protected it.

any_mouse's picture

Only out of control if you think it is a legitimate institution.

The FED is not out of control nor does it make policy mistakes.

Working as Designed.

CHAOS.

DuneCreature's picture

We have already seen Dumbo in action. ... I have had complete days of corrupted YouTube videos come in un-watchable.

Don't think they won't use these tools on you and COMPLETELY waste your time like they own it.

~~~~))) .... A 'Gag Order' For George Webb From InfoWars? ....(((~~~~

We Have Discovered A Completely Uncharted Swamp Lagoon Inhabited By A Heretofore Unknown Subspecies Of Spazztecs And Their Legal Support Staffs. ....

A report to follow as soon as one of the new swamp creatures have been captured. ... They seem to like cash and negotiable securities. ... Maybe we can bait a live trap with some sagging mining stock and fake Bitcoin looking numbers and catch them just outside of the courthouse when they go there to gag something.

Well, I'll give George credit, he is making stunt monkeys out of most every member of the media he medias with. ... WTF did George do to Alex? ... Bang the InfoYoga Instructor while Alex was off partying with Macaroon Nosecones?

Take some Knock-Out and chill, Alex. .. I thought you two were on the same side. .. Don't let Ass Wipes Inc set you both up to fail, brother Jones!.. Never, ever call a lawyer when a simple punch in the nose will straighten things out between gentlemen, guys. .. What kind of gay snowflake behavior is this gag order shit?

Alex, Alex, Alex! .. You haven't paid off your first round of debt burden from the X-File Wife that can't be happy living on $28,000.00 a month plus the fees for her pet leeches,... errr I mean, lawyers.

Car Theft Rings In DC Pale In Comparison To The Pilfering Going On Up On Pork Project Hill = https://www.youtube.com/watch?v=XA9hptg-mT0

Alex and George need to kiss and make up. ... Well, OK, a handshake will do. ... Come on guys! ... A fucking Gag Order for crying out loud! ... Alex!?! WTF are you doing? .. Get back on the job of fighting the New World Odor before you have to have you own organs harvested just to make a legal bill payment or two.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
We lost a brave warrior today, We The People.

A serous sad note - Jim Marrs has passed away. ... RIP, to a good and very interesting and entertaining man. Damn, if he didn't know the score. = https://www.youtube.com/watch?v=FRaFuvGnx6c

We need a bunch more men like Jim Marrs. .. Fearless dudes that stand up and speak truth to power.

Salute, Jim Marrs, see ya at the the big rowdy bar on the other side.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Live Hard, The Washington DC Media Is DOA, Don't Gag The Rest To Death Over Ego Or A Close Call Pissing Contest, Die Free

~ DC v7.4

Son of Captain Nemo's picture

Wouldn't be at all surprised DC that what you are saying is absolutely spot on or a more sophisticated version of it!

Hell the date on those slides is July 25, 2012...

What the fuck have they been working on since this "presentation"?!!!

any_mouse's picture

Jim Marrs is controlled opposition with limited hangouts.

DuneCreature's picture

You mean was, don't you?

So, does that make you a dessert topping or a floor wax or both?

Live Hard, I Run The Ministry Of Truth In Propaganda, Myself, Die Free

~ DC v7.4

Chupacabra-322's picture

The "Spoofing" or Digital Finger Print & Parallel Construction tools that can be used against Governments, Individuals, enemies & adversaries are Chilling.

The CIA can not only hack into anything -- they can download any "evidence" they want onto your phone or computer.  Child pornography, national secrets, you name it.  Then they can blackmail you, threatening prosecution for whatever crap they have planted, then "found" on your computer.    They can also "spoof" the source of such downloads -- for instance, if they want to "prove" that something on your computer (or Donald Trump's computer) came from a "Russian source"  -- they can spoof the IP address of a Russian source.

The take-away:  no digital evidence the CIA or NSA produces on any subject whatsoever can be trusted.  No digital evidence should be acceptable in any case where the government has an interest, because they have the complete ability to fabricate and implant any evidence on any iphone or computer.  And worse:  they have intentionally created these digital vulnerabilities and pushed them onto the whole world via Microsoft and Google.     Government has long been at war with liberty, claiming that we need to give up liberty to be secure.  Now we learn that they have been deliberately sabotaging our security, in order to augment their own power.  Time to shut down the CIA and all the other spy agencies.  They're not keeping us free OR secure, and they're doing it deliberately.  Their main function nowadays seems to be lying us into wars against countries that never attacked us, and had no plans to do so.

