CIA’s ‘Vault 7’ WikiLeak Files Released On Twitter; Details Inside
Following after the publication of thousands of politicized emails during the US presidential election, Wikileaks has finally decided to turn its focus to the US intelligence services. That said, WikiLeaks, a renowned international non-profit organization that publishes secret information, news leaks, and classified media from anonymous sources have recently released a number of secret CIA files which gives concrete details of hacking tools that the government usually employs to break into users' computers, mobile phones and even smart TVs. Dubbed as Vault 7, the trove of documents was found to be the first of a number of disclosures that reveal the CIA's hacking abilities.
CIA's Vault 7
In one of their statements, WikiLeaks revealed that the series of publication is yet to be the largest intelligence publication in history. The organization continues to explain that the extraordinary collection, which is believed to have tantamount to more than several hundred million lines of code, which then gives its possessor the entire hacking capacity of the CIA. Additionally, it was found that the archive appears to have been circulated among former U.S. government hackers and contractors in what is known to be in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.
Furthermore, according to CBS News, former CIA acting director Michael Morrell said that because of what happened, they will have to start over again in terms of rebuilding tools to get information from our adversaries. Authorities said that the documents that have been spreading have also included certain discussions about compromising some internet-connected televisions in order to turn them into listening posts. Consequently, the said publications have apparently threatened to upend the confidence in an Obama-era government program, particularly the Vulnerability Equities Process, wherein several federal agencies have also warned technology companies about weaknesses in their software so they can be quickly fixed.
Are These Documents Real?
Meanwhile, as of the press time, despite the quick spread of the documents, the CIA has neither denied nor confirmed whether the documents are real, explaining that it does not comment on the authenticity or content of purported intelligence documents. However, former NSA contractor and whistleblower Edward Snowden took to Twitter to express his sentiments saying that the documents look authentic.
Wikileaks' Allegations Against CIA: Should You Be Worried?
A trove of new Wikileaks documents reveal that the CIA is capable of committing “undetectable assassinations” by hacking into the computer systems of autonomous cars. While the CIA has neither confirmed nor debunked the allegations, a number of security experts said they know enough about the CIA to know that the agency could actually murder people by hacking into peoples’ cars. This has raised a number of concerns about the future of autonomous cars and how well they could protect their owners from hackers and malicious programs.
Wikileaks Reveals That CIA Is Using Messaging Apps To Spy On Their Owners
According to Wikileaks, the CIA is spying on citizens by using messaging apps, smart TVs, smart cars and smartphones.
Edward Snowden´s Documents Reveal That Peter Thiel Helped NSA
Considering that Peter Thiel´s company helped to develop NSA´s spy program, it remains unknown how could the relationship between the Silicon Valley and Donald Trump´s administration prosper from now on.
WikiLeaks Could Get Support From Kim Dotcom´s Lawsuit Against New Zealand Government
While Kim Dotcom is facing extradition to the U.S., WikiLeaks leader Julian Assange might be convicted for publishing classified material regarding the American government, politicians, and military.
Julian Assange Explains Why He Loves Fake News
During a discussion in an event called "No more excuses, no more lies," Julian Assange explained the particular relationship between the pro-transparency organization Wikileaks and the famous fake news phenomenon.
MORE IN ITECHPOST
Tricks to Spy on iPhone without Installing Software
Nowadays, increasing trust issues are forcing people to turn into a spy. Everyone, including spouse, parents, and employers need a suitable spy app like Cocospy to spy on iPhone without installing the software.
A New Material for the Battery of the Future, Made in UCLouvain
Renewable sources of energy such as wind or photovoltaic are intermittent. The production peaks do not necessarily follow the demand peaks.
Top 5 Video Games to Play for a Truly Unique First Date
Video games have a way of taking us outside of ourselves and live in a fantasy world. It's even better when you're playing a game with someone special!