Sign up for our daily briefing

Make your busy days simpler with Axios AM/PM. Catch up on what's new and why it matters in just 5 minutes.

Please enter a valid email.

Please enter a valid email.

Subscription failed
Thank you for subscribing!

Catch up on coronavirus stories and special reports, curated by Mike Allen everyday

Catch up on coronavirus stories and special reports, curated by Mike Allen everyday

Please enter a valid email.

Please enter a valid email.

Subscription failed
Thank you for subscribing!

Denver news in your inbox

Catch up on the most important stories affecting your hometown with Axios Denver

Please enter a valid email.

Please enter a valid email.

Subscription failed
Thank you for subscribing!

Des Moines news in your inbox

Catch up on the most important stories affecting your hometown with Axios Des Moines

Please enter a valid email.

Please enter a valid email.

Subscription failed
Thank you for subscribing!

Minneapolis-St. Paul news in your inbox

Catch up on the most important stories affecting your hometown with Axios Twin Cities

Please enter a valid email.

Please enter a valid email.

Subscription failed
Thank you for subscribing!

Tampa Bay news in your inbox

Catch up on the most important stories affecting your hometown with Axios Tampa Bay

Please enter a valid email.

Please enter a valid email.

Subscription failed
Thank you for subscribing!

Charlotte news in your inbox

Catch up on the most important stories affecting your hometown with Axios Charlotte

Please enter a valid email.

Please enter a valid email.

Subscription failed
Thank you for subscribing!

Please enter a valid email.

Please enter a valid email.

Subscription failed
Thank you for subscribing!

Global Panorama via Flickr CC

WikiLeaks released more than 8,000 documents it says originate from the CIA's Center for Cyber Intelligence that reveal its hacking capabilities and programs between 2013 and 2016, including malware, viruses, Trojans, malware remote control systems, and weaponized exploits. That amounts to several hundred million lines of code and more pages than were published in the first three years of the Edward Snowden leaks.

They're calling it "Vault 7." The main findings:

  • The CIA has turned iPhones, Android devices, Windows operating systems, and Samsung TVs into covert microphones, known as "zero day" weaponized exploits.
  • "Weeping Angel," which infests Samsung smart TVs, was developed with the UK's MI5/BTSS, and turns the TV in a "Fake-Off" mode to route audio over the Internet to a covert CIA server.
  • The CIA has also developed attacks to remotely control popular smart phones so they send geolocation, audio, and text communications, and activate the phone's camera and microphone. The CIA either made these attacks or obtained them from the Government Communication Headquarters in the UK, the NSA, or the FBI, or purchased it from arms contractors. (Note, that bypasses the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide, and Cloakroom.)
  • The CIA has developed malware attacks and control systems for Windows, Mac OS X, Solaris, Linux, and more.
  • The U.S. Consulate in Frankfurt operates as a covert CIA hacker base, covering Europe, the Middle East, and Africa. WikiLeaks disclosed instructions the CIA hackers use to get through German Customs.

CIA spokesman Jonathan Liu told the AP: "We do not comment on the authenticity or content of purported intelligence documents."

Why this matters, according to WikiLeaks:

"Serious vulnerabilities not disclosed to the manufacturers places huge swathes of the population and critical infrastructure at risk to foreign intelligence or cyber criminals who independently discover or hear rumors of the vulnerability. If the CIA can discover such vulnerabilities so can others."

Also: In not disclosing the vulnerabilities to the companies at risk, the CIA may have violated the Vulnerability Equities Process that Obama enacted in 2014. And the malware revealed is able to penetrate and control both the Android and iPhone software that runs or has run presidential Twitter accounts. The U.S. made these cyber spying codes unclassified, which means the weapons can be "pirated" easily.

Wikileaks source: The source was former U.S. government hackers and contractors who circulated the documents without the authority to do so, one of whom handed them off to WikiLeaks. The source said the motivation was to allow the public to debate whether the CIA's hacking capabilities exceed its mandate.

Go deeper

Updated 11 mins ago - Politics & Policy

Inauguration Day dashboard

Screenshot: Fox News

President Trump has delivered a farewell speech and departed Washington for the last time on Air Force One, kicking off the day that will culminate with President-elect Joe Biden taking office.

What's next: The inaugural celebration for young Americans is being livestreamed, starting at 10am.

Updated 27 mins ago - Politics & Policy

Trump departs on final Air Force One flight

President Trump and his family took off on Air Force One at 9 a.m. on Wednesday morning for the final time en route to Florida.

The big picture: Trump's final hours as president were punctuated by his decisions to snub his successor's inauguration and grant pardons to many of his allies who have been swept up in corruption scandals.

Dion Rabouin, author of Markets
2 hours ago - Economy & Business

Janet Yellen said all the right things to reassure the markets

Illustration: Aïda Amer/Axios

Treasury Secretary nominee and former Fed chair Janet Yellen's confirmation hearing before the Senate Finance Committee on Tuesday showed markets just what they can expect from the administration of President-elect Joe Biden: more of what they got under President Trump — at least for now.

What it means: Investors and big companies reaped the benefits of ultralow U.S. interest rates and low taxes for most of Trump's term as well as significant increases in government spending, even before the coronavirus pandemic.