Daily Archives: March 8th, 2017

Snowden Calls Trove of Alleged CIA Hacking Tools Published by Wikileaks a ‘Big Deal’

Nika Knight reports for Common Dreams:

WikiLeaks on Tuesday released a trove of purported CIA documents hailed by security expert Jessalyn Radack as “in same category as [the] biggest leaks of classified info by [whistleblowers] Chelsea Manning and Edward Snowden.”

Indeed, Snowden himself described the leak as “genuinely a big deal” on Twitter. “Looks authentic,” the National Security Agency (NSA) whistleblower added. The New York Times also described the documents’ authenticity as “likely.”

The Times went on to describe the bombshell revelations included in the trove of documents:

Among other disclosures that, if confirmed, would rock the technology world, the WikiLeaks release said that the CIA and allied intelligence services had managed to bypass encryption on popular phone and messaging services such as Signal, WhatsApp, and Telegram. According to the statement from WikiLeaks, government hackers can penetrate Android phones and collect “audio and message traffic before encryption is applied.”

Tuesday’s release of documents comprise part one of a series, WikiLeaks wrote in a press statement. This first installment, titled “Year Zero,” contains “8,761 documents and files from an isolated, high-security network situated inside the CIA’s Center for Cyber Intelligence in Langley, Va.,” according to WikiLeaks.

READ MORE…

WikiLeaks Releases Docs Detailing Mass CIA Hacking

Jason Ditz reports for Antiwar:

Newly released by WikiLeaks today is a collection of CIA documents referred to as “Vault 7,” detailing the CIA’s hacking and surveillance technology development. The current release spans “Year 0” of the program, with several more years of documents expected to be released.

Officially called “Weeping Angel,” the program sought 0-day exploits in myriad technology, including not just computers and routers, but things like smartphones and even Smart TVs, with documents showing the CIA could make a Samsung-branded TV go into a “fake-off” mode, where it would appear to be turned off, but its microphone was active and the CIA could listen in to everything happening.

The same was true of the phones targeted, with the CIA having what is said to be a large cache of exploits against both Apple and Android-based phones, exploits they carefully kept guarded from the manufacturers of the phones so that the flaws were never properly repaired. The phone breaches were focused in part on having an OS-level exploit that would render security features in encrypted applications useless,

Also among the efforts, the CIA was trying to hack into cars, with an eye toward gaining remote control over cars anywhere in the world, leading to speculation that the cars would be made to “assassinate” the drivers in an undetectable manner.

READ MORE…