Vault 7 Leaks

Vault 7 Leaks

Part of a series on WikiLeaks. [View Related Entries]

Updated Mar 10, 2017 at 10:41AM EST by Don.

Added Mar 07, 2017 at 02:25PM EST by Don.

PROTIP: Press 'i' to view the image gallery, 'v' to view the video gallery, or 'r' to view a random entry.

This submission is currently being researched & evaluated!

You can help confirm this entry by contributing facts, media, and other evidence of notability and mutation.

Overview

The Vault 7 Leaks is the code name for a massive leak released by Wikileaks in early March 2017, containing documents that purportedly discuss hacking tools used by the United States Central Intelligence Agency (CIA) to compromise the security of various devices connected to the internet, including smart phones, computers and smart TVs.

Background

Pre-release

On February 4th, 2017, the @Wikileaks Twