WikiLeaks Releases Alleged Documents on CIA Hacking

WikiLeaks Releases Alleged Documents on CIA Hacking

WikiLeaks released thousands of documents that it said described the sophisticated software tools the Central Intelligence Agency uses to break into smartphones, computers and even internet-connected televisions, on Tuesday March 7.

The documents, which have not been confirmed as authentic to the CIA, include 7,818 web pages with 942 attachments, WikiLeaks said. The group has named the collection of released documents, “Vault 7.”

The source of the documents was not named, although it did say that Vault 7 had been “circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.”

The documents are dated from 2013 to 2016 and WikiLeaks has described them as “the largest ever publication of confidential documents on the agency.”

On Tuesday, a former intelligence officer who reviewed the documents said some of the code names for CIA programs, an organization chart and the description of a CIA hacking base seemed to be genuine.

Information released in these documents hint that CIA agents and allied intelligence services have been able to bypass encryption on popular phone and messaging services such as Signal, WhatsApp and Telegram.

In addition to the encryption hack, the documents also talk of a program code-named, “Weeping Angel” which uses a Samsung smart TV as covert listening devices. According to the WikiLeaks documents, even when the TV appears to be turned off, it is still on and listening to the conversations around it to send to CIA servers. The release said this program was created in cooperation with British intelligence.

Another program detailed in the documents is Umbrage, a voluminous library of cyberattack techniques that the CIA has collected from malware produced by other countries. Based on the leaked documents, CIA agents are able to mask the origin of some of its cyberattacks and confuse forensic investigators.

If proven to be authentic, the Vault 7 archive will fall into the same category as the biggest leaks of classified information in recent years, including the quarter million diplomatic cables taken by Chelsea Manning, the former Amry intelligence anyalyst and given to WikiLeaks in 2010, and the hundreds of thousands of documents taken from the National Security Agency by Edward Snowden and given to journalists in 2013.

Featured

  • New Gas Monkey Garage Venue Uses AI-Enhanced Video Technology

    Gas Monkey Garage, the automotive custom shop and entertainment brand founded by Richard Rawlings of Fast N’ Loud TV fame, has opened a vibrant new restaurant and bar in South Dakota, equipped with advanced, AI-enhanced video tech from IDIS Americas. Read Now

  • Data Driven, Proactive Response

    As cities face rising demands for smarter policing and faster emergency response, Real Time Crime Centers (RTCCs) are emerging as essential hubs for data-driven public safety. In this interview, two experts with deep field experience — Ross Bourgeois of New Orleans and Dean Cunningham of Axis Communications — draw on decades of operational, leadership and technology expertise to share how RTCCs are transforming public safety through innovation, interagency collaboration and a relentless focus on community impact. Read Now

  • Integration Imagination: The Future of Connected Operations

    Security teams that collaborate cross-functionally and apply imagination and creativity to envision and design their ideal integrated ecosystem will have the biggest upside to corporate security and operational benefits. Read Now

  • Smarter Access Starts with Flexibility

    Today’s workplaces are undergoing a rapid evolution, driven by hybrid work models, emerging smart technologies, and flexible work schedules. To keep pace with growing workplace demands, buildings are becoming more dynamic – capable of adapting to how people move, work, and interact in real-time. Read Now

  • Trends Keeping an Eye on Business Decisions

    Today, AI continues to transform the way data is used to make important business decisions. AI and the cloud together are redefining how video surveillance systems are being used to simulate human intelligence by combining data analysis, prediction, and process automation with minimal human intervention. Many organizations are upgrading their surveillance systems to reap the benefits of technologies like AI and cloud applications. Read Now

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.