News Wire

WikiLeaks publishes ‘entire hacking capacity of the CIA’

Julian Assange, Founder and Editor-in-Chief of WikiLeaks speaks via video link during a press conference on the occasion of the ten year anniversary celebration of WikiLeaks in Berlin

Julian Assange, Founder and Editor-in-Chief of WikiLeaks speaks via video link during a press conference on the occasion of the ten year anniversary celebration of WikiLeaks in Berlin, Germany, October 4, 2016. REUTERS/Axel Schmidt

On Tuesday, WikiLeaks published what it claims is the largest batch of confidential documents ever released regarding the Central Intelligence Agency. More than 8,000 documents were published on Tuesday as part of ‘Vault 7’, which is a series of leaks on the intelligence agency.

A total of 8,761 documents have been published as part of ‘Year Zero’ by WikiLeaks, the first in a series of leaks the whistleblower organization has entitled ‘Vault 7.’

In a statement released by WikiLeaks, it said ‘Year Zero’ will reveal details of the CIA’s “global covert hacking program,” including “weaponized exploits” used against company products including “Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.

WikiLeaks tweeted the leak, which it claims originated from a network inside of the CIA’s Center for Cyber Intelligence in Langley,  Virginia.

“Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA),” WikiLeaks said in the statement. “The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force — its own substantial fleet of hackers.”

“The agency’s hacking division freed it from having to disclose its often controversial operations to the NSA (its primary bureaucratic rival) in order to draw on the NSA’s hacking capacities,” the statement said.

The source of the data information relayed to WikiLeaks via a statement that they wish to initiate a public debate regarding the “security, creation, use, proliferation and democratic control of cyberweapons.”

“The source details policy questions that they say urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency,” according to WikiLeaks. “The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.”

Policy questions surrounding the debate in the public should include, “whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency,” the source told WikiLeaks.

The FAQ section of the released documents notes some key details that highlight the true nature of the leak, as the information was “obtained recently and covers through 2016.”

According to the CIA timestamps on the released documents, the time period covered in the latest leak is between 2013 and 2016.

WikiLeaks has stated that it has not gone through the entire leak and has only verified the documents, asking and calling on journalists and activists to do the work of digging through the documents and producing articles regarding the content contained within.

“Those who demonstrate journalistic excellence may be considered for early access to future parts,” Wikileaks said.

(Written & Edited by Bart Charles Begley)

 

Advertisements

Categories: News Wire, North America, U.S. News

Tagged as: ,

2 replies »

  1. Just began scanning the documents myself. One of the most troubling aspects is the great attention being paid to hacking SOHO routers. As an apple user I was fascinated by the section pertaining to hacking Airport Extreme and Time Capsule firmware, as well as all other routers sold commercially.

    However I also noticed in another section that its obvious this group is not the best and the brightest, notwithstanding their constant teamwork cheering that they’re the best.

    They discuss at length a data dump on Github under “Hacking Team Source Dump Map”. Whether or not they can use this hacking groups tools. It’s obvious they are not familiar with these relatively simple exploits.

    Although Apple has been a preferred platform since it was obvious Windows has been cooperating with the authorities in the past by the installation of backdoors in its OS (for over a decade). Apple always seemed a step ahead.

    These documents show that for the last number of years a great deal of attention has been paid to infecting all apple products with malware, key loggers, rootkits in the OS itself, as well as firmware rewrites.

    That is just an initial look. There is a whole lot here. Mostly enterprise based server infiltration and exploits. Since these are the early years, they speak of dealing with Linux based platforms at a later time.

    Liked by 1 person

  2. I hate to reply to myself, but this thing looks like a gift that keeps on giving. There is an entire section under Operation Support Branch-Projects named Melody DriveIn and RickyBobby, which cause individuals using VLC to watch a media file to launch an exploit named RickyBobby on their system/nework allowing an outside source to upload/download anything root the system whatever. Fight Club uses program installers to trojan a system using VLC, Microsoft Office standalone, TrueCrypt and Win-Rar and others. Some of this is old hat and some is kind of nasty.

    They are also very focused on defeating Kaspersky antivirus and internet security software.

    Liked by 1 person

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s