WikiLeaks released more than 8,000 documents it says originate from the CIA's Center for Cyber Intelligence that reveal its hacking capabilities and programs between 2013 and 2016, including malware, viruses, Trojans, malware remote control systems, and weaponized exploits. That amounts to several hundred million lines of code and more pages than were published in the first three years of the Edward Snowden leaks.
They're calling it "Vault 7." The main findings:
- The CIA has turned iPhones, Android devices, Windows operating systems, and Samsung TVs into covert microphones, known as "zero day" weaponized exploits.
- "Weeping Angel," which infests Samsung smart TVs, was developed with the UK's MI5/BTSS, and turns the TV in a "Fake-Off" mode to route audio over the Internet to a covert CIA server.
- The CIA has also developed attacks to remotely control popular smart phones so they send geolocation, audio, and text communications, and activate the phone's camera and microphone. The CIA either made these attacks or obtained them from the Government Communication Headquarters in the UK, the NSA, or the FBI, or purchased it from arms contractors. (Note, that bypasses the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide, and Cloakroom.)
- The CIA has developed malware attacks and control systems for Windows, Mac OS X, Solaris, Linux, and more.
- The U.S. Consulate in Frankfurt operates as a covert CIA hacker base, covering Europe, the Middle East, and Africa. WikiLeaks disclosed instructions the CIA hackers use to get through German Customs.
CIA spokesman Jonathan Liu told the AP: "We do not comment on the authenticity or content of purported intelligence documents."