Receive up-to-the-minute news updates on the hottest topics with NewsHub. Install now.

WikiLeaks Releases Trove of Alleged C.I.A. Hacking Documents

March 7, 2017 3:44 PM
176 8
WikiLeaks Releases Trove of Alleged C.I.A. Hacking Documents

The source of the documents was not named. WikiLeaks said the documents, which it called Vault 7, had been “circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.”

WikiLeaks said the source, in a statement, set out policy questions that “urgently need to be debated in public, including whether the C.I.A.’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency.” The source, the group said, “wishes to initiate a public...

Also read: Election software company says system never was compromised

Read more

Share in social networks:

Comments - 8
Credit

March 7, 2017 3:46 PM

If the documents are authentic, as appeared likely at first review, the release would be the latest coup for the anti-secrecy organization and a serious blow to the C.I.A., which maintains its own hacking capabilities to be used for espionage.

Photo

March 7, 2017 3:46 PM

WASHINGTON — In what appears to be the largest leak of C.I.A documents in history, on Tuesday thousands of pages describing sophisticated software tools and techniques used by the agency to break into smartphones, computers and even Internet-connected televisions.

New York edition

March 7, 2017 3:45 PM

Unlike the National Security Agency documents , they do not include examples of how the tools have been used against actual foreign targets. That could limit the damage of the leak to national security. But the breach was highly embarrassing for an agency that depends on secrecy.

Photo

March 7, 2017 3:45 PM

WASHINGTON — on Tuesday thousands of documents that it said described sophisticated software tools used by the to break into smartphones, computers and even Internet-connected televisions.

Credit

March 7, 2017 3:45 PM

The documents amount to a detailed, highly technical catalog of tools. They include instructions for compromising a wide range of common computer tools for use in spying: the online calling service Skype; Wi-Fi networks; documents in PDF format; and even commercial antivirus programs of the kind used by millions of people to protect their computers.

Subscribe

March 7, 2017 3:44 PM

Robert M. Chesney, a specialist in national security law at the University of Texas at Austin, likened the C.I.A. trove to National Security Agency hacking tools by a group calling itself the Shadow Brokers.

Subscribe

March 7, 2017 3:44 PM

In one revelation that may especially trouble the tech world if confirmed, WikiLeaks said that the C.I.A. and allied intelligence services have managed to compromise both Apple and Android smartphones, allowing their officers to bypass the encryption on popular services such as Signal, WhatsApp and Telegram. According to WikiLeaks, government hackers can penetrate smartphones and collect “audio and message traffic before encryption is applied.”

New York edition

March 7, 2017 3:44 PM

The initial release, which WikiLeaks said was only the first installment in a larger collection of secret C.I.A. material, included 7,818 web pages with 943 attachments, many of them partly redacted by WikiLeaks editors to avoid disclosing the actual code for cyberweapons. The entire archive of C.I.A. material consists of several hundred million lines of computer code, the group claimed.