Americans should be deeply troubled by WikiLeaks breach — Central Intelligence Agency warns

Share

"By the end of 2016, the CIA's hacking division, which formally falls under the agency's Center for Cyber Intelligence had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other "weaponized" malware", WikiLeaks said in a statement on its website.

The U.S. government has said that WikiLeaks is a tool of Russian intelligence agencies.

Mr Spicer would not comment on the documents released and also denounced Mr Assange for his previous release of classified materials, saying he had undermined USA national security in the past.

WikiLeaks has posted classified leaked documents online that it claims shows some of the CIA's hacking and surveillance techniques.

Wikileaks says numerous hacking tools described in Vault 7 were made unclassified to skirt rules on posting classified information to the internet-most of the CIA's malware requires the use of the internet for communication.

WikiLeaks claims the leaks contain several hundred million lines of code showing the Central Intelligence Agency has a dedicated team to develop hacks.

The WikiLeaks disclosures describe clandestine methods for bypassing or defeating encryption, antivirus tools and other protective security features for computers, mobile phones and even smart TVs.

More news: Boeing 737 MAX 9 makes its debut
More news: Immigration expert to speak after flood of recent raids and arrests
More news: Uncertain future for Ford staff in Bridgend

In January, the US intelligence community concluded that hackers associated with Russian intelligence agencies had stolen documents from USA political institutions - including the Democratic National Committee - and given them to WikiLeaks, who later published them.

U.S. intelligence agencies believe the emails were hacked by Russian Federation as part of a coordinated influence campaign to discredit Democratic candidate Hillary Clinton and help President Donald Trump, a Republican, win.

CIA spokesman Dean Boyd told The New York Times, "We do not comment on the authenticity or content of purported intelligence documents". In theory, such capabilities would allow spies to compromise older operating systems found on iPhones and Android smartphones, as well as other internet-connected devices like Samsung Smart TVs. Assange said he would work with technology companies to help them protect against the hacking tools. In a move unusual for Wikileaks, individuals' names have been redacted and replaced with unique identifiers.

One of the pages notes that the US intelligence community "develops software exploits and implants for high priority target cell phones for intelligence collection".

"WikiLeaks has a lot more information on what has been going on with the cyber weapons programme", he said.

Google's response is nearly identical to Apple's, but isn't particularly comforting given that the documents WikiLeaks has released are at least a year old, and more are on their way.

Share