WikiLeaks publishes thousands of documents, claims they come from CIA cyber center

WikiLeaks publishes thousands of documents, claims they come from CIA cyber center, Washington ExaminerKyle Feldscher, March 7, 2017

WikiLeaks on Tuesday began releasing information it says is the largest ever publication of documents from the CIA, starting with more than 8,700 documents from the agency’s high-security network.

In a press release, WikiLeaks said the CIA “lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized ‘zero day’ exploits, malware remote control systems and associated documentation.”

That loss of control allowed much of the CIA’s hacking capability to become public and was given to WikiLeaks.

According to the statement, Tuesday’s release shows the “scope and direction” of the CIA’s global hacking program. That program is meant to target American and European products such as the Apple iPhone, Android phones, the Microsoft Windows computer software system and Samsung TVs, which can be turned into microphones.

WikiLeaks says its source “details policy questions that they say urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.

“There is an extreme proliferation risk in the development of cyber ‘weapons,’ ” said Julian Assange, founder of WikiLeaks. “Comparisons can be drawn between the uncontrolled proliferation of such ‘weapons,’ which results from the inability to contain them combined with their high market value, and the global arms trade.

“But the significance of ‘Year Zero’ [the first part of the release] goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective.”

Explore posts in the same categories: CIA, Cyber attacks, Cyber security, WikiLeaks

Tags: , , ,

You can skip to the end and leave a response. Pinging is currently not allowed.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s