Wikileaks Reveals Hacking Tools Used By CIA

Fact checked

Wikileaks has released details of the wide-ranging hacking tools used by the CIA.

8,761 documents have been published as part of ‘Year Zero’, the first part in a series of leaks on the agency which has been dubbed ‘Vault 7.’

The whistleblowing organization claim that this is the largest ever batch of confidential documents on the CIA and that they reveal the breadth of the agency’s ability to hack smartphones and social media messaging apps such as  WhatsApp, Telegram and Signal.

A spokesman for the CIA would not confirm the details, saying “We do not comment on the authenticity or content of purported intelligence documents”

Edward Snowden however, tweeted his response describing it as “genuinely a big deal.”

RT reports:

In a statement WikiLeaks said ‘Year Zero’ revealed details of the CIA’s “global covert hacking program,” including “weaponized exploits” used against company products including “Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.”

According to the cache of documents released, the CIA’s Mobile Devices Branch (MDB) has developed multiple tools and systems to hack popular smart phones and remotely order them to send both location data as well as audio and text communications.

The phones’ cameras and microphones can also be remotely activated at will.

Such tools and techniques allow the CIA to hack social media platforms such as WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman before encryption can be applied, WikiLeaks claims in the statement on their website.

The time period covered in the latest leak is 2013 to 2016, according to the CIA timestamps on the documents themselves.

The source of the information told WikiLeaks in a statement that they wish to initiate a public debate about the “security, creation, use, proliferation and democratic control of cyberweapons.”

Policy questions that should be debated in public include “whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency,” WikiLeaks claims the source said.

Commenting on the leak, WikiLeaks co-editor Julian Assange said the cache showed the “extreme proliferation risk in the development of cyber ‘weapons.”

“The significance of ‘Year Zero’ goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective,” he said.

The FAQ section of the release yields some key details which highlight the true extent of the leak: firstly, the information was “obtained recently and covers through 2016”.

Secondly, WikiLeaks has asserted that it has not mined the entire leak and has only verified it, asking that journalists and activists do the leg work.

In WikiLeaks’ analysis of ‘Year Zero’ it detailed ‘Weeping Angel’, a surveillance technique which infiltrates smart TV’s, transforming them into microphones.

An attack against Samsung TV’s used ‘Weeping Angel’ in cooperation with MI5, placing them into a ‘Fake-Off’ mode, recording conversations even when the device appears to be off.

In the released batch “Things you might do” with ‘Weeping Angel’ is detailed in a document. “Investigate any listening ports & their respective services” is listed, along with “extract browser credentials or history.”

The release came after a planned press conference suffered a cyberattack, according to the whistleblowing organization. WikiLeaks has since rescheduled its press conference.

6 Comments

  1. Awww poor little CIA, now they know how it feels to be violated? Their personal little info files have been compromised?

    • george soros is only a son of a beach,sooner his Death better…he will die anyway,as the other monster did,david ruckefeller,may him ,,rest,,in hell,he n his family

  2. the c.i.a.must be decapitated once n for all! these mfs scumbags ,criminals,traitors,gays,pedophilies,Mr Putin,can you drop a ,,pizza,,on their heads? so the world can breath fresh air,finally?

Leave a Reply

Your email address will not be published.




This site uses Akismet to reduce spam. Learn how your comment data is processed.