This morning Wikileaks released what it claims is the largest ever release of confidential documents on the CIA. The documents seem to have come from another Edward Snowden type whistleblower in the agency: the source of the information told WikiLeaks in a statement that they wish to initiate a public debate about the “security, creation, use, proliferation and democratic control of cyberweapons.”
A total of 8,761 documents were published as part of ‘Year Zero,’ the first in a series of leaks Wikileaks has dubbed ‘Vault 7.’
Included in the ‘Vault 7’ documents are claims that the CIA
- ‘Stole’ Russian Malware, and uses it to make it look like Russia is responsible for Cyber Attacks inside the U.S.
- Planned to hack cars and trucks to carry out undetectable assassinations
- Turns Smart TVs, iPhones, gaming consoles and many other consumer gadgets into open microphones.
— WikiLeaks (@wikileaks) March 7, 2017
They Lost Control of their “hacking arsenal.”
While the information inside the leaks is scary enough, what’s even more concerning is the Whistleblower is claiming that the CIA has lost control of their “hacking arsenal.”
Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.
The data dump contains information detailing the CIA’s global hacking program, the large collection of malware utilized by the CIA, and their “Zero Day” weaponized exploits which could be used to hack “Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.”
Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA). The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force — its own substantial fleet of hackers. The agency’s hacking division freed it from having to disclose its often controversial operations to the NSA (its primary bureaucratic rival) in order to draw on the NSA’s hacking capacities.
By the end of 2016, the CIA’s hacking division, which formally falls under the agency’s Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other “weaponized” malware. Such is the scale of the CIA’s undertaking that by 2016, its hackers had utilized more code than that used to run Facebook. The CIA had created, in effect, its “own NSA” with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.
— WikiLeaks (@wikileaks) March 7, 2017
The press release goes into detail on how the vulnerability of these “cyber weapons” can be easily hijacked by third parties:
Cyber ‘weapons’ are in fact just computer programs which can be pirated like any other. Since they are entirely comprised of information they can be copied quickly with no marginal cost. … Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.
WikiLeaks founder and editor Julian Assange gave his own comment on the release, stating:
There is an extreme proliferation risk in the development of cyber ‘weapons’. Comparisons can be drawn between the uncontrolled proliferation of such ‘weapons’, which results from the inability to contain them combined with their high market value, and the global arms trade. But the significance of “Year Zero” goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective.