Connect with us

Hi, what are you looking for?

Jewish Business News

World Politics

Wikileaks releases mysterious “Vault 7”, the CIA hacking Documents

WikiLeaks to release mysterious ‘Year Zero’ trove of documents within hours, Julian Assange promises

Julian-Assange_ WikiLeaks

 

WikiLeaks has published a new series of leaks on the US Central Intelligence Agency (CIA). The dramatic release was announced Monday on the organisation’s official Twitter, run by its founder Julian Assange.

If it does prove legitimate, the dump will represent yet another catastrophic breach for the US intelligence community.

Please help us out :
Will you offer us a hand? Every gift, regardless of size, fuels our future.
Your critical contribution enables us to maintain our independence from shareholders or wealthy owners, allowing us to keep up reporting without bias. It means we can continue to make Jewish Business News available to everyone.
You can support us for as little as $1 via PayPal at office@jewishbusinessnews.com.
Thank you.

But the mystery began long before, when the organization posted a series of tweets asking: what, when, who, why, where, how did, mentioning a mysterious name code Vault 7.

 

 

 

This morning the official Twitter account has just posted an encrypted release with the name: ENCRYPTED RELEASE

Advertisement. Scroll to continue reading.

 

The controversial organization uses code names such as ‘Vault 7’  and ‘Year Zero’, and claims the release is the largest ever publication of confidential documents on the agency.

A statement by WikiLeaks says that the first part of the series, called:”Year Zero”, comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA’s Center for Cyber Intelligence in Langley, Virgina.

 

‘Year Zero’, according to the group, introduces the scope and direction of the CIA’s global covert hacking program. Its malware arsenal and dozens of ‘zero day’ weaponized created by the CIA, allegedly to further U.S. surveillance. In addition to exploits against a wide range of US and European company products. including Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, “which are turned into covert microphones”.

The group says the documents had been circulating among hackers who had worked for the U.S. government, one of whom gave them access to “portions of the archive,”

According to the press release the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation.

“There is an extreme proliferation risk in the development of cyber ‘weapons’.” says Assange.

 

 

 

Newsletter



Advertisement

You May Also Like

World News

In the 15th Nov 2015 edition of Israel’s good news, the highlights include:   ·         A new Israeli treatment brings hope to relapsed leukemia...

Entertainment

The Movie The Professional is what made Natalie Portman a Lolita.

Travel

After two decades without a rating system in Israel, at the end of 2012 an international tender for hotel rating was published.  Invited to place bids...

VC, Investments

You may not become a millionaire, but there is a lot to learn from George Soros.