{"id":67962,"date":"2017-03-07T18:19:43","date_gmt":"2017-03-07T22:19:43","guid":{"rendered":"https:\/\/stateofthenation2012.com\/?p=67962"},"modified":"2017-03-07T18:27:43","modified_gmt":"2017-03-07T22:27:43","slug":"wikileaks-cia-hacking-cars-and-trucks-to-conduct-assassinations","status":"publish","type":"post","link":"https:\/\/stateofthenation2012.com\/?p=67962","title":{"rendered":"WikiLeaks: CIA hacking cars and trucks to conduct assassinations"},"content":{"rendered":"<h1 class=\"section-theme-background-indicator publication-font\">CIA planned to hack cars and trucks to carry out undetectable assassinations claims WikiLeaks<\/h1>\n<p><!--more--><\/p>\n<h2>The hacking organisation made the admission as it announced it is about to release a huge trove of confidential documents from the CIA as part of its mysterious Year Zero series<\/h2>\n<p><iframe loading=\"lazy\" src=\"\/\/players.brightcove.net\/4221396001\/V19oeQPdg_default\/index.html?videoId=5174530709001&amp;applicationId=MIRROR%20Embed%20Offsite\" width=\"640px\" height=\"360px\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<p>BY RACHEL BISHOP<br \/>\nMirror<\/p>\n<p><a href=\"http:\/\/www.mirror.co.uk\/all-about\/wikileaks\" data-action=\"wikileaks\" data-content-type=\"section-topic\" data-track=\"false\" data-type=\"inline\" data-word-count=\"1\">WikiLeaks<\/a> has claimed the CIA planned to hack cars and trucks to carry out assassinations.<\/p>\n<p>The secretive organisation said the U.S. Central Intelligence Agency used the phone&#8217;s geolocation software to tap into vehicle control systems in modern cars.<\/p>\n<p>The hacking organisation made the statement as it announced a huge release of confidential documents from the CIA as part of its mysterious Year Zero series, founder Julian Assange claimed.<\/p>\n<p>It claims the CIA has been carrying out a global covert hacking program that exploits US and European companies.<\/p>\n<p>It claims these include Apple&#8217;s iPhone, Google&#8217;s Android and Microsoft&#8217;s Windows and even Samsung TVs, which it says &#8220;are turned into covert microphones.&#8221;<\/p>\n<p>Mr Assange was set to speak about Year Zero on Facebook today, but a livestream of the event was reportedly hacked. It is not clear when the event has been rescheduled to.<\/p>\n<figure class=\"in-article-image\" data-mod=\"image\" data-init=\"true\">\n<div class=\"outer\">\n<div class=\"spacer\"><\/div>\n<div class=\"mod-image\"><img decoding=\"async\" src=\"http:\/\/i4.mirror.co.uk\/incoming\/article7358396.ece\/ALTERNATES\/s615b\/CIA.jpg\" alt=\"\" \/><\/div>\n<\/div><figcaption><span class=\"credit\">(Photo: Getty)<\/span><\/figcaption><\/figure>\n<p>The group said that from October 2014 the CIA was &#8220;looking at infecting the vehicle control systems used by modern cars and trucks&#8221; to possibly enable them to &#8220;engage in nearly undetectable assassinations.&#8221;<\/p>\n<p>They added: &#8220;The CIA&#8217;s Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones.&#8221;<\/p>\n<p>They claimed these included iPhones, which account for 14% of the market and Google Android, &#8220;which is used to run the majority of the world&#8217;s smart phones (85%) including Samsung, HTC and Sony. 1.15 billion Android powered phones were sold last year.&#8221;<\/p>\n<p>They claimed: &#8220;Infected phones can be instructed to send the CIA the user&#8217;s geolocation, audio and text communications as well as covertly activate the phone&#8217;s camera and microphone.&#8221;<\/p>\n<figure class=\"in-article-image\" data-mod=\"image\" data-init=\"true\">\n<div class=\"outer\">\n<div class=\"spacer\"><\/div>\n<div class=\"mod-image\"><img decoding=\"async\" src=\"http:\/\/i4.mirror.co.uk\/incoming\/article9902713.ece\/ALTERNATES\/s615b\/FILE-PHOTO-An-Apple-iPhone-7-and-the-company-logo-are-seen-in-this-illustration-picture-taken-in-B.jpg\" alt=\"\" \/><\/div>\n<\/div><figcaption><span class=\"credit\">(Photo: REUTERS)<\/span><\/figcaption><\/figure>\n<figure class=\"in-article-image\" data-mod=\"image\" data-init=\"true\">\n<div class=\"outer\">\n<div class=\"spacer\"><\/div>\n<div class=\"mod-image\"><img decoding=\"async\" src=\"http:\/\/i2.mirror.co.uk\/incoming\/article8687687.ece\/ALTERNATES\/s615b\/Google-launches-Android-Nougat.jpg\" alt=\"Google launches Android Nougat\" \/><\/div>\n<\/div><figcaption><span class=\"credit\">(Photo: androidcentral)<\/span><\/figcaption><\/figure>\n<p>They said the CIA could then &#8220;bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the &#8220;smart&#8221; phones that they run on and collecting audio and message traffic before encryption is applied.&#8221;<\/p>\n<p>In an online statement on its website, Wikileaks also claims the attack against <a href=\"http:\/\/wikileaks.org\/ciav7p1\/cms\/page_12353643.html\" rel=\"nofollow\">Samsung smart TVs<\/a> was developed in cooperation with the UK&#8217;s domestic intelligence agency MI5\/BTSS.