WikiLeaks published what it claimed were CIA spying secrets in a document release that rocked the internet.
The documents, released in a file named Vault 7, contains 8,761 documents and according to WikiLeaks accounts for “the entire hacking capacity of the CIA.”
Perhaps the most alarming part of the document dump thus far is WikiLeaks’ assertion that the CIA had “lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation.
CIA negligence sees it losing control of all cyber weapons arsenal sparking serious proliferation concerns #Vault7 https://t.co/mHaRNCr3Df pic.twitter.com/lwapDCKYt9
— WikiLeaks (@wikileaks) March 7, 2017
“This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA,” it wrote in a press release issued by the group.
U.S. Consulate in Frankfurt is a covert CIA hacker base https://t.co/K7wFTdlC82 pic.twitter.com/oqjtcVb56E
— WikiLeaks (@wikileaks) March 7, 2017
Assange explained that the fact that the CIA lost control of the materials is the reason WikiLeaks was able to obtain the information.
“The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive,” it said.
Even more frightening, if accurate, the documents show that the CIA is able to hack into smartphones, smart televisions and other items manufactured by companies like Samsung, Apple, Microsoft Windows and Google.
“‘Year Zero’ introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of ‘zero day’ weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones,” WikiLeaks wrote.
“The attack against Samsung smart TVs was developed in cooperation with the United Kingdom’s MI5/BTSS.,” it said and added that the malware attacks the television and “places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.”
Jointly developed CIA+MI5 malware infests Samsung smart TVs to turn them into covert microphones #Vault7 pic.twitter.com/Ki0wRlgjPP
— WikiLeaks (@wikileaks) March 7, 2017
#CIA hid ability to #hack smart phones and TVs worldwide from makers, despite #Obama pledge to reveal https://t.co/K7wFTdlC82 #Vault7
— WikiLeaks (@wikileaks) March 7, 2017
In what could be even more of a frightening revelation, is what the CIA reportedly looked into doing with computerized vehicles.
“As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations,” WikiLeaks wrote.
WikiLeaks decided not to publish the weapons themselves “until a consensus emerges on the technical and political nature of the CIA’s program and how such ‘weapons’ should analyzed, disarmed and published.”
The group said plenty of stories exist in the archive and encouraged reporters to mine the data and publish findings.
Social media responded in a big way with some likening the information to “Big Brother” in George Orwell’s “1984.”
This is G. Orwell 1984 on roids.
People must put political differences aside & demand answers #Vault7— Benjamin (@beninmaitland) March 7, 2017
#MaddeningAngel lmao literally the 2 way TVs and microphones literally everywhere from 1984 confirmed #Vault7
— Michael Emling (@CorporationMike) March 7, 2017
#Vault7 this is 1984 exactly with left now trying to control speech and the gov spying on us whenever and wherever they want
— ManBearPig (@EricGlenn84) March 7, 2017
1984 saw the future. @Snowden tried to tell the world. @whoismrrobot shows the world. @wikileaks confirms. Never trust government. #Vault7
— April Dalaman (@AprilDalaman) March 7, 2017
Others found it interesting that the CIA, according to the documents, can attack a target and leave fingerprints behind that make it appear as though another nation did the hacking.
An example might be, according to more than a few folks on Twitter, hacking into the Democrat National Committee computers and making it appear as though Russia did it. And then suggesting collusion between that nation and a political candidate.
So the CIA can hack anyone and make it look like another country did it. Well isn’t that interesting. #Vault7 pic.twitter.com/T6STYF7Kus
— Jeremy Nolt (@RealJeremyNolt) March 7, 2017
Obama using it against their political rivals and doing it to look like the Russians did it. Wake up liberals!!#Vault7
— Riya sharma (@riyasharma266) March 7, 2017
Ponder THIS: The CIA stole Russian malware and can use it to make attacks ‘appear’ to be from Russians! It’s over for Obama. #Vault7
— SPYING CREEPS SUCK! (@rtpburns) March 7, 2017
This story is still developing.
Wake up right! Receive our free morning news blast HERE
DONATE TO BIZPAC REVIEW
Please help us! If you are fed up with letting radical big tech execs, phony fact-checkers, tyrannical liberals and a lying mainstream media have unprecedented power over your news please consider making a donation to BPR to help us fight them. Now is the time. Truth has never been more critical!
- Britney Spears shows off her rockin’ new bod, but had to spoil it with a liberal message about ‘Dreamers’ - December 24, 2017
- Border patrol forget they’re supposed to be heartless, deliver beautiful baby at the border - December 24, 2017
- After scoring tax cut victory, Trump sees ‘tremendous Democrat support’ for his next big initiative - December 24, 2017
Comment
We have no tolerance for comments containing violence, racism, profanity, vulgarity, doxing, or discourteous behavior. If a comment is spam, instead of replying to it please click the ∨ icon below and to the right of that comment. Thank you for partnering with us to maintain fruitful conversation.
BPR INSIDER COMMENTS
Scroll down for non-member comments or join our insider conversations by becoming a member. We'd love to have you!