WikiLeaks says just 1 of Vault7 covert documents released so farWikiLeaks’ data dump on Tuesday accounted for less than one percent of ‘Vault 7’, a collection of leaked CIA documents which revealed the extent of its hacking capabilities, the whistleblowing organization has claimed on Twitter.

‘Year Zero’, comprising 8,761 documents and files, was released unexpectedly by WikiLeaks. The organization had initially announced that it was part of a larger series, known as ‘Vault 7.’

However, it did not give further information on when more leaks would occur or on how many series would comprise ‘Vault 7’.

The leaks have revealed the CIA’s covert hacking targets, with smart TVs infiltrated for the purpose of collecting audio, even when the device is powered off.

The Google Android Operating System, used in 85 percent of the world’s smartphones, was also exposed as having severe vulnerabilities, allowing the CIA to “weaponize” the devices.

The CIA would not confirm the authenticity of the leak. “We do not comment on the authenticity or content of purported intelligence documents.” Jonathan Liu, a spokesman for the CIA, is cited as saying in The Washington Post.

WikiLeaks claims the leak originated from within the CIA before being “lost” and circulated amongst “former U.S. government hackers and contractors.” From there the classified information was passed to WikiLeaks.

End-to-end encryption used by applications such as WhatsApp was revealed to be futile against the CIA’s hacking techniques, dubbed ‘zero days’, which were capable of accessing messages before encryption was applied.

The leak also revealed the CIA’s ability to hide its own hacking fingerprint and attribute it to others, including Russia. An archive of fingerprints – digital traces which give a clue about the hacker’s identity – was collected by the CIA and left behind to make others appear responsible.

CIA knew #Vault7 was coming, focus turns to contractors as source of leak – officials

US intelligence and law enforcement officials, speaking on condition of anonymity, told Reuters on Wednesday that the CIA had been aware of the impending leak of its cyberwarfare arsenal since the end of last year.

The unnamed officials also confirmed that an internal investigation by the agency into the source of the leak is focused primarily on contractors, who the agency believe passed the documents to WikiLeaks.

They also stated their belief that the 8,761 documents contained within the current “Year Zero” leak, the first of the “Vault 7” series, appear to be authentic.

On Wednesday, the FBI also announced its federal criminal investigation into WikiLeaks following the latest release and stated that it will be coordinating their efforts with the CIA.

The leak has already been described by experts as potentially more significant than the NSA leaks by Edward Snowden in 2013, the Wall Street Journal reported.

WikiLeaks’ publication of a massive batch of covert documents detailing the hacking techniques used by the CIA poses a multitude of uncomfortable questions for world leaders, law enforcement and even WikiLeaks itself.

In one poll tweeted earlier Wednesday, the transparency group asked whether it should work more closely with the tech industry to help shore up cyber defenses around the world.

WikiLeaks says that the classified information contained in the leaked documents was “lost” by the CIA and subsequently “circulated among former US government hackers and contractors in an unauthorized manner.”

One of those individuals is then said to have provided the whistleblowing website with the relevant content.

According to WikiLeaks a secure upload submission option, in which no identifying data about a source is recorded, is offered. WikiLeaks has not said if the identity of the source is known to the organization.

WikiLeaks stated on Twitter that the information revealed so far in Year Zero accounted for “less than 1 percent” of the total series of publications. More releases are expected but when they will occur is unknown.

It has also not announced the number of documents and files it plans to release or the frequency of release – unlike last year’s Podesta email leak where it released emails from the Democratic National Committee (DNC) each day in the run-up to the US election.

WikiLeaks claims the cache of documents and files released originated from within the CIA’s Center for Cyber Intelligence in Langley, Virginia. The CIA have not confirmed if the documents are authentic.

“We do not comment on the authenticity or content of purported intelligence documents,” Jonathan Liu, a spokesman for the CIA, told The Washington Post.

Ex-CIA Director Michael Hayden appeared concerned by the release, telling the BBC: “If what I have read is true, then this seems to be an incredibly damaging leak in terms of the tactics, techniques, procedures and tools that were used by the Central Intelligence Agency to conduct legitimate foreign intelligence.”

“In other words, it’s made my country and my country’s friends less safe.”

Edward Snowden tweeted that the leak, which consists mainly of HTML files and PDF documents, “looks authentic,” adding to the feeling that the files are genuine.

Year Zero has highlighted the extent of the CIA and MI6’s spying capabilities. The two intelligence agencies were revealed to have held a joint workshop on hacking into Samsung smart TVs, allowing them to listen to audio via the devices, even when powered off.

The leak also revealed that vulnerabilities in Google’s Android Operating System, used in 85 percent of the world’s smart phones, allowed it to be “weaponized” by the CIA using hacking code.

The techniques allow the CIA to access data from social messaging platforms, including WhatsApp, Weibo and Clockman before encryption, according to WikiLeaks.


This article was chosen for republication based on the interest of our readers. CSGlobe republishes stories from a number of other independent news sources, and are not produced by CSGlobe. Any views or opinions expressed in this article are solely those of the author/source presented below, and do not necessarily reflect the position of CSGlobe or its staff.
SOURCErt
Subscribe to our Newsletter

SHARE