{"id":68243,"date":"2017-03-10T17:10:19","date_gmt":"2017-03-10T21:10:19","guid":{"rendered":"https:\/\/stateofthenation2012.com\/?p=68243"},"modified":"2017-03-10T17:10:19","modified_gmt":"2017-03-10T21:10:19","slug":"vault-7-are-cia-contractors-the-source-of-the-wikileaks-data-dump","status":"publish","type":"post","link":"https:\/\/stateofthenation2012.com\/?p=68243","title":{"rendered":"VAULT 7: Are CIA Contractors the source of the WikiLeaks data dump?"},"content":{"rendered":"<div class=\"row mijM74QO\" data-reactid=\"189\">\n<div class=\"column small-12 medium-10 medium-offset-1 large-offset-2 _2MPQ3G2T\" data-reactid=\"190\">\n<div class=\"row\" data-reactid=\"191\">\n<div class=\"column small-12\" data-reactid=\"192\">\n<div class=\"row\" data-reactid=\"193\"><span class=\"_1gibm1jD\" data-reactid=\"195\">INTELLIGENCE<\/span><\/div>\n<\/div>\n<\/div>\n<div class=\"row _1gqZN6-1\" data-reactid=\"196\">\n<div class=\"column small-12\" data-reactid=\"197\">\n<div class=\"row\" data-reactid=\"198\">\n<h1 class=\"_3A_UUcRS\" data-reactid=\"199\">Source of the Latest WikiLeaks Document Dump Appears to Be CIA Contractors: U.S. Officials<\/h1>\n<p><span class=\"zhtAwgU0\" data-reactid=\"214\">John Walcott and Mark Hosenball \/ Reuters<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><!--more--><br \/>\n<iframe src='\/\/players.brightcove.net\/293884104\/SJa0Thl7_default\/index.html?videoId=5353406132001' allowfullscreen frameborder=0><\/iframe><\/p>\n<article class=\"row\" data-reactid=\"232\">\n<p class=\"column small-12 medium-10 medium-offset-1 large-offset-2 _10M0Ygc4\" data-reactid=\"233\">Contractors likely breached security and handed over documents describing the Central Intelligence Agency&#8217;s use of hacking tools to anti-secrecy group WikiLeaks, U.S. intelligence and law enforcement officials told Reuters on Wednesday.<\/p>\n<p class=\"column small-12 medium-10 medium-offset-1 large-offset-2 _10M0Ygc4\" data-reactid=\"235\">Two officials speaking on condition of anonymity said intelligence agencies have been aware since the end of last year of the breach, which led to WikiLeaks <a href=\"http:\/\/time.com\/4693332\/wikileaks-documents-cia-cyber-intelligence\/\" target=\"_blank\" data-reactid=\"237\">releasing thousands of pages<\/a> of information on its website on Tuesday.<\/p>\n<p class=\"column small-12 medium-10 medium-offset-1 large-offset-2 _10M0Ygc4\" data-reactid=\"240\">According to the documents, CIA hackers could get into <a href=\"http:\/\/fortune.com\/fortune500\/apple-3\/\" target=\"_blank\" data-reactid=\"242\">Apple<\/a> iPhones, devices running Google&#8217;s Android software and other gadgets in order to capture text and voice messages before they were encrypted with sophisticated software.<\/p>\n<p class=\"column small-12 medium-10 medium-offset-1 large-offset-2 _10M0Ygc4\" data-reactid=\"245\">The White House said on Wednesday that President Donald Trump was &#8220;extremely concerned&#8221; about the CIA security breach that led to the WikiLeaks release.<\/p>\n<p class=\"column small-12 medium-10 medium-offset-1 large-offset-2 _10M0Ygc4\" data-reactid=\"247\">&#8220;Anybody who leaks classified information will be held to the highest degree of law,&#8221; spokesman Sean Spicer said.<\/p>\n<article class=\"row\" data-reactid=\"232\">\n<p class=\"column small-12 medium-10 medium-offset-1 large-offset-2 _10M0Ygc4\" data-reactid=\"253\">The two officials told Reuters they believed the published documents about CIA hacking techniques used between 2013 and 2016 were authentic.<\/p>\n<p class=\"column small-12 medium-10 medium-offset-1 large-offset-2 _10M0Ygc4\" data-reactid=\"255\">One of the officials with knowledge of the investigation said companies that are contractors for the CIA have been checking to see which of their employees had access to the material that WikiLeaks published, and then going over their computer logs, emails and other communications for any evidence of who might be responsible.<\/p>\n<p class=\"column small-12 medium-10 medium-offset-1 large-offset-2 _10M0Ygc4\" data-reactid=\"257\">On Tuesday in a press release, WikiLeaks itself said the CIA had &#8220;lost control&#8221; of an archive of hacking methods and it appeared to have been circulated &#8220;among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.&#8221;<\/p>\n<p class=\"column small-12 medium-10 medium-offset-1 large-offset-2 _10M0Ygc4\" data-reactid=\"297\">The CIA, which is the United States&#8217; civilian foreign intelligence service, <a href=\"http:\/\/time.com\/4696103\/cia-wikileaks-hack-deeply-troubled\/\" target=\"_blank\" data-reactid=\"299\">declined to comment<\/a> on the authenticity of purported intelligence documents.<\/p>\n<p class=\"column small-12 medium-10 medium-offset-1 large-offset-2 _10M0Ygc4\" data-reactid=\"302\">The agency said in a statement that its mission was to collect foreign intelligence abroad &#8220;to protect America from terrorists, hostile nation states and other adversaries&#8221; and to be &#8220;innovative, cutting-edge, and the first line of defense in protecting this country from enemies abroad.&#8221;<\/p>\n<p class=\"column small-12 medium-10 medium-offset-1 large-offset-2 _10M0Ygc4\" data-reactid=\"304\">The CIA is legally prohibited from surveillance inside the United States and &#8220;does not do so&#8221;, the statement added.<\/p>\n<p class=\"column small-12 medium-10 medium-offset-1 large-offset-2 _10M0Ygc4\" data-reactid=\"306\"><strong data-reactid=\"307\">Contractors Must Be &#8220;Loyal to America&#8221;<\/strong><\/p>\n<p class=\"column small-12 medium-10 medium-offset-1 large-offset-2 _10M0Ygc4\" data-reactid=\"308\">A U.S. government source familiar with the matter said it would be normal for the Federal Bureau of Investigation and the CIA both to open investigations into such leaks. U.S. officials previously have confirmed that prosecutors in Alexandria, Virginia for years have been conducting a federal grand jury investigation of WikiLeaks and its personnel.<\/p>\n<p class=\"column small-12 medium-10 medium-offset-1 large-offset-2 _10M0Ygc4\" data-reactid=\"310\">A spokesman for the prosecutors declined to comment on the possibility of that probe being expanded. It is not clear if the investigation of the latest CIA leaks is part of the probe.<\/p>\n<p class=\"column small-12 medium-10 medium-offset-1 large-offset-2 _10M0Ygc4\" data-reactid=\"315\">Contractors have been revealed as the source of sensitive government information leaks in recent years, most notably Edward Snowden and Harold Thomas Martin, both employed by consulting firm <a href=\"http:\/\/fortune.com\/fortune500\/booz-allen-hamilton-holding-487\/\" target=\"_blank\" data-reactid=\"317\">Booz Allen Hamilton<\/a> while working for the National Security Agency.<\/p>\n<p class=\"column small-12 medium-10 medium-offset-1 large-offset-2 _10M0Ygc4\" data-reactid=\"320\">U.S. Senator Dianne Feinstein of California and a Democrat on the intelligence committee, said the government needed to stop the breaches.<\/p>\n<p class=\"column small-12 medium-10 medium-offset-1 large-offset-2 _10M0Ygc4\" data-reactid=\"322\">&#8220;I think we really need to take a look at the contractor portion of the employee workforce, because you have to be loyal to America to work for an intelligence agency, otherwise don&#8217;t do it,&#8221; Feinstein said.