April 27, 2017 Disclaimer: Please read.
Statements and opinions expressed in articles are those of the authors, not Truthdig. Truthdig takes no responsibility for such statements or opinions.
WikiLeaks Publishes Thousands of Documents on Alleged CIA Hacking Techniques
Posted on Mar 7, 2017
WikiLeaks released what it calls “the largest ever publication of confidential documents” on the Central Intelligence Agency on Tuesday, sending shock waves around the intelligence community as experts scrambled to begin analyzing the trove of information.
The leak, which the whistleblowing organization labeled “Vault 7,” comprises 8,761 documents allegedly stemming from “an isolated, high-security network situated inside the CIA’s Center for Cyber Intelligence in Langley, Virgina.”
The Guardian reports:
Whistleblower Edward Snowden took to Twitter to explain why he believes the Vault 7 leaks are genuine and why they are significant:
The New York Times adds that a “former intelligence officer” stated that “some of the code names for C.I.A. programs, an organization chart and the description of a C.I.A. hacking base appeared to be genuine” after a brief review of the documents Tuesday.
Snowden and others also addressed fears that the CIA potentially hacked Signal, a private-messaging app often used by journalists to protect whistleblowers while receiving information:
WikiLeaks says it redacted names, email addresses and IP addresses throughout the document, and adds that Vault 7 spans from 2013 to 2016.
“Some of the details of the C.I.A. programs might have come from the plot of a spy novel for the cyberage, revealing numerous highly classified — and in some cases, exotic — hacking programs,” The New York Times adds. “One, code-named Weeping Angel, uses Samsung “smart” televisions as covert listening devices…. Another program described in the documents, named Umbrage, is a voluminous library of cyberattack techniques that the C.I.A. has collected from malware produced by other countries, including Russia. According to the WikiLeaks release, the large number of techniques allows the C.I.A. to mask the origin of some of its cyberattacks and confuse forensic investigators.”
WikiLeaks has not named the sources behind Vault 7.
It urges journalists to dig through the documents without fear that the main “story” has already broken. “There are very considerably more stories than there are journalists or academics who are in a position to write them,” the Vault 7 press release concludes.
—Posted by Emma Niles
New and Improved Comments
Right Skyscraper, Site Wide
Right Internal Skyscraper, Site wide