Latest news

New dump of CIA snooping data said to be more significant the Snowden leaks

The revelations from this will be far-reaching and explain a lot about current events

(NationalSentinel) Cyberwar: As the Trump administration battles leaks from the Deep State, it would seem as though it has another related problem: What to do about revelations the CIA has developed technology that is capable of penetrating virtually every handheld “smart” TV and cell phone, as well as any devices connected to the Internet of Things.

As reported by The Wall Street Journal, the latest dump of information by Wikileaks – which has never wrong, by the way – is said by intelligence sources to be even more significant (as in damaging) that those four years ago by former NSA contractor Edward Snowden:

An intelligence source said some of the information does pertain to tools that the CIA uses to hack computers and other devices. This person said disclosing the information would jeopardize ongoing intelligence-gathering operations and the revelations were far more significant than the leaks of Edward Snowden, a former contractor for the National Security Agency who exposed active surveillance programs in 2013. 

Mr. Snowden’s leaks revealed names of programs, companies that assist the NSA in surveillance and in some cases the targets of American spying. But the recent leak purports to contain highly technical details about how surveillance is carried out. That would make them far more revealing and useful to an adversary, this person said.

In one sense, Mr. Snowden provided a briefing book on U.S. surveillance, but the CIA leaks could provide the blueprints.

Snowden tweeted out that while he was still combing through the evidence, what Wikileaks has published thus far “looks authentic.” (RELATED: WikiLeaks unveils largest cache of CIA documents ever; agency spies through smart TVs, smart phones and other wireless devices)

Wikileaks, in a statement to the press, said it was not publishing source code for computers it said could then be replicated by unfriendly actors, but the whistleblower organization left open the possibility it could later if a “consensus” for release came together.

The CIA has apparently “lost control” over its hacking arsenal, Wikileaks added.

“This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA,” the site said in a statement. “The archive appears to have been circulating among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.”

What was released today was the first in what Wikileaks is describing as a series of disclosures called “Year Zero.”

Like our reporting? Sign up for our daily email newsletter and never miss a story! Click here

It said the first installment “introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of ‘zero day’ weaponized exploits against a wide range of U.S. and European company products.”

Wikileaks said its source was someone within the U.S. intelligence community who said the spy agency’s hacking powers “urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency.”

This is the most high-profile information leak since Wikileaks began published hacked emails from the campaign of Hillary Clinton and her campaign manager, John Podesta, as well as the Democratic National Committee – emails that revealed the Democratic establishment rigged the nomination process against her principle challenger, Sen. Bernie Sanders, I-Vt.

U.S. intelligence agencies and their lackeys in the mainstream press have repeatedly claimed those emails were hacked by Russian operatives. But just about as frequently, Wikileaks editor Julian Assange has said Russia is not the source of those leaks. (RELATED: Assange: Russia did NOT give WikiLeaks DNC, Clinton data; Obama trying to ‘de-legitimize’ election)

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: