Site icon The Punching Bag Post

WikiLeaks Exposes CIA's Spying Practices – Major Damage

<p class&equals;"MsoNormal" style&equals;"text-align&colon; left&semi;" align&equals;"center">WikiLeaks published thousands of CIA documents Tuesday that prove that the agency uses malware to spy through smartphones&comma; smart TVs and other devices&period; &nbsp&semi;<&sol;p>&NewLine;<p class&equals;"MsoNormal">8&comma;761 documents and files revealed that the agency secretly converted ordinary digital devices into cyber-tools&period;<&sol;p>&NewLine;<p class&equals;"MsoNormal">&ldquo&semi;They include instructions for compromising a wide range of common computer tools for use in spying&colon; the online calling service Skype&semi; Wi-Fi networks&semi; documents in PDF format&semi; and even commercial antivirus programs of the kind used by millions of people to protect their computers&comma;&rdquo&semi; writes <em style&equals;"mso-bidi-font-style&colon; normal&semi;">The New York Times&period; <&sol;em><&sol;p>&NewLine;<p class&equals;"MsoNormal">Some of the other questionable cyber actions outlined are instructions on how to steal passwords using the Internet Explorer browser and the agency&rsquo&semi;s &ldquo&semi;Weeping Angel&rdquo&semi; project &comma; where they would use Samsung smart TVs and make it seem as though the TVs were turned off&comma; but actually they were operating as listening devices&period;<&sol;p>&NewLine;<p class&equals;"MsoNormal">&ldquo&semi;There is an extreme proliferation risk in the development of cyber &lsquo&semi;weapons&period;&rsquo&semi; Comparisons can be drawn between the uncontrolled proliferation of such &lsquo&semi;weapons&comma;&rsquo&semi; which results from the inability to contain them combined with their high market value&comma; and the global arms trade&comma;&rdquo&semi; said Julian Assange&comma; WikiLeaks editor&period; <span style&equals;"mso-spacerun&colon; yes&semi;">&nbsp&semi;<&sol;span>&ldquo&semi;But the significance of &ldquo&semi;Year Zero&rdquo&semi; goes well beyond the choice between cyberwar and cyberpeace&period; The disclosure is also exceptional from a political&comma; legal and forensic perspective&period;&rdquo&semi;<&sol;p>&NewLine;<p class&equals;"MsoNormal">WikiLeaks said the documents came from a reliable source who is a current or former CIA contractor&period; &nbsp&semi;<&sol;p>&NewLine;<p class&equals;"MsoNormal">The cybersecurity expert and Rendition Infosec founder Jake Williams&comma; told <em style&equals;"mso-bidi-font-style&colon; normal&semi;">The Associated Press<&sol;em> that the documents appear to be legitimate&period;<&sol;p>&NewLine;<p class&equals;"MsoNormal" style&equals;"mso-outline-level&colon; 1&semi;">Edward Snowden&comma; who infamously exposed the NSA&comma; said the documents look real&period;&nbsp&semi;<&sol;p>&NewLine;<p class&equals;"MsoNormal">&&num;8220&semi;Still working through the publication&comma; but what &commat;Wikileaks has here is genuinely a big deal&period; Looks authentic&comma;&&num;8221&semi; wrote Snowden on Twitter&period;<&sol;p>&NewLine;<p class&equals;"MsoNormal" style&equals;"mso-outline-level&colon; 1&semi;">The CIA did not admit to the documents being authentic&period; <span style&equals;"mso-spacerun&colon; yes&semi;">&nbsp&semi;<&sol;span>&nbsp&semi;<&sol;p>&NewLine;<p class&equals;"MsoNormal">&ldquo&semi;We do not comment on the authenticity or content of purported intelligence documents&comma;&&num;8221&semi; said a CIA spokesperson to <em style&equals;"mso-bidi-font-style&colon; normal&semi;">Fox News<&sol;em>&nbsp&semi;<&sol;p>&NewLine;<p class&equals;"MsoNormal">&ldquo&semi;The trove appeared to lay bare the design and capabilities of some of the U&period;S&period; intelligence community&rsquo&semi;s most closely guarded cyberweapons&comma; a breach that is likely to cause immediate damage to the CIA&rsquo&semi;s efforts to gather intelligence overseas and place new strain on the U&period;S&period; government&rsquo&semi;s relationship with Silicon Valley giants including Apple and Google&comma;&rdquo&semi; writes<em style&equals;"mso-bidi-font-style&colon; normal&semi;"> The Washington Post&period; <&sol;em>&nbsp&semi;<&sol;p>&NewLine;<p class&equals;"MsoNormal">WikiLeaks did redact lists of CIA targets&period; But they did say the lists included targets and machines in Latin America&comma; Europe and the U&period;S&period; &nbsp&semi;<&sol;p>&NewLine;<p class&equals;"MsoNormal"><em style&equals;"mso-bidi-font-style&colon; normal&semi;">The Washington Post<&sol;em> reports the WikiLeaks dump appears to &ldquo&semi;unmask hacking methods that many experts already assumed the agency had developed&period;&rdquo&semi;<&sol;p>&NewLine;<p class&equals;"MsoNormal">Former U&period;S&period; intelligence officials has argued that this dump may cause major damage to the CIA&rsquo&semi;s cyberespionage&nbsp&semi;efforts&period;<&sol;p>&NewLine;<p class&equals;"MsoNormal">&ldquo&semi;Any exposure of these tools is going to cause grave if not irreparable damage to the ability of our intelligence agencies to conduct our mission&comma;&rdquo&semi; said a former senior U&period;S&period; intelligence official&period;<&sol;p>&NewLine;<p class&equals;"MsoNormal">But WikiLeaks decided to release the documents to let the public know and the organization believes that questions about the CIA&rsquo&semi;s reach &ldquo&semi;urgently need to be debated in public&period;&rdquo&semi;<&sol;p>&NewLine;<p class&equals;"MsoNormal" style&equals;"mso-outline-level&colon; 1&semi;">WikiLeaks also alluded to tools being used for more than just spying&period; &ldquo&semi;It would permit the CIA to engage in nearly undetectable assassinations&comma;&rdquo&semi; according to the WikiLeaks release&period;<&sol;p>&NewLine;<p class&equals;"MsoNormal">However&comma; this is just the beginning&period; WikiLeaks allegedly has 9&comma;000 files that they will be posting over time&period;<&sol;p>&NewLine;<p class&equals;"MsoNormal"><strong>Editor&&num;8217&semi;s note&colon;<&sol;strong> &nbsp&semi;This is the nature of the CIA&comma; they do nasty things to get valuable intelligence for America&period; It can be ugly but they are the best at what they do&comma; and it has save our freedoms in so many ways&period; The disturbing part is that since 9&sol;11 some of these dirty tricks have been turned against American citizens&period;<&sol;p>&NewLine;<p class&equals;"MsoNormal">Its is also disturbing that the CIA would be so lax in its security as to allow such a breach of its sources and methods&period; Not only have they allowed the compromise of sensitive operations that could cause considerable diplomatic damage&comma; they have potentially allowed hackers to steal or duplicate their methods who could use them against innocent Americans&period;<&sol;p>&NewLine;<p class&equals;"MsoNormal">&nbsp&semi;<&sol;p>&NewLine;<p>&nbsp&semi;<&sol;p>&NewLine;

Exit mobile version