WASHINGTON (CBSMiami/AP) — WikiLeaks claims it has secret files on how the Central Intelligence Agency uses high-tech tools to spy on people around the world – hacking right into their smart phones and TVs.
It was not immediately clear how the anti-secrecy group obtained the information, which included more than 8,700 documents and files.
The CIA tools, if authentic, could undermine the confidence that consumers have in the safety and security of their computers, mobile devices and even smart TVs.
WikiLeaks said the material it published Tuesday came from “an isolated, high-security network situated inside the CIA’s Center for Cyber Intelligence in Langley, Virginia.”
It didn’t say how the files were removed, such as possibly by a rogue employee, by hacking a federal contractor working for the CIA or breaking into a staging server where such hacking tools might be temporarily stored.
The more than 8,000 documents cover a host of technical topics, including what appears to be a discussion about how to compromise smart televisions and turn them into improvised surveillance devices.
WikiLeaks said the data also include details on the agency’s efforts to subvert American software products and smartphones, including Apple’s iPhone, Google’s Android and Microsoft Windows.
“This is CIA’s Edward Snowden,” former CIA acting director Michael Morrell told CBS News Justice correspondent Jeff Pegues, referring to the former National Security Agency contractor who leaked millions of documents in 2013.
“This is huge, in terms of what it will tell the adversaries,” Morrell said. “We’ll have to essentially start over in building tools to get information from our adversaries, just like we did with Snowden.”
Details of WikiLeaks’ document release
- Largest publication of confidential documents about the CIA
- Code-named “Vault7”
- Part 1 includes 8,761 documents from CIA’s Center for Cyber Intelligence
- Reveals direction of global hacking program
- Information on agency’s malware arsenal
- Claims that CIA used products like iPhones and smart TVs as covert microphones
- Claims that the CIA used its Langley HQ and U.S. consulate in Frankfurt, Germany as bases for its hackers
- Broad exchanges of tools and information among the CIA, NSA and other U.S. intelligence agencies
The information dump could not immediately be authenticated by The Associated Press, and the CIA declined comment, but WikiLeaks has a long track record of releasing top secret government documents. Experts who’ve started to sift through the material said that it appeared legitimate and that the release was almost certain to shake the CIA.
Jonathan Liu, a spokesman for the CIA, said: “We do not comment on the authenticity or content of purported intelligence documents.”
WikiLeaks said the archive “appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.”
If the authenticity of the documents is officially confirmed, it would represent yet another catastrophic breach for the U.S. intelligence community at the hands of WikiLeaks and its allies, which have repeatedly humbled Washington with the mass release of classified material, including hundreds of thousands of documents from the State Department and the Pentagon.
WikiLeaks, which has been dropping cryptic hints about the release for a month, said in a lengthy statement that the CIA had “recently” lost control of a massive arsenal of CIA hacking tools as well as associated documentation.
“There’s no question that there’s a fire drill going on right now,” said Jake Williams, a security expert with Augusta, Georgia-based Rendition Infosec. “It wouldn’t surprise me that there are people changing careers – and ending careers – as we speak.”
One of the purported CIA malware programs is described in the WikiLeaks documents as a “simple DLL hijacking attempt” that had been tested against Microsoft Windows XP, Vista and 7 operating systems.
The technique, which the document called a “Windows FAX DLL injection,” introduces computer code that allows an attacker to gain access to a computer process’ memory and permissions while at the same time masking the attack.
Williams, who has experience dealing with government hackers, said the voluminous files’ extensive references to operation security meant they were almost certainly government-backed. “I can’t fathom anyone fabricated that amount of operational security concern,” he said. “It rings true to me.”
“The only people who are having that conversation are people who are engaging in nation-state-level hacking,” he said.
WikiLeaks said its data also included a “substantial library” of digital espionage techniques borrowed from other countries, including Russia.
Bob Ayers, a retired U.S. intelligence official currently working as a security analyst, noted that WikiLeaks has promised to release more CIA documents.
“The damage right now is relatively high level,” he said. “The potential for really detailed damage will come in the following releases.”
(© Copyright 2017 CBS Broadcasting Inc. All Rights Reserved. The Associated Press contributed to this report.)