Search
Close this search box.

WikiLeaks CIA Files: Are They Real And Are They A Risk


WikiLeaks has published thousands of documents that the anti-secrecy organization said were classified files revealing scores of secrets about CIA hacking tools used to break into targeted computers, cellphones and even smart TVs.

The CIA and the Trump administration declined to comment on the authenticity of the files Tuesday, but prior WikiLeaks releases divulged government secrets maintained by the State Department, Pentagon and other agencies that have since been acknowledged as genuine. In another nod to their authenticity, the chairman of the House intelligence committee, Rep. Devin Nunes, R-Calif., said he was very concerned about the release and has sought more information about it.

The hacking tools appeared to exploit vulnerabilities in popular operating systems for desktop and laptop computers developed by Microsoft. They also targeted devices that included Apple’s iPhones and iPads, Google’s Android cellphones, Cisco routers and Samsung Smart TVs.

Some of the technology firms said they were evaluating the newly released documents.

Some questions and answers about the latest WikiLeaks dump and its fallout:

WHERE DO THESE DOCUMENTS COME FROM?

WikiLeaks said the material came from “an isolated, high-security network” inside the CIA’s Center for Cyber Intelligence, the spy agency’s internal arm that conducts cyber offense and defense. It said the documents were “circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.” It did not make it clear who was behind the leak, leaving several possibilities: espionage, a rogue employee, a theft involving a federal contractor or a break-in of a staging server where such information may have been temporarily stored.

HOW MANY FILES WERE LEAKED? WHAT PERIOD DO THEY COVER?

WikiLeaks said 7,818 web pages and 943 attachments were published, but were just the first part of more material to come. WikiLeaks said it has an entire archive of data consisting of several million lines of computer code. The documents appear to date between 2013 and 2016. WikiLeaks described them as “the largest-ever publication of confidential documents on the agency.”

ARE THESE LEGITIMATE CIA DOCUMENTS?

A spokesman for the CIA said the agency would not comment “on the authenticity or content of purported intelligence documents.” Trump administration spokesman Sean Spicer declined comment as well. But WikiLeaks has a long track record of assembling and releasing secret files from the U.S. and other governments. Security experts who reviewed the material said the documents appeared to be authentic. Jake Williams, a security expert with Georgia-based Rendition Infosec, who has dealt previously with government hackers, said that frequent references in the files to operation security gave them the stamp of legitimacy. “It rings true to me,” Williams said.

WHAT DO THESE DOCUMENTS CONTAIN?

The files describe CIA plans and descriptions of malware and other tools that could be used to hack into some of the world’s most popular technology platforms. The documents showed that the developers aimed to be able to inject these tools into targeted computers without the owners’ awareness.

The files do not describe who the prospective targets might be, but the documents show broad exchanges of tools and information between the CIA and National Security Agency and other federal intelligence agencies, as well as intelligence services of close allies Australia, Canada, New Zealand and the United Kingdom.

The purported CIA documents range from complicated computer coding to organizational plans to sarcastic comments about the tools’ effectiveness. Some of the tools were named after alcohol references, including Bartender, Wild Turkey and Margarita. Others referenced recent popular movies, including “Fight Club” and “Talladega Nights.” One hacking tool, code-named “RickyBobby,” after the character who is a race car driver in “Talladega Nights,” was purportedly used to upload and download information “without detection as malicious software.”

The documents also include discussions about compromising some internet-connected televisions to turn them into listening posts. One document discusses hacking vehicle systems, appearing to indicate the CIA’s interest in hacking recent-model cars with sophisticated on-board computer systems.

HOW ARE TECHNOLOGY FIRMS RESPONDING TO THESE REVELATIONS?

Microsoft said it was looking into the reports that its operating systems were potentially vulnerable to many of the malware and other hacking tools described in the purported CIA documents. The maker of the secure messaging app Signal said the purported tools described in the leaked documents appeared to affect users’ actual phones, but not its software designs or encryption protocols. The manufacturer of the popular Telegram mobile messaging app said in a statement that manufacturers of cellphones and their operating systems, including Apple, Google and Samsung, were responsible for improving the security of their devices. It said the effort will require “many hours of work and many security updates” and assured its customers that “If the CIA is not on your back, you shouldn’t start worrying yet.”

(AP)



3 Responses

  1. Typical AP Fakestream style reporting hushing up Vault 7 bombshell (reported in conservativeread.com):

    CIA Can Stage Fake Russian Hacking to Undermine Trump
    CIA kept Russian cyber-attack techniques handy for false flags

    WASHINGTON, D.C. – The Wikileaks “Vault 7” drop of CIA cyber-warfare documents contains the startling revelation that the CIA, under a project identified as “Umbrage,” maintained a substantial library of Russian cyber-attack techniques “stolen” from malware produced in other states including the Russian Federation.

    This revelation yields a “through the looking glass” possibility that the Obama administration obtained FISA permission to conduct electronic surveillance on Russians believed to be coordinating with the Trump campaign based on intelligence the CIA planted to deceive the NSA into thinking there was actual contact between Russian agents and the Trump campaign.

    Possibly, what the CIA was monitoring was not actual contacts between Russian agents and the Trump campaign, but CIA-created counter-espionage designed to implicate Trump and provide the legal context for the DOJ to have enough “evidence” to obtain a FISA green-light.

  2. “WHERE DO THESE DOCUMENTS COME FROM?”

    Let’s start with the Obama Administration having instituted (contrary to the well-established “need to know” basis) an unprecedented sharing policy between some 16 different security agencies (this apparently being done to sabotage Trump).

    Then there is some self-contradictory set of legacy rules which opened this up for abuse.

    As example, anything designated as classified or secret could not legally be allowed to be stationed outside the direct control of the U.S. (but things like shooting missiles in foreign soil which, though outside of the control of the U.S. during its flight, are legal because it self-destructs quickly).

    Thus things like computer viruses which are lodged within foreign control (on foreign soil within foreign equipment controlled by foreign power) are often designed to stay indefinitely and would technically violate this law.
    So the product (virus) is not properly classified so as to not contravene the law.

    So it has become openly available to the entire “16” different security agencies without the restriction of “need to know”.

  3. theyre “real” as defined by webster/britanicca, but the foundation of assanges narrative is (censored/allowed) “evidence” only.

    its a fake bottom layer to begin with. theyve been spying/manipulating directly on peoples brains since at least the beginning of last century.

    they warn of hacking cars.. theyve been phisically doing that with sattelite since i can first remember.

    its probably creating a reserved option for a police state in wartime. -a fake excuse as to how theyre really spying on people and creating ambiguity with what theyre really doing with it.

    .
    the top layer manipulates and censors what this bottom layer is ‘recording’ as ‘evidence’.
    .

    all their evidence is fake illegally enforced narratives they use in secret board rooms with tokens present implimenting nightmare darpa tech w sattellites allowing others to be recorded as the guilty party.

    the failure was not protecting/rescuing assange and others and reacting instantly to his original information.w.

    ‘evidence’ in the west is a 180 degree lie straight to your face.

    khodorkovsky, pinto etc must be imbiciles to believe their crimes werent devised in a board room years before they were committed.

    i dont see ‘tanya harding’ trump complaining that his BUSINESS COMPETITION was ‘wire tapped’ his entire lifetime (alex jones etc.)

    there will come a time with technology when u can go to bed a 20 year old white guy and wake up with ur mind inside a 60 year old black lady from angola 5000 miles away.. and the only “truth” will be: overthrow r1b.

Leave a Reply


Popular Posts