WikiLeaks Publishes Massive Trove of CIA Documents
Wikileaks says numerous hacking tools described in Vault 7 were made unclassified to skirt rules on posting classified information to the internet-most of the CIA’s malware requires the use of the internet for communication.
The CIA is able to remotely hack into smartphones using the software or hardware flaws known as “zero-day exploits” that have not been yet identified as vulnerabilities in devices by the manufacturer. “These redactions include tens of thousands of Central Intelligence Agency targets and attack machines throughout Latin America, Europe, and the United States”, Wikileaks’ spokesperson explained in the release. USA intelligence and law enforcement agencies have said that they need new powers to break into encrypted applications and devices.
“Those who demonstrate journalistic excellence may be considered for early access to future parts”, Wikileaks said in the leak. In fact, the documents published by WikiLeaks suggest that the hacking tools allow the government to bypass the apps entirely, “collecting audio and message traffic before encryption is applied”.
Wikileaks is a non-profit organization that publishes secret information, news leaks and classified media.
The CIA would neither confirm nor deny the documents were genuine, or comment on their content.
Mr Williams, who has experience dealing with government hackers, said that the voluminous files’ extensive references to operation security meant they were nearly certainly government-backed. There are also details on how the agency sought to subvert United States software products and smartphones, which included the Apple iPhone, Googl’es Android and Microsoft Windows.
The dump already includes more documents than the well-publicized Snowden Files. But it said it said it hopes the release will initiate “a public debate about the security, creation, use, proliferation and democratic control of cyberweapons”. The disproportionate focus on iOS may be explained by the popularity of the iPhone among social, political, diplomatic and business elites.
Moreover, there also exists a programme to take control of Samsung smart television.
An attack against Samsung TV’s used “Weeping Angel” in cooperation with MI5, placing them into a “Fake-Off” mode, recording conversations even when the device appears to be off.
The massive file released by Wikileaks appears to contain millions of lines of code, referencing programs with ambiguous names like “Medusa” and “HIVE”.
Missing from WikiLeaks’ trove are the actual hacking tools themselves, some of which were developed by government hackers while others were purchased from outsiders.