[Home] [Headlines] [Latest Articles] [Latest Comments] [Post] [Sign-in] [Mail] [Setup] [Help] [Register]
Status: Not Logged In; Sign In
Dead Constitution See other Dead Constitution Articles Title: WikiLeaks Releases Documents on CIA Hacking Tools WikiLeaks Releases Documents on CIA Hacking Tools by Stephen Lendman On March 7, WikiLeaks published 8,761 documents, revealing secret CIA spying and hacking tools, saying: The dump represents the majority of (Langelys) hacking arsenal including malware, viruses, trojans, weaponized zero day exploits, malware remote control systems and associated documentation. The documents, called Vault 7, came from the CIAs Center for Cyber Intelligence. Edward Snowden tweeted (s)till working through the publication, but what @Wikileaks has here is genuinely a big deal. Looks authentic. Separately, he tweeted first public evidence USG secretly paying to keep US software unsafe
(r)eckless beyond words. Documents released showed personal computers infected with spyware arent safe. Nor are supposedly secure iphones, ipads, android devices, and smart TVs, turned into CIA listening devices. A WikiLeaks press release called its Tuesday dump the largest ever publication of confidential documents on the agency. Its the first part of a Year Zero series with lots more to come. It followed disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election. The agency lost control of most of its hacking tools, an extraordinary collection (containing) more than several million lines of code, giv(ing) its possessor (its) entire hacking capability. A former US government hacker or contractor gave WikiLeaks portions of the archive, it said. The agencys hacking division freed it from having to disclose its often controversial operations to the NSA (its primary bureaucratic rival) in order to draw on the NSAs hacking capacities. It has over 1,000 hacking systems, including trojans, viruses and other weaponized malware. The agency created is own NSA, using cyber weapons with less accountability. WikiLeaks source said CIAs covert hacking capabilities exceed its authorized powers, avoiding oversight - an issue demanding public debate. CIA cyber expertise can make its hacking appear to come from other sources like Russia or China, making it easy to blame them for its cyber attacks. On Wednesday, WikiLeaks tweeted it released less than 1% of its #Vault 7 series in its part one publication yesterday Year Zero. Lots more remains to be revealed. The CIA declined to comment on the release, an agency spokesman saying (w)e do not comment on the authenticity or content of purported intelligence documents. Rule of law protections in America are null and void. Police state powers annulled them. Stephen Lendman lives in Chicago. He can be reached at lendmanstephen@sbcglobal.net. His new book as editor and contributor is titled "Flashpoint in Ukraine: How the US Drive for Hegemony Risks WW III." http://www.claritypress.com/LendmanIII.html Visit his blog site at sjlendman.blogspot.com. Listen to cutting-edge discussions with distinguished guests on the Progressive Radio News Hour on the Progressive Radio Network. Post Comment Private Reply Ignore Thread
|
||
[Home]
[Headlines]
[Latest Articles]
[Latest Comments]
[Post]
[Sign-in]
[Mail]
[Setup]
[Help]
[Register]
|