- The CIA can masquerade its malware as belonging to a foreign intelligence agency.
- The CIA stole hacking malware from the Russian Federation for their own use.
- The CIA is hacking everyone, including US citizens.
- Every microphone and webcam is remote controllable.
- The CIA’s exploits have been leaked internally and can be used by unauthorized people to gain access to virtually anything.
- CIA malware can infiltrate iPhones, Androids, Windows Phones, and even your smart TV.
- The U.S. consulate in Frankfurt is a covert CIA hacker base.
- The CIA created air gap jumping viruses that infect CDs, DVDs, flash drives, etc.
- The CIA created malware that specifically evaded certain anti-virus programs.
- The CIA can hack cars for “undetectable assassinations”
- CIA malware can infiltrate your macOS and Windows computers.
- CIA malware infiltrates your smartphone to read messages on encrypted apps, before you send them.
- CIA malware can infiltrate Linux and routers.
- The CIA was supposed to reveal major vulnerabilities, but instead, hoarded them for their own use.
- Notepad++, a popular text editor, has a DLL hijack.
- The CIA steals saved passwords from Internet Explorer
- CIA can bypass Windows User Account Control
- CIA has Android malware that makes Android phones bulk-spy on WiFi networks around them.
WikiLeaks released thousands of documents and files Tuesday that it said exposed tools the Central Intelligence Agency uses to hack smartphones, computer operating systems, messenger applications and internet-connected televisions.
The unauthorized disclosure—the first part of which WikiLeaks said consisted of 8,761 documents and files from the CIA’s Center for Cyber Intelligence—confronts President Donald Trump with a threat from the very organization that leaked documents on his opponent, Democrat Hillary Clinton, during the 2016 presidential campaign.
WikiLeaks named the series of files “Vault 7” and called the unauthorized disclosure the “largest ever publication of confidential documents on the agency,” saying it exposed the malware and exploits the agency amassed to hack smartphones and turn some televisions into covert microphones.
A CIA spokesman declined to comment “on the authenticity or content of purported intelligence documents.”
An intelligence source said some of the information does pertain to tools that the CIA uses to hack computers and other devices. This person said disclosing the information would jeopardize ongoing intelligence-gathering operations and the revelations were far more significant than the leaks of Edward Snowden, a former contractor for the National Security Agency who exposed active surveillance programs in 2013.
Mr. Snowden’s leaks revealed names of programs, companies that assist the NSA in surveillance and in some cases the targets of American spying. But the recent leak purports to contain highly technical details about how surveillance is carried out. That would make them far more revealing and useful to an adversary, this person said.
……WikiLeaks said the information on CIA hacking came from an unidentified source who believes the spy agency’s hacking authorities “urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency.”
It’s certain to be coming from an internal source. There’s another Edward Snowden at the agency.