Documents reveal wide-scale hacking by CIA

WASHINGTON — WikiLeaks published thousands of documents Tuesday described as secret files about CIA hacking tools the government employs to break into users’ computers, mobile phones and even smart TVs from companies like Apple, Google, Microsoft and Samsung.

The documents describe clandestine methods for bypassing or defeating encryption, antivirus tools and other protective security features intended to keep the private information of citizens and corporations safe from prying eyes. U.S. government employees, including President Donald Trump, use many of the same products and internet services purportedly compromised by the tools.

The documents describe CIA efforts — co-operating with friendly foreign governments and the U.S. National Security Agency — to subvert the world’s most popular technology platforms, including Apple’s iPhones and iPads, Google’s Android phones and the Microsoft Windows operating system for desktop computers and laptops.

The documents also include discussions about compromising some internet-connected televisions to turn them into listening posts. One document discusses hacking vehicle systems, indicating the CIA’s interest in hacking modern cars with sophisticated on-board computers.

WikiLeaks has a long track record of releasing top secret government documents, and experts who sifted through the material said it appeared legitimate.

Jonathan Liu, a spokesman for the CIA, said: “We do not comment on the authenticity or content of purported intelligence documents.” White House spokesman Sean Spicer also declined comment.

Missing from WikiLeaks’ trove are the actual hacking tools themselves, some of which were developed by government hackers while others were purchased from outsiders. WikiLeaks said it planned to avoid distributing tools “until a consensus emerges” on the political nature of the CIA’s program and how such software could be analyzed, disarmed and published.

Tuesday’s disclosure left anxious consumers who use the products with little recourse, since repairing the software vulnerabilities in ways that might block the tools’ effectiveness is the responsibility of leading technology companies. The revelations threatened to upend confidence in an Obama-era government program, the Vulnerability Equities Process, under which federal agencies warn technology companies about weaknesses in their software so they can be quickly fixed.

It was not immediately clear how WikiLeaks obtained the information, and details in the documents could not immediately be verified. WikiLeaks said the material came from “an isolated, high-security network” inside the CIA’s Center for Cyber Intelligence but didn’t say whether the files were removed by a rogue employee or whether the theft involved hacking.

Just Posted

Mothers Against Drunk Driving hold candlelight vigil

Four-and-a-half years ago Marilyn Rinas’ husband was killed in a collision with… Continue reading

Thousands expected at memorial for fallen police officer in Abbotsford, B.C.

ABBOTSFORD, B.C. — The streets of Abbotsford, B.C., will be lined with… Continue reading

One person dead, five others injured in early-morning crash in Kingston, Ont.

KINGSTON, Ont. — A man who was checking the damage on his… Continue reading

Gus is a special, collaborative art exhibit inspired by motherhood

The portrait display by mother and son is showing in Red Deer

Robotics challenge sparks student interest in Red Deer

Student-built robots compete in fun challenge

Chicken crosses B.C. road, stops traffic

Rooster makes early morning commuters wait in Maple Ridge

Red Deerian honours her brother who died in a motorcycle collision

Houaida Haddad is encouraging Red Deer residents to donate blood

Red Deer County firefighters to be recognized for Waterton help

RCMP brass will give formal recognition Monday

Ron James tries to lighten humanity’s load through humour

The comedian returns to Red Deer for shows Dec. 1 and 2

100+ Women Red Deer donate to Christmas Bureau

About $14,000 will help with Christmas hampers and toys

Semi collides with vehicle on Highway 2 north of Ponoka

Members of the Ponoka Integrated Traffic Unit dealt with a call on Highway 2 north of Ponoka

After 70 years, Red Deer veteran still remembers his traumatic war experience

Frank Krepps feels lucky to have survived the Second World War

Merritt Mountie charged with assault

Charges are in relation to an incident in May at the detachment, B.C. Prosecution Service said

Most Read


Five-day delivery plus unlimited digital access for $185 for 260 issues (must live in delivery area to qualify) Unlimited Digital Access 99 cents for the first four weeks and then only $15 per month Five-day delivery plus unlimited digital access for $15 a month