{"id":67968,"date":"2017-03-07T18:34:37","date_gmt":"2017-03-07T22:34:37","guid":{"rendered":"https:\/\/stateofthenation2012.com\/?p=67968"},"modified":"2017-03-07T18:38:19","modified_gmt":"2017-03-07T22:38:19","slug":"the-cias-hacking-arsenal-is-very-broad-and-very-deep-wikileaks","status":"publish","type":"post","link":"https:\/\/stateofthenation2012.com\/?p=67968","title":{"rendered":"The CIA\u2019s hacking arsenal is very broad and very deep &#8212; WikiLeaks"},"content":{"rendered":"<h1 class=\"article__heading\">Apple, Samsung, Microsoft: WikiLeaks blows lid on scale of CIA\u2019s hacking arsenal<\/h1>\n<p><!--more--><\/p>\n<div id=\"attachment_67969\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/stateofthenation2012.com\/wp-content\/uploads\/2017\/03\/58bed4afc3618845368b45d4.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-67969\" class=\"wp-image-67969\" src=\"https:\/\/stateofthenation2012.com\/wp-content\/uploads\/2017\/03\/58bed4afc3618845368b45d4.jpg\" width=\"640\" height=\"356\" srcset=\"https:\/\/stateofthenation2012.com\/wp-content\/uploads\/2017\/03\/58bed4afc3618845368b45d4.jpg 900w, https:\/\/stateofthenation2012.com\/wp-content\/uploads\/2017\/03\/58bed4afc3618845368b45d4-300x167.jpg 300w, https:\/\/stateofthenation2012.com\/wp-content\/uploads\/2017\/03\/58bed4afc3618845368b45d4-768x427.jpg 768w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><p id=\"caption-attachment-67969\" class=\"wp-caption-text\">ccording to the preliminary release, the CIA has the capability to hack, record and even control everyday technology used by billions of people around the world. \u00a9 AFP<\/p><\/div>\n<p>RT.com<\/p>\n<p>The major takeaway from the latest WikiLeaks dump centers around the terrifying, \u2018all-seeing-eye\u2019 surveillance project codenamed \u2018Weeping Angel.\u2019 The CIA appears to have taken espionage to a whole new level if WikiLeaks\u2019 initial analysis is accurate.<\/p>\n<p>According to the preliminary release, the CIA has the capability to hack, record and even control everyday technology used by billions of people around the world.<\/p>\n<p>These include smartphones, tablets, smart TVs and even vehicles with remote control navigation systems.<\/p>\n<p>On these devices themselves, the CIA can allegedly hack into some of the world\u2019s most heavily encrypted social media and communications platforms such as WhatsApp, Weibo, Confide, Signal and Telegram before any encryption can even be applied.<\/p>\n<p>For example, WhatsApp\u2019s end-to-end encryption means that only the direct participants in a conversation can read messages; not even WhatsApp is capable of reading them.<\/p>\n<p>The CIA, however, was able to hack into individual private WhatsApp messages before encryption could even be applied.<\/p>\n<p>\u201cYour messages are secured with a lock, and only the recipient and you have the special key needed to unlock and read your message,\u201d the company writes on their <a href=\"http:\/\/www.whatsapp.com\/faq\/en\/general\/28030015\">website<\/a>.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/hashtag\/WikiLeaks?src=hash&amp;ref_src=twsrc%5Etfw\">#WikiLeaks<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/Vault7?src=hash&amp;ref_src=twsrc%5Etfw\">#Vault7<\/a>: WhatsApp, Signal, Telegram, Wiebo also hacked before encryption applied <a href=\"https:\/\/t.co\/O4FdrExAmS\">https:\/\/t.co\/O4FdrExAmS<\/a><\/p>\n<p>&mdash; RT (@RT_com) <a href=\"https:\/\/twitter.com\/RT_com\/status\/839139346687078401?ref_src=twsrc%5Etfw\">March 7, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>&nbsp;<\/p>\n<p>To understand the sheer scale of the leak and of the CIA\u2019s high tech surveillance operations, the hierarchy of divisions within the agency\u2019s cyber division can be looked at below.