Wikileaks- Inside CIA’s Global Hacking Force

 In Politics, Technology

Wikileaks published a new series of documents labeled “Vault 7,” and are from the inside of the CIA’s “Global Hacking Force.”  The first installment, called “Year Zero” contains more pages of information than the first three years of Edward Snowden’s NSA leaks. The big story today is that they appear to have worked with companies to leave holes in the security of devices so that they can get in. Literally, they paid tech companies to make products insecure.

Announcing the data leaks

Within minutes of Wikileaks announcement, Julian Assange’s live streaming entities, Periscope and Facebook were attacked. They immediately rescheduled the press conference and initiated contingency plans. They sent out a passphrase for dumping the CIA data: “SplinterItIntoAThousandPiecesAndScatterItIntoTheWinds”

The dump includes evidence that the US Government was PAYING companies to keep their technology insecure. The incredible part of this is that the CIA amassed MAJOR cyber weapons and then lost control of them.

The Wikileaks Statement on Vault 7 reads in part:

“Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.

Julian Assange, WikiLeaks editor stated that “There is an extreme proliferation risk in the development of cyber ‘weapons’. Comparisons can be drawn between the uncontrolled proliferation of such ‘weapons’, which results from the inability to contain them combined with their high market value, and the global arms trade. But the significance of “Year Zero” goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective.”

Wikileaks has carefully reviewed the “Year Zero” disclosure and published substantive CIA documentation while avoiding the distribution of ‘armed’ cyberweapons until a consensus emerges on the technical and political nature of the CIA’s program and how such ‘weapons’ should analyzed, disarmed and published.

Wikileaks has also decided to redact and anonymise some identifying information in “Year Zero” for in depth analysis. These redactions include ten of thousands of CIA targets and attack machines throughout Latin America, Europe and the United States.”

Some of the disclosures include how to skip activation codes on things like Windows, and the vulnerabilities in Android, and Chrome. How the CIA can turn on your phone or Smart TV and listen to every word you say. They blew the lid off the US Embassy in Frankfurt, Germany, outing it as a hacking base:

The CIA kept a stash of vulnerabilities:

Wikileaks states that the source of the CIA data is asking to initiate a public debate about the “security, creation, use, proliferation and democratic control of cyberweapons.” The extent of the CIA’s infestation of products that Americans assume are safe is mindblowing.

“Year Zero” is only the first of the CIA document releases.


Showing 3 comments
pingbacks / trackbacks

Leave a Comment

Start typing and press Enter to search

Twittercia hack