<\/p>\n<p><a href=\"http:\/\/www.mirror.co.uk\/3am\/celebrity-news\/cyber-criminal-behind-1million-david-9789537\">Cyber criminal behind \u00a31million David Beckham blackmail plot is on the run and fears being POISONED<\/a><\/p>\n<p>It claims &#8220;Weeping Angel&#8221;, developed by the CIA&#8217;s Embedded Devices Branch (EDB), infests smart TVs, transforming them into covert microphones.<\/p>\n<p>The organisation added: &#8220;After infestation, Weeping Angel places the target TV in a &#8216;Fake-Off&#8217; mode, so that the owner falsely believes the TV is off when it is on.<\/p>\n<p>&#8220;In &#8216;Fake-Off&#8217; mode the TV operates as a bug, recording conversations in the room and sending them over the internet to a covert CIA server.&#8221;<\/p>\n<figure class=\"in-article-image\" data-mod=\"image\" data-init=\"true\">\n<div class=\"outer\">\n<div class=\"spacer\"><\/div>\n<div class=\"mod-image\"><img decoding=\"async\" src=\"http:\/\/i1.mirror.co.uk\/incoming\/article9810111.ece\/ALTERNATES\/s615b\/Julian-Assange-extradition.jpg\" alt=\"\" \/><\/div>\n<\/div><figcaption><span class=\"caption\">WikiLeaks founder Julian Assange<\/span> <span class=\"credit\">(Photo: PA)<\/span><\/figcaption><\/figure>\n<figure class=\"in-article-image\" data-mod=\"image\" data-init=\"true\">\n<div class=\"outer\">\n<div class=\"spacer\"><\/div>\n<div class=\"mod-image\"><img decoding=\"async\" src=\"http:\/\/i2.mirror.co.uk\/incoming\/article8887755.ece\/ALTERNATES\/s615b\/Microsoft-Windows-10.jpg\" alt=\"Microsoft Windows 10\" \/><\/div>\n<\/div><figcaption><span class=\"caption\">Microsoft Windows 10<\/span> <span class=\"credit\">(Photo: PA)<\/span><\/figcaption><\/figure>\n<p>They also claimed the CIA also runs &#8220;a very substantial effort to infect and control Microsoft Windows users with its malware, infecting CDs, DVDs and USB sticks.<\/p>\n<p>The hacking group said the publication release as part of Year Zero is from 8,761 documents and files from an isolated, high-security network situated inside the CIA&#8217;s Center for Cyber Intelligence.<\/p>\n<p>Wikileaks said: &#8220;Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized &#8220;zero day&#8221; exploits, malware remote control systems and associated documentation.<\/p>\n<p>&#8220;This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA.<\/p>\n<p>&#8220;The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.&#8221;<\/p>\n<figure class=\"in-article-image\" data-mod=\"image\" data-init=\"true\">\n<div class=\"outer\">\n<div class=\"spacer\"><\/div>\n<div class=\"mod-image\"><img decoding=\"async\" src=\"http:\/\/i4.mirror.co.uk\/incoming\/article5160162.ece\/ALTERNATES\/s615b\/Samsung-tv.jpg\" alt=\"Samsung 55in HU7500 Smart TV\" \/><\/div>\n<\/div><figcaption><span class=\"caption\">Wikileaks claimed the attack against\u00a0Samsung smart TVs\u00a0was developed in cooperation with the UK&#8217;s domestic intelligence agency MI5<\/span> <span class=\"credit\">(Photo: Samsung)<\/span><\/figcaption><\/figure>\n<p>&#8220;By the end of 2016, the CIA&#8217;s hacking division, which formally falls under the agency&#8217;s Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other &#8220;weaponized&#8221; malware.<\/p>\n<p>&#8220;Such is the scale of the CIA&#8217;s undertaking that by 2016, its hackers had utilized more code than that used to run Facebook.<\/p>\n<p>&#8220;The CIA had created, in effect, its &#8220;own NSA&#8221; with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.&#8221;<\/p>\n<p>Mr Assange has been under investigation by the US since 2010 when WikiLeaks published confidential military documents.<\/p>\n<p>In the same year, the Swedish Director of Public Prosecution opened an investigation into sexual offences Assange is alleged to have committed.<\/p>\n<p>In 2012, facing extradition to Sweden, he took refuge at the Embassy of Ecuador in London after being granted political asylum.<\/p>\n<p>In August 2014, he announced he would be leaving the embassy &#8220;soon&#8221;.<\/p>\n<p>___<br \/>\n<a href=\"http:\/\/www.mirror.co.uk\/news\/world-news\/year-zero-series-wikileaks-cia-9982483\">http:\/\/www.mirror.co.uk\/news\/world-news\/year-zero-series-wikileaks-cia-9982483<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CIA planned to hack cars and trucks to carry out undetectable assassinations claims WikiLeaks<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-67962","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/posts\/67962","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=67962"}],"version-history":[{"count":0,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/posts\/67962\/revisions"}],"wp:attachment":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=67962"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=67962"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=67962"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}