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/hashtag\/WikiLeaks?src=hash&amp;ref_src=twsrc%5Etfw\">#WikiLeaks<\/a> release <a href=\"https:\/\/twitter.com\/hashtag\/Vault7?src=hash&amp;ref_src=twsrc%5Etfw\">#Vault7<\/a> with details of CIA&#39;s &#39;global covert hacking program&#39; <a href=\"https:\/\/t.co\/pMihFkNPqn\">pic.twitter.com\/pMihFkNPqn<\/a><\/p>\n<p>&mdash; Colm McGlinchey (@ColmMcGlinchey) <a href=\"https:\/\/twitter.com\/ColmMcGlinchey\/status\/839118719322374148?ref_src=twsrc%5Etfw\">March 7, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<div class=\"rtcode\"><\/div>\n<p>According to WikiLeaks, the manufacturing division for the Agency\u2019s hacking tools, or \u2018zero days\u2019 as they are dubbed in the leaks, is the EDG (Engineering Development Group), which is under the umbrella of the agency\u2019s CCI (Center for Cyber Intelligence).<\/p>\n<p><strong>Smartphone devices<\/strong><\/p>\n<p>The CIA&#8217;s Mobile Devices Branch (MDB) developed a variety of tools and techniques to remotely hack and control the world\u2019s most popular smartphones and tablets.<\/p>\n<p>Once hacked, phones can be used to transmit their <em>\u201cgeolocation, audio and text communications\u201d<\/em> directly to the CIA without the user\u2019s knowledge. In addition, the CIA can remotely activate the phone\u2019s microphone and camera.<\/p>\n<p><strong>Apple devices<\/strong><\/p>\n<p>Despite Apple holding a minority share in the global smartphone market in 2016, the CIA\u2019s Mobile Development Branch has a specific division dedicated to the hacking of Apple devices which run the iOS operating system from smartphones and tablets.<\/p>\n<p>WikiLeaks also alleges that the CIA not only developed but collaborated on or purchased a variety of hacking tools or \u2018zero days\u2019 from intelligence agencies and contractors around the world such as GCHQ, NSA, FBI or Baitshop.<\/p>\n<p><strong>Samsung<\/strong><\/p>\n<p>The EDG has produced a \u2018zero day\u2019 capable of hacking Samsung smart TVs, switching it into a fake \u2018off mode\u2019 where the device appears to remain on standby while actually recording audio and transmitting it to nearby secured CIA servers.<\/p>\n<p>For context, Samsung was the top-selling television brand in the world for the last decade with a global market share of 21 percent as of 2015. WikiLeaks did not specify in the initial release whether video recordings were also a part of this particular \u2018zero day.\u2019<\/p>\n<p><strong>Vehicle control<\/strong><\/p>\n<p>As far back as 2014, WikiLeaks alleges that the CIA was exploring the possibility of infecting control systems in modern cars and trucks. While the exact goal of such control has yet to be established, WikiLeaks suggests that such hacks could be used for almost undetectable assassinations.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">CIA has tools to remote control chips in cars, trucks, planes, medical devices and hospital tech with assassination potential. <a href=\"https:\/\/t.co\/RvFonUphUg\">pic.twitter.com\/RvFonUphUg<\/a><\/p>\n<p>&mdash; Kim Dotcom (@KimDotcom) <a href=\"https:\/\/twitter.com\/KimDotcom\/status\/839114195031355392?ref_src=twsrc%5Etfw\">March 7, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<div class=\"rtcode\">\n<div class=\"SandboxRoot env-bp-350\" data-twitter-event-id=\"2\">\n<div id=\"twitter-widget-2\" class=\"EmbeddedTweet EmbeddedTweet--mediaForward media-forward js-clickToOpenTarget js-tweetIdInfo\" lang=\"en\" data-click-to-open-target=\"http:\/\/twitter.com\/KimDotcom\/status\/839114195031355392\" data-iframe-title=\"Twitter Tweet\" data-dt-full=\"%{hours12}:%{minutes} %{amPm} - %{day} %{month} %{year}\" data-dt-months=\"Jan|Feb|Mar|Apr|May|Jun|Jul|Aug|Sep|Oct|Nov|Dec\" data-dt-am=\"AM\" data-dt-pm=\"PM\" data-dt-now=\"now\" data-dt-s=\"s\" data-dt-m=\"m\" data-dt-h=\"h\" data-dt-second=\"second\" data-dt-seconds=\"seconds\" data-dt-minute=\"minute\" data-dt-minutes=\"minutes\" data-dt-hour=\"hour\" data-dt-hours=\"hours\" data-dt-abbr=\"%{number}%{symbol}\" data-dt-short=\"%{day} %{month}\" data-dt-long=\"%{day} %{month} %{year}\" data-scribe=\"page:tweet\" data-tweet-id=\"839114195031355392\" data-twitter-event-id=\"5\">\n<article class=\"MediaCard MediaCard--mediaForward customisable-border\" dir=\"ltr\" data-scribe=\"component:card\">\n<div class=\"MediaCard-media\">\n<p><strong>Android devices (Samsung, HTC, Sony)<\/strong><\/p>\n<\/div>\n<\/article>\n<\/div>\n<\/div>\n<\/div>\n<p>The majority of the world\u2019s smartphones (approximately 85 percent) run on the Android operating system, with roughly 1.15 billion Android devices sold last year, according to the WikiLeaks statement. Naturally, the CIA devoted an entire subdivision to hacking Android devices, with 24 individual weaponized \u2018zero days\u2019 targeting Android devices.