WikiLeaks CIA files The biggest spying secrets revealed by the release of Vault 7We’ve been pushing for disclosure, and whether the elite like it or not, it’s starting to happen!

In what’s now considered the largest ever publication of confidential CIA documents, Wikileaks has just unveiled what they’re calling “Vault 7.”

The major takeaway from the latest WikiLeaks dump centers around the terrifying, ‘all-seeing-eye’ surveillance project code-named ‘Weeping Angel.’

The CIA appears to have taken espionage to a whole new level if WikiLeaks’ initial analysis is accurate.

The massive set of documents – over 8,000 pages in all – include a host of hacking secrets that could embarrass intelligence agencies and the US government, as well as undermining spying efforts across the world.

According to the preliminary release, the CIA has the capability to hack, record and even control everyday technology used by billions of people around the world.

What Exactly Is Vault 7?

On Tuesday, March 7, 2017, Wikileaks released part one, titled “Year Zero,” of its new series of leaks on the U.S. Central Intelligence Agency (CIA).

Wikileaks explains how the documents got into their hands within their initial Vault 7 Press Statement, stating:

“Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.”

Since 2001, the CIA has been receiving priority from the US govenment over the NSA, giving the CIA the financial freedom to create its very own fleet of hackers.

The CIA’s hacking division is not obligated to disclose (or at least they choose not to) its controversial actions to the NSA “in order to draw on the NSA’s hacking capacities.

By 2016, the CIA’s hacking operations department had basically transformed itself into the agency’s own private NSA. At the end of 2016, the division had more than 5,000 registered users and had created upwards of a thousand hacking systems, trojans, viruses, and other “weaponized” malware.

To give you a better understanding of the scalability of this operation, the CIA hackers had used more code than what’s used to run Facebook. This begs the question: Why did the government feel the need to financially support the creation of a competitor to the NSA?

What The Confidential CIA Files Revealed

To understand the sheer scale of the leak and of the CIA’s high tech surveillance operations, the hierarchy of divisions within the agency’s cyber division can be looked at below.

According to WikiLeaks, the manufacturing division for the Agency’s hacking tools, or ‘zero days’ as they are dubbed in the leaks, is the EDG (Engineering Development Group), which is under the umbrella of the agency’s CCI (Center for Cyber Intelligence).

Smartphone devices

The CIA’s Mobile Devices Branch (MDB) developed a variety of tools and techniques to remotely hack and control the world’s most popular smartphones and tablets.

Once hacked, phones can be used to transmit their “geolocation, audio and text communications” directly to the CIA without the user’s knowledge. In addition, the CIA can remotely activate the phone’s microphone and camera.

Apple devices

Despite Apple holding a minority share in the global smartphone market in 2016, the CIA’s Mobile Development Branch has a specific division dedicated to the hacking of Apple devices which run the iOS operating system from smartphones and tablets.

WikiLeaks also alleges that the CIA not only developed but collaborated on or purchased a variety of hacking tools or ‘zero days’ from intelligence agencies and contractors around the world such as GCHQ, NSA, FBI or Baitshop.

Samsung

The EDG has produced a ‘zero day’ capable of hacking Samsung smart TVs, switching it into a fake ‘off mode’ where the device appears to remain on standby while actually recording audio and transmitting it to nearby secured CIA servers.

For context, Samsung was the top-selling television brand in the world for the last decade with a global market share of 21 percent as of 2015. WikiLeaks did not specify in the initial release whether video recordings were also a part of this particular ‘zero day.’

Vehicle control

As far back as 2014, WikiLeaks alleges that the CIA was exploring the possibility of infecting control systems in modern cars and trucks. While the exact goal of such control has yet to be established, WikiLeaks suggests that such hacks could be used for almost undetectable assassinations.

Android devices (Samsung, HTC, Sony)

The majority of the world’s smartphones (approximately 85 percent) run on the Android operating system, with roughly 1.15 billion Android devices sold last year, according to the WikiLeaks statement.

Naturally, the CIA devoted an entire subdivision to hacking Android devices, with 24 individual weaponized ‘zero days’ targeting Android devices.

Microsoft

The CIA’s cyber division has developed numerous local and remote ‘zero days’ to hack and control Microsoft Windows users.

These ‘zero days’ include, but are not limited to: air gap jumping viruses such as ‘Hammer Drill’ that are capable of infecting computers or phones that have never been connected to the internet; hacking tools that focus on removable devices such as USB drives; systems for hiding data, be it in covert disk areas or in images; particular ‘zero days’ that are manufactured to self-perpetuate and hide themselves from detection on an ongoing basis.

Before any tech experts gloat, WikiLeaks also alleges that the CIA has developed advanced, multi-platform malware attack and control systems that cover Windows and Mac OS X but also mixed source platforms like Solaris and open source platforms like Linux. Wikileaks names these specific ‘zero days’ as the EDB’s ‘HIVE,’ ‘Cutthroat’ and ‘Swindle’ tools.

Sources: | Independent | CE | RT