The Echelon Computer System Catch Everything.
The Flagging goes to Notify the Appropriate Alphabet,,,...Key Words Phrases...Algorithms,...It all gets sucked up and chewed on and spat out to the surmised computed correct departments...That simple.

Effective immediately defund, Eliminate & Supeona it's Agents, Officials & Dept. Heads in regard to the Mass Surveillance, Global Espionage Spying network & monitoring of a President Elect by aforementioned Agencies & former President Obama, AG Lynch & DIA James Clapper.

OverTheHedge's picture

I'm still waiting for this to be used as a defence in a child-porn case:" I didn't do it, Guv, the CIA put it there".

Hard to prove one way or the other, but you would need to have a reason to be on their radar, before a jury would buy into it.

booboo's picture

I have been saying this for some time, smart attorneys are gleaning as much as they can from these leaks and will be using this defense in the future. Of course only politically well connected individuals will be able to get away with it, I mean who in the fuck would believe local negro thug Bootny Farnsworth smashing the plate glass of the Five and Dime at 3am was a target of CIA and they doctored the tape.

SgtShaftoe's picture

This spec reads like they already had a target identified for the operation. Having a prerequisite of root/administrator privileges makes this tool kind of a one trick pony and just makes it somewhat interesting.

In far more interesting news: WannaCry kill-switch hero Marcus Hutchins collared by FBI on way home from DEF CON

https://www.theregister.co.uk/2017/08/03/wannacry_killer_hutchins_arrested/

HowdyDoody's picture

He created a domain name that was used to kill wannacry (ie stop if domain name exists). Unfortunately the software was lifted from the NSA so the same domain name probably killed a lot of active NSA programs as well. Oooops. Red faces at NSA. Not good for hacker. Someone will have to pay for NSA stupidity.

 

East Indian's picture

He is not arrested, he has been conscripted. Of late, USA is kidnapping good computer techies from around the world; a few days ago two Russians were kidnapped from Latvia; then Guccifer (though I suspect his capabilities), etc. 

 

Operation Paperclip redux.

Grandad Grumps's picture

I am thinking that such a tool is pretty useless if they cannot install it remotely without standard permissions ... which they probably can by now.

DollarMenu's picture

What kind of afraid are these technoid creeps?

Even if the video they fear being made gets past the censors to YouTube, garners 1,000,000 views - so what? Even 3,000,000 views - still so what?

MSM will ignore it, and the folks who see it's meaning are few and very far between.

Those few and far betweeners will do internet discussions, much moaning, and then - nada.

The next 'event' real or created/real will take precedence and the world will spin on.

Yeah, it's a nasty tool but until you can convince those who are paid to build it that it is nasty, they will press on.

It's not the guys who dream up this shit, it's the guys they pay to build it.

 

King of Ruperts Land's picture

We the people could find out who they are and detach their cpu from their mainframe.

EcoJoker's picture

suck my 8mm camera, bitches

nostromo17's picture

"Dumbo" is code for Microsoft Windows users....:)

Montana Cowboy's picture

One more reason to never run Windows. Switch to Linux. Its all free and its easier than you think. And now with Oracle's VirtualBox, which is free, you can run Windows with all your Windows software inside of Linux, simultaneously, and share directories. This will ease your transition. One taste of Suse Linux and you will shitcan Windows within weeks. You will see what a piece of crap Windows has always been. Just do it.

King of Ruperts Land's picture

I switched and never looked back. Linux does seem to be less prone to all those pesky viruses. To be ultra secure though I would take a lot more care than I usually do. I still tape over or disconnect web cams, and assume I am spied on.

Programming your computer to spy on who opens it up is a cool idea.

GeezerGeek's picture

Glad that my main XP machine uses the 64 bit version. I also run that same OS in several virtual machines on other systems. Why, you may ask? I have a surveillance system that requires an old version of Internet Explorer or Firefox if I want to access the live feeds from a PC on my network.

Thus far no one has tried to plant porn on any of my systems. Guess I'm not considered much of a threat.