Home Tags Posts tagged with "intelligence documents"

intelligence documents

Details of what it is thought to be wide-ranging hacking tools used by the CIA have been published by WikiLeaks.

According to the documents, the alleged cyber-weapons are said to include malware that targets Windows, Android, iOS, OSX and Linux computers as well as internet routers.

Some of the software is reported to have been developed in-house, but the UK’s MI5 agency is said to have helped build a spyware attack for Samsung TVs.

A spokesman for the CIA would not confirm the details.

He said: “We do not comment on the authenticity or content of purported intelligence documents.”

WikiLeaks said that its source had shared the details with it to prompt a debate into whether the CIA’s hacking capabilities had exceeded its mandated powers.

According to documents dated June 2014, the effort to compromise Samsung’s F8000 range of smart TVs was codenamed Weeping Angel.

They describe the creation of a “fake-off” mode, designed to fool users into believing that their screens had been switched off.

Image source Wikimedia

Instead, the documents indicate, infected sets were made to covertly record audio, which would later be transferred over the internet to CIA computer servers once the TVs were fully switched back on, allowing their Wi-Fi links to re-establish.

Under a “future work” section, it is suggested that video snapshots might also be taken and the Wi-Fi limitation be overcome.

Samsung has not commented on the allegations.

WikiLeaks also claims that as of 2016, the CIA has built up an arsenal of 24 Android “zero days” – the term given to previously unknown security flaws in code.

Some of these are said to have been discovered by the CIA, but others were allegedly obtained from the UK’s GCHQ agency as well as the NSA and unnamed third-parties.

Samsung, HTC and Sony devices, among others, were said to have been compromised as a result, allowing the CIA to read messages on Whatsapp, Signal, Telegram and Weibo among other chat services.

It is also claimed that a specialized CIA unit was set up to target iPhones and iPads, allowing the agency to see a target’s location, activate their device’s camera and microphone, and read text communications.

The CIA unit is also reported to have made use of further iOS “zero days” obtained from GCHQ, the NSA and FBI.

Other claims say the CIA:

  • was trying to find ways to infect vehicles’ computer control systems. WikiLeaks claims these might have been used for undetectable assassinations.
  • had found ways to infect “air-gapped” computers – machines that are not linked up to the internet or other insecure networks. Methods are said to have included hiding data in images or hidden parts of computer storage.
  • had developed attacks against popular anti-virus products
  • had built up a library of hacking techniques “stolen” from malware developed in Russia and elsewhere

WikiLeaks describes its release as the first in a series of planned leaks about the CIA’s cyber-activities, which it refers to as Vault 7.

The material had already circulated among hackers who used to work for the US government as well as contractors in an unauthorized manner.

The US expresses its “disappointment” over China’s failure to hand over fugitive Edward Snowden.

After talks with senior Chinese officials, US Deputy Secretary of State William Burns said Beijing’s actions undermined “trust” in bilateral ties.

China said Hong Kong – which allowed to Edward Snowden to leave Russia – had acted in accordance with the territory’s law.

Meanwhile, Microsoft has been accused of working with US intelligence bodies to help intercept users’ data.

Citing the latest secret documents leaked by Edward Snowden, The Guardian newspaper said Microsoft had worked with the FBI and the NSA to facilitate access to information.

The newspaper claimed Microsoft allowed the NSA to circumvent its system of email encryption.

Edward Snowden, 30, is believed to be currently staying at a Moscow airport

Edward Snowden, 30, is believed to be currently staying at a Moscow airport

It also said information had been made available through access to cloud storage service SkyDrive and chat service Skype.

In response, the company said in a statement: “Microsoft does not provide any government with blanket or direct access to SkyDrive, Outlook.com, Skype or any Microsoft product.”

It added that it had provided customer data only in response to lawful government requests.

William Burns was speaking after the two-day talks with the Chinese officials on trade and cyber security in Washington.

“We were disappointed with how the authorities in Beijing and Hong Kong handled the Snowden case, which undermined our effort to build the trust needed to manage difficult issues,” he said.

In response, Chinese state councillor Yang Jiechi said Hong Kong’s actions were in accordance with its law.

“Its approach is beyond reproach,” Yang Jiechi added.

The row over Edward Snowden has strained relations between the US and China.

Washington wants to prosecute Edward Snowden over the leaking of thousands of classified US intelligence documents.

Edward Snowden, 30, is believed to be currently staying at a Moscow airport.

He has sent requests for political asylum to at least 21 countries, most of which have turned down his request.

However, Bolivia, Nicaragua and Venezuela have indicated they could take Edward Snowden in.