You turn to us for voices you won't hear anywhere else.

Sign up for Democracy Now!'s Daily Digest to get our latest headlines and stories delivered to your inbox every day.

WikiLeaks Publishes Thousands of Alleged Secret CIA Documents

Web ExclusiveMarch 08, 2017
Listen
Media Options
Listen

Related

WikiLeaks has published what it says is the largest leak of secret CIA documents in history. The thousands of documents, dubbed “Vault 7,” describe CIA programs and tools that are capable of hacking into both Apple and Android cellphones. By hacking into entire phones, the CIA is then reportedly able to bypass encrypted messenger programs such as Signal, Telegram and WhatsApp, although—contrary to many news reports—the documents do not show the CIA has developed tools to hack these encrypted services themselves. The documents also outline a CIA and British intelligence program called “Weeping Angel,” through which the spy agency can hack into a Samsung smart television and turn it into a surveillance device that records audio conversations, even when it appears to be off. Other documents describe ways to hack into Skype, Wi-Fi networks, PDFs and commercial antivirus programs. The leak also shows the CIA has reportedly looked for ways to hack into cars and trucks, which WikiLeaks said “would permit the CIA to engage in nearly undetectable assassinations.”

Other documents outline how the CIA has used the U.S. Consulate in Frankfurt, Germany, as a covert base to spy on Europe, the Middle East and Africa. Monday’s release totals 7,818 web pages and 943 attachments, which WikiLeaks says comes from the CIA’s Center for Cyber Intelligence in Langley, Virginia. Some of the material was redacted by WikiLeaks to avoid releasing the actual computer code used in the programs.

WikiLeaks says Monday’s release is only the first batch of many more secret CIA documents. The CIA has refused to comment on the authenticity of the documents. But at least one anonymous government official told The New York Times the documents were real, while another a former intelligence officer told the Times the code names used in the documents appeared to be accurate. WikiLeaks did not reveal the source of the leak, but did say the source “wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.”

On Twitter, Edward Snowden said, “The CIA reports show the [U.S. Government] developing vulnerabilities in US products, then intentionally keeping the holes open. Reckless beyond words.”

Related Story

StoryAug 16, 2022Mike Pompeo & CIA Sued for Spying on Americans Who Visited Julian Assange in Ecuadorian Embassy in U.K.
The original content of this program is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 United States License. Please attribute legal copies of this work to democracynow.org. Some of the work(s) that this program incorporates, however, may be separately licensed. For further information or additional permissions, contact us.

Non-commercial news needs your support

We rely on contributions from our viewers and listeners to do our work.
Please do your part today.
Make a donation
Top