Stephen Lendman

More About: Whistleblowers

WikiLeaks Releases Documents on CIA Hacking Tools

WikiLeaks Releases Documents on CIA Hacking Tools

by Stephen Lendman

On March 7, WikiLeaks published 8,761 documents, revealing secret CIA spying and hacking tools, saying:

The dump represents "the majority of (Langely's) hacking arsenal including malware, viruses, trojans, weaponized 'zero day' exploits, malware remote control systems and associated documentation."

The documents, called Vault 7, came from the CIA's Center for Cyber Intelligence. Edward Snowden tweeted "(s)till working through the publication, but what @Wikileaks has here is genuinely a big deal. Looks authentic."

Separately, he tweeted "first public evidence USG secretly paying to keep US software unsafe…(r)eckless beyond words."

Documents released showed personal computers infected with spyware aren't safe. Nor are supposedly secure iphones, ipads, android devices, and smart TVs, turned into CIA listening devices.

A WikiLeaks press release called its Tuesday dump "the largest ever publication of confidential documents on the agency."

It's the first part of a "Year Zero" series with lots more to come. It followed "disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election."

The agency "lost control of" most of its hacking tools, an "extraordinary collection (containing) more than several million lines of code, giv(ing) its possessor (its) entire hacking" capability.

A former US government hacker or contractor gave WikiLeaks "portions of the archive," it said.

"The agency's hacking division freed it from having to disclose its often controversial operations to the NSA (its primary bureaucratic rival) in order to draw on the NSA's hacking capacities."

It has over 1,000 hacking systems, including trojans, viruses and other "weaponized" malware.

The agency created is "own NSA," using cyber weapons with less accountability. WikiLeaks' source said CIA's covert hacking capabilities exceed its authorized powers, avoiding oversight - an issue demanding public debate.

CIA cyber expertise can make its hacking appear to come from other sources like Russia or China, making it easy to blame them for its cyber attacks.

On Wednesday, WikiLeaks tweeted it "released less than 1% of its #Vault 7 series in its part one publication yesterday 'Year Zero."

Lots more remains to be revealed. The CIA declined to comment on the release, an agency spokesman saying "(w)e do not comment on the authenticity or content of purported intelligence documents."

Rule of law protections in America are null and void. Police state powers annulled them.

Stephen Lendman lives in Chicago. He can be reached at lendmanstephen@sbcglobal.net. 

His new book as editor and contributor is titled "Flashpoint in Ukraine: How the US Drive for Hegemony Risks WW III."

http://www.claritypress.com/LendmanIII.html

Visit his blog site at sjlendman.blogspot.com. 

Listen to cutting-edge discussions with distinguished guests on the Progressive Radio News Hour on the Progressive Radio Network.

Join us on our Social Networks:

 

Share this page with your friends on your favorite social network:

GoldMoney