<\/p>\n<div class=\"rtcode\">\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">WikiLeaks&#39; <a href=\"https:\/\/twitter.com\/hashtag\/Vault7?src=hash&amp;ref_src=twsrc%5Etfw\">#Vault7<\/a> reveals numerous CIA &#39;zero day&#39; vulnerabilities in  Android phones <a href=\"https:\/\/t.co\/yHg7AtX5gg\">https:\/\/t.co\/yHg7AtX5gg<\/a> <a href=\"https:\/\/t.co\/g6xpPYly9T\">pic.twitter.com\/g6xpPYly9T<\/a><\/p>\n<p>&mdash; WikiLeaks (@wikileaks) <a href=\"https:\/\/twitter.com\/wikileaks\/status\/839124979367174144?ref_src=twsrc%5Etfw\">March 7, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<div class=\"SandboxRoot env-bp-350\" data-twitter-event-id=\"3\">\n<div id=\"twitter-widget-3\" class=\"EmbeddedTweet EmbeddedTweet--mediaForward media-forward js-clickToOpenTarget js-tweetIdInfo\" lang=\"en\" data-click-to-open-target=\"http:\/\/twitter.com\/wikileaks\/status\/839124979367174144\" data-iframe-title=\"Twitter Tweet\" data-dt-full=\"%{hours12}:%{minutes} %{amPm} - %{day} %{month} %{year}\" data-dt-months=\"Jan|Feb|Mar|Apr|May|Jun|Jul|Aug|Sep|Oct|Nov|Dec\" data-dt-am=\"AM\" data-dt-pm=\"PM\" data-dt-now=\"now\" data-dt-s=\"s\" data-dt-m=\"m\" data-dt-h=\"h\" data-dt-second=\"second\" data-dt-seconds=\"seconds\" data-dt-minute=\"minute\" data-dt-minutes=\"minutes\" data-dt-hour=\"hour\" data-dt-hours=\"hours\" data-dt-abbr=\"%{number}%{symbol}\" data-dt-short=\"%{day} %{month}\" data-dt-long=\"%{day} %{month} %{year}\" data-scribe=\"page:tweet\" data-tweet-id=\"839124979367174144\" data-twitter-event-id=\"7\">\n<article class=\"MediaCard MediaCard--mediaForward customisable-border\" dir=\"ltr\" data-scribe=\"component:card\">\n<div class=\"MediaCard-media\">\n<p><strong>Microsoft<\/strong><\/p>\n<\/div>\n<\/article>\n<\/div>\n<\/div>\n<\/div>\n<p>The CIA\u2019s cyber division has developed numerous local and remote \u2018zero days\u2019 to hack and control Microsoft Windows users.<\/p>\n<p>These \u2018zero days\u2019 include, but are not limited to: air gap jumping viruses such as \u2018Hammer Drill\u2019 that are capable of infecting computers or phones that have never been connected to the internet; hacking tools that focus on removable devices such as USB drives; systems for hiding data, be it in covert disk areas or in images; particular \u2018zero days\u2019 that are manufactured to self-perpetuate and hide themselves from detection on an ongoing basis.<\/p>\n<p>Before any tech experts gloat, WikiLeaks also alleges that the CIA has developed advanced, multi-platform malware attack and control systems that cover Windows and Mac OS X but also mixed source platforms like Solaris and open source platforms like Linux. Wikileaks names these specific \u2018zero days\u2019 as the EDB&#8217;s \u2018HIVE,\u2019 \u2018Cutthroat\u2019 and \u2018Swindle\u2019 tools.<\/p>\n<p>___<br \/>\n<a href=\"http:\/\/www.rt.com\/news\/379757-your-whole-life-is-hacked\/\">http:\/\/www.rt.com\/news\/379757-your-whole-life-is-hacked\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Apple, Samsung, Microsoft: WikiLeaks blows lid on scale of CIA\u2019s hacking arsenal<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-67968","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/posts\/67968","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=67968"}],"version-history":[{"count":0,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/posts\/67968\/revisions"}],"wp:attachment":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=67968"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=67968"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=67968"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}