The most recent release by WikiLeaks shows that the CIA has developed obfuscation tools for causing its hacks to be falsely attributed to foreign powers. And WikiLeaks has released not only the documents, but also the source code of those tools.
The most recent WikiLeaks disclosures, published last week, detail hacks developed by the CIA to penetrate iPhones and Mac laptops. The leaks — codenamed “Dark Matter” by WikiLeaks — show that the CIA had developed methods for installing surveillance malware on “factory fresh” iPhones as early as 2008. They also reveal that the agency has methods for injecting persistent malware into the firmware of Mac laptops.
The media have spun the recent story about CIA-developed hacking tools by claiming either that there's nothing to worry about, or that the problem is so severe that it is no longer possible to protect our privacy through encryption. In reality, privacy is under attack, but encryption still works.
Recent statements by the CIA and White House, coupled with the FBI's investigation into the source of leaked CIA documents and published by WikiLeaks, serve as admissions that the disclosures are genuine.
When presented by the BBC with evidence of pedophilia, Facebook called the police on the reporters who made the discovery.
It seems the U.S. Central Intelligence Agency (CIA) could, at least in theory, murder you by hacking into your car's computer, according to the pro-transparency group Wikileaks. And now, with some of the rogue agency's hacking tools and methods available on cyberspace, any common criminal with some computer knowledge might be able to do so as well. It remains unclear whether the CIA, which brags about its mass murder, has actually murdered anyone by hacking their car. But reasonable suspicions about the possibility have been floating around for years — especially since the suspicious “car crash” death of journalist Michael Hastings, who was involved in exposing CIA and NSA crimes.
The CIA hacking tools disclosed by WikiLeaks Tuesday allow hackers to remotely control a plethora of devices — including iPhones, iPads, Android phones and tablets, computers, and SmartTVs — and activate cameras and microphones on those devices.
Leaked documents published by WikiLeaks Tuesday show that show that the CIA — in a move reminiscent of the Keystone Kops — “lost control of the majority of its hacking arsenal,” allowing it to fall into the hands of hackers who have even less moral constraint than the CIA (if that were possible). These cyber "weapons" should never have been developed in the first place; now they are loose in the wild.
The Washington Post has corrected a story claiming Russians hacked a Vermont utility, claiming it was a falsehood. As quickly as the "hack" as exposed as a lie, it disappeared.
A former British ambassador who is now an operative for WikiLeaks says that the leaked DNC and Clinton campaign e-mails and documents were not hacked by the Russian government, as claimed by the CIA. In fact, he says the leaked documents were not hacked at all. “The source had legal access to the information. The documents came from inside leaks, not hacks,” former ambassador Craig Murray said in a recent interview with the Daily Mail.