<\/p>\n<p class=\"column small-12 medium-10 medium-offset-1 large-offset-2 _10M0Ygc4\" data-reactid=\"330\">Both U.S. Senate and U.S. House of Representatives intelligence committees have either opened or are expected to open inquiries into the CIA breach, congressional officials said.<\/p>\n<p class=\"column small-12 medium-10 medium-offset-1 large-offset-2 _10M0Ygc4\" data-reactid=\"332\">Some cyber security experts and technology companies have criticized the government for opting to exploit rather than disclose software vulnerabilities, though an interagency review process set up under former President Barack Obama was intended to err on the side of disclosure.<\/p>\n<p class=\"column small-12 medium-10 medium-offset-1 large-offset-2 _10M0Ygc4\" data-reactid=\"334\">Those concerns would grow if U.S. authorities did not notify companies that CIA documents describing various hacking techniques had been compromised.<\/p>\n<p class=\"column small-12 medium-10 medium-offset-1 large-offset-2 _10M0Ygc4\" data-reactid=\"336\">Apple, Alphabet&#8217;s <a href=\"http:\/\/fortune.com\/fortune500\/alphabet-36\/\" target=\"_blank\" data-reactid=\"338\">Google<\/a>, <a href=\"http:\/\/fortune.com\/fortune500\/cisco-systems-54\/\" target=\"_blank\" data-reactid=\"341\">Cisco Systems<\/a> and <a href=\"http:\/\/fortune.com\/fortune500\/oracle-77\/\" target=\"_blank\" data-reactid=\"344\">Oracle<\/a> did not immediately respond when asked if they were notified of a CIA breach before WikiLeaks made its files public.<\/p>\n<p class=\"column small-12 medium-10 medium-offset-1 large-offset-2 _10M0Ygc4\" data-reactid=\"347\">At Apple, none of the vulnerabilities described in the documents provoked a panic, though analysis was continuing, according to a person who spoke with engineers there.<\/p>\n<p class=\"column small-12 medium-10 medium-offset-1 large-offset-2 _10M0Ygc4\" data-reactid=\"349\">Google&#8217;s director of information security and privacy, Heather Adkins, said in a statement: &#8220;As we\u2019ve reviewed the documents, we&#8217;re confident that security updates and protections in both Chrome and Android (operating systems) already shield users from many of these alleged vulnerabilities. Our analysis is ongoing and we will implement any further necessary protections.&#8221;<\/p>\n<p class=\"column small-12 medium-10 medium-offset-1 large-offset-2 _10M0Ygc4\" data-reactid=\"351\"><b data-reactid=\"352\">Larger Number of Contractors<\/b><\/p>\n<p class=\"column small-12 medium-10 medium-offset-1 large-offset-2 _10M0Ygc4\" data-reactid=\"353\">One reason the investigation is focused on a potential leak by contractors rather than for example a hack by Russian intelligence, another official said, is that so far there is no evidence that Russian intelligence agencies tried to exploit any of the leaked material before it was published.<\/p>\n<p class=\"column small-12 medium-10 medium-offset-1 large-offset-2 _10M0Ygc4\" data-reactid=\"355\">One European official, speaking on condition of anonymity, said the WikiLeaks material could in fact lead to closer cooperation between European intelligence agencies and U.S. counterparts, which share concerns about Russian intelligence operations.<\/p>\n<p class=\"column small-12 medium-10 medium-offset-1 large-offset-2 _10M0Ygc4\" data-reactid=\"357\">U.S. intelligence agencies have accused Russia of seeking to tilt last year&#8217;s U.S. presidential election in Trump&#8217;s favor, including by hacking into Democratic Party emails. Moscow has denied the allegation.<\/p>\n<p><iframe loading=\"lazy\" src=\"\/\/players.brightcove.net\/293884104\/SJa0Thl7_default\/index.html?videoId=5347872456001\" width=\"300\" height=\"150\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<article class=\"row\" data-reactid=\"232\">\n<article class=\"row\" data-reactid=\"232\">\n<p class=\"column small-12 medium-10 medium-offset-1 large-offset-2 _10M0Ygc4\" data-reactid=\"363\">One major security problem was that the number of contractors with access to information with the highest secrecy classification has &#8220;exploded&#8221; because of federal budget constraints, the first U.S. official said.<\/p>\n<p class=\"column small-12 medium-10 medium-offset-1 large-offset-2 _10M0Ygc4\" data-reactid=\"365\">U.S. intelligence agencies have been unable to hire additional permanent staff needed to keep pace with technological advances such as the &#8220;internet of things&#8221; that connects cars, home security and heating systems and other devices to computer networks, or to pay salaries competitive with the private sector, the official said.<\/p>\n<p class=\"column small-12 medium-10 medium-offset-1 large-offset-2 _10M0Ygc4\" data-reactid=\"367\">Reuters could not immediately verify the contents of the published documents.<\/p>\n<p class=\"column small-12 medium-10 medium-offset-1 large-offset-2 _10M0Ygc4\" data-reactid=\"369\">A person familiar with WikiLeaks\u2019 activities said the group has had the CIA hacking material for months, and that the release of the material was in the works &#8220;for a long time.&#8221;<\/p>\n<p class=\"column small-12 medium-10 medium-offset-1 large-offset-2 _10M0Ygc4\" data-reactid=\"377\">In Germany on Wednesday, the chief federal prosecutor&#8217;s office said that it would review the WikiLeaks documents because some suggested that the CIA ran a hacking hub from the U.S. consulate in Frankfurt.<\/p>\n<p class=\"column small-12 medium-10 medium-offset-1 large-offset-2 _10M0Ygc4\" data-reactid=\"379\">&#8220;We will initiate an investigation if we see evidence of concrete criminal acts or specific perpetrators,&#8221; a spokesman for the federal prosecutor&#8217;s office told Reuters.<\/p>\n<p class=\"column small-12 medium-10 medium-offset-1 large-offset-2 _10M0Ygc4\" data-reactid=\"381\">Chancellor Angela Merkel is scheduled to visit Washington on March 14 for her first meeting with Trump, who has sharply criticized Berlin for everything from its trade policy to what he considers inadequate levels of military spending.<\/p>\n<p class=\"column small-12 medium-10 medium-offset-1 large-offset-2 end _10M0Ygc4\" data-reactid=\"383\"><em data-reactid=\"384\">(Reporting by John Walcott, Mark Hosenball, Dustin Volz, Yara Bayoumy in Washington and Matthias Sobolewski and Andrea Shalal in Berlin; Additional reporting by Joseph Menn in San Francisco; Writing by Grant McCool; Editing by Peter Graff and Bill Rigby)<\/em><\/p>\n<p class=\"column small-12 medium-10 medium-offset-1 large-offset-2 end _10M0Ygc4\" data-reactid=\"383\">___<br \/>\n<a href=\"http:\/\/time.com\/4696405\/wikileaks-cia-contractors-documents-source\/\">http:\/\/time.com\/4696405\/wikileaks-cia-contractors-documents-source\/<\/a><\/p>\n<\/article>\n<\/article>\n<\/article>\n<\/article>\n","protected":false},"excerpt":{"rendered":"<p>INTELLIGENCE Source of the Latest WikiLeaks Document Dump Appears to Be CIA Contractors: U.S. Officials John Walcott and Mark Hosenball \/ Reuters<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-68243","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/posts\/68243","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=68243"}],"version-history":[{"count":0,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/posts\/68243\/revisions"}],"wp:attachment":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=68243"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=68243"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=68243"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}