Connect with us
[the_ad_placement id="manual-placement"] [the_ad_placement id="obituaries"]

News

1000’s of CIA Documents Leaked to the Internet

Wikileaks has published thousands of documents said to originate with the CIA and specifically it’s cyber intelligence wing.  The irony has not been lost on observers who are working to verify the veracity of the leaks.  If proven to be accurate the leaks will provide an inside look at the intimate details of how the cyber intelligence community operates and thinks.  The damage is yet to be determined but the first appearance is a huge black eye to America’s intelligence community.

Published

on

The Central Intelligence Agency’s Center for Cyber Intelligence has been hacked.

Hacked online

Wikileaks has published thousands of documents said to originate with the CIA and specifically it’s cyber intelligence wing.  The irony has not been lost on observers who are working to verify the veracity of the leaks.  If proven to be accurate the leaks will provide an inside look at the intimate details of how the cyber intelligence community operates and thinks.  The damage is yet to be determined but the first appearance is a huge black eye to America’s intelligence community.

 

From Wikileaks:

Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named “Vault 7” by WikiLeaks, it is the largest ever publication of confidential documents on the agency.

The first full part of the series, “Year Zero”, comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA’s Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election.”

wikileaks logo

They go on to state “In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.”

 

See a typo? Report it here.
Continue Reading
Advertisement