Wikileaks just unveiled the largest ever publication of confidential CIA documents, which has been named “Vault 7”. The recent publication consists of 8,761 documents which Wikileaks’ Founder Julian Assange has claimed embodies, “the entire hacking capacity of the CIA.” The anonymous source of Wikileaks has said in a statement that they would like to spur a public debate regarding the “security, creation, use, proliferation and democratic control of cyberweapons.”
Wikileaks released part one on Tuesday March 7, 2017, which is part of a series of leaks on the US Central Intelligence Agency (CIA), which is titled “Year Zero”. In their initial Vault 7 Press Statement they state exactly how the documents got into their hands: “Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.”
Reports claim that the CIA has been receiving priority from the US government over the NSA since 2001, which has given the CIA the financial freedom to create its own group of hackers. By the end of 2016, the CIA’s hacking operations department had more than 5,000 registered users with more than a thousand hacking systems and viruses.
The Year Zero files contain information about the CIA’s global covert hacking system, including “weaponized exploits” used against company products including “Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.” The CIA also has the capability to bypass encryption on popular phone and messaging services such as Signal, WhatsApp and Telegram. Reports state that government hackers can even hack into Android phones and collect “audio and message traffic before encryption is applied.”
Vault 7 is also said to expose that the CIA have the ability to engage in false flag cyberattacks that make it look like Russia is the assailant. Wikileaks’ source states that it “collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.” Another program that the reports uncover is “Weeping Angel”, which is designed by the CIA’s Embedded Devices Branch (EDB), and essentially turns smart TVs into their own personal microphones.
The project has the ability to put the TV into a “fake off” mode, so that the TV looks like it’s off when it’s really on. The purpose of putting a TV in “fake off” mode it so that it can act as a bug, which records conversations and spies on people, before sending that information over the internet to a CIA server.
The release of this information by Wikileaks is just the beginning, as they have confirmed that this is merely “part one”. According to Assange, “There is an extreme proliferation risk in the development of cyber ‘weapons’. Comparisons can be drawn between the uncontrolled proliferation of such ‘weapons’, which results from the inability to contain them combined with their high market value, and the global arms trade.”
IMAGE CREDIT:dolgachov / 123RF Stock Photo
I am Luke Miller, content manager at Truth Theory and creator of Potential For Change. I like to blend psychology and spirituality to help you create more happiness in your life.Grab a copy of my free 33 Page Illustrated eBook- Psychology Meets Spirituality- Secrets To A Supercharged Life You Control Here