Mar 07, 2017
WikiLeaks on Tuesday released a trove of purported CIA documents hailed by security expert Jessalyn Radack as "in same category as [the] biggest leaks of classified info by [whistleblowers] Chelsea Manning and Edward Snowden."
"The CIA reports show the U.S. government developing vulnerabilities in U.S. products, then intentionally keeping the holes open. Reckless beyond words."
--Edward SnowdenIndeed, Snowden himself described the leak as "genuinely a big deal" on Twitter. "Looks authentic," the National Security Agency (NSA) whistleblower added. The New York Times also described the documents' authenticity as "likely."
The Times went on to describe the bombshell revelations included in the trove of documents:
Among other disclosures that, if confirmed, would rock the technology world, the WikiLeaks release said that the CIA and allied intelligence services had managed to bypass encryption on popular phone and messaging services such as Signal, WhatsApp, and Telegram. According to the statement from WikiLeaks, government hackers can penetrate Android phones and collect "audio and message traffic before encryption is applied."
Tuesday's release of documents comprise part one of a series, WikiLeaks wrote in a press statement. This first installment, titled "Year Zero," contains "8,761 documents and files from an isolated, high-security network situated inside the CIA's Center for Cyber Intelligence in Langley, Va.," according to WikiLeaks.
"The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive," writes the transparency organization, noting that this means the CIA's cyber arsenal has already been widely and possibly insecurely shared.
WikiLeaks explains that "'Year Zero' introduces the scope and direction of the CIA's global covert hacking program, its malware arsenal and dozens of 'zero day' weaponized exploits against a wide range of U.S. and European company products, include Apple's iPhone, Google's Android, and Microsoft's Windows, and even Samsung TVs, which are turned into covert microphones."
Indeed, the documents appear to confirm security experts' and privacy advocates' warnings about the dangers of so-called "smart" technologies:
\u201cThat Samsung smart TV? The CIA can turn the mic on and listen to everything you say #vault7 #1984rebooted\u201d— WikiLeaks (@WikiLeaks) 1488905287
And Snowden notes that the documents demonstrate that the U.S. government itself appears to be paying tech companies to ensure their products remain insecure. "Reckless beyond words," he tweeted:
\u201cThe CIA reports show the USG developing vulnerabilities in US products, then intentionally keeping the holes open. Reckless beyond words.\u201d— Edward Snowden (@Edward Snowden) 1488905305
In describing the scope of the archive, WikiLeaks details the vast hacking powers of the CIA--powers that the CIA itself seems to have lost control over, according to the leak:
Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA). The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force--its own substantial fleet of hackers. The agency's hacking division freed it from having to disclose its often controversial operations to the NSA (its primary bureaucratic rival) in order to draw on the NSA's hacking capacities.
By the end of 2016, the CIA's hacking division, which formally falls under the agency's Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other "weaponized" malware. Such is the scale of the CIA's undertaking that by 2016, its hackers had utilized more code than that used to run Facebook. The CIA had created, in effect, its "own NSA" with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.
"In a statement to WikiLeaks," the organization adds, "the source [of the document leak] details policy questions that they say urgently need to be debated in public, including whether the CIA's hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons."
"Once a single cyber 'weapon' is 'loose' it can spread around the world in seconds, to be used by rival states, cyber mafia, and teenage hackers alike," WikiLeaks notes.
We're optimists who believe in the power of informed and engaged citizens to ignite and enact change to make the world a better place.
We're hundreds of thousands strong, but every single supporter counts.
Your contribution supports this new media model—free, independent, and dedicated to uncovering the truth. Stand with us in the fight for social justice, human rights, and equality. As a people-powered nonprofit news outlet, we cover the issues the corporate media never will. Join with us today!
Our work is licensed under Creative Commons (CC BY-NC-ND 3.0). Feel free to republish and share widely.
We've had enough. The 1% own and operate the corporate media. They are doing everything they can to defend the status quo, squash dissent and protect the wealthy and the powerful. The Common Dreams media model is different. We cover the news that matters to the 99%. Our mission? To inform. To inspire. To ignite change for the common good. How? Nonprofit. Independent. Reader-supported. Free to read. Free to republish. Free to share. With no advertising. No paywalls. No selling of your data. Thousands of small donations fund our newsroom and allow us to continue publishing. Can you chip in? We can't do it without you. Thank you.