WikiLeaks CIA files: The 6 biggest spying secrets revealed by the release of 'Vault 7'

Julian Assange has claimed the documents are the biggest intelligence release ever

Andrew Griffin
Tuesday 07 March 2017 18:22 GMT
Comments
US President Donald Trump speaks at the CIA headquarters on January 21, 2017 in Langley, Virginia
US President Donald Trump speaks at the CIA headquarters on January 21, 2017 in Langley, Virginia (Olivier Doulier - Pool/Getty Images)

Your support helps us to tell the story

From reproductive rights to climate change to Big Tech, The Independent is on the ground when the story is developing. Whether it's investigating the financials of Elon Musk's pro-Trump PAC or producing our latest documentary, 'The A Word', which shines a light on the American women fighting for reproductive rights, we know how important it is to parse out the facts from the messaging.

At such a critical moment in US history, we need reporters on the ground. Your donation allows us to keep sending journalists to speak to both sides of the story.

The Independent is trusted by Americans across the entire political spectrum. And unlike many other quality news outlets, we choose not to lock Americans out of our reporting and analysis with paywalls. We believe quality journalism should be available to everyone, paid for by those who can afford it.

Your support makes all the difference.

WikiLeaks has released a huge set of files that it calls "Year Zero" and which mark the biggest exposure of CIA spying secrets ever.

The massive set of documents – over 8,000 pages in all – include a host of hacking secrets that could embarrass intelligence agencies and the US government, as well as undermining spying efforts across the world.

Here are six of the biggest secrets and pieces of information yet to emerge from the huge dump.

1) The CIA has the ability to break into Android and iPhone handsets, and all kinds of computers

The US intelligence agency has been involved in a concerted effort to write various kinds of malware to spy on just about every piece of electronic equipment that people use. That includes iPhones, Androids and computers running Windows, macOS and Linux.

If that software is as powerful as WikiLeaks claims, it could be used to remotely control those devices and switch them on and off. Once that happened, a vast array of data would be made available – including users' locations, messages they had sent, and potentially everything heard by the microphone or seen by the camera.

2) Doing so would make apps like Signal, Telegram and WhatsApp entirely insecure

Encrypted messaging apps are only as secure as the device they are used on – if an operating system is compromised, then the messages can be read before they encrypted and sent to the other user. WikiLeaks claims that has happened, potentially meaning that messages have been compromised even if all of the usual precautions had been taken.

What is Spyware?

3) The CIA could use smart TVs to listen in on conversations that happened around them

One of the most eye-catching programmes detailed in the documents is "Weeping Angel". That allows intelligence agencies to install special software that allows TVs to be turned into listening devices – so that even when they appear to be switched off, they're actually on.

That's just one of the technologies created by the Embedded Devices Branch, the CIA division at the centre of much of the leaks of new information.

4) The agency explored hacking into cars and crashing them, allowing 'nearly undetectable assassinations'

Many of the documents reference tools that appear to have dangerous and unknown uses. One file, for instance, shows that the CIA were looking into ways of remotely controlling cars and vans by hacking into them.

"The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations," WikiLeaks notes, in an unproven piece of speculation.

5) The CIA hid vulnerabilities that could be used by hackers from other countries or governments

WikiLeaks claims that its source handed over the documents in order to provoke a debate about the power of intelligence agencies and how their information should be exposed. Perhaps central to that is the accusation that the CIA was "hoarding" exploits that it had found – rather than handing them over to the companies that could fix them, and so make users safe, as they had promised to do.

Such bugs were found in the biggest consumer electronics in the world, including phones and computers made Apple, Google and Microsoft. But those companies didn't get the chance to fix those exploits because the agency kept them secret in order to keep using them, the documents suggest.

"Serious vulnerabilities not disclosed to the manufacturers places huge swathes of the population and critical infrastructure at risk to foreign intelligence or cyber criminals who independently discover or hear rumors of the vulnerability," a WikiLeaks statement read. "If the CIA can discover such vulnerabilities so can others."

WikiLeaks noted that those unfixed exploits affected everyone using the equipment, including "the U.S. Cabinet, Congress, top CEOs, system administrators, security officers and engineers".

6) More information is coming

The documents have still not been looked through entirely. There are 8,378 pages of files, some of which have already been analysed but many of which hasn't.

The files are being shared publicly on the WikiLeaks website and the organisation has encouraged its supporters to keep looking through the documents in the hope of finding more stories.

And that's not to mention the other sets of documents that are coming. The "Year Zero" leaks are just the first in a series of "Vault 7" dumps, Julian Assange said.

When taken together, those "Vault 7" leaks will make up the biggest intelligence publication in history, WikiLeaks claimed.

Join our commenting forum

Join thought-provoking conversations, follow other Independent readers and see their replies

Comments

Thank you for registering

Please refresh the page or navigate to another page on the site to be automatically logged inPlease refresh your browser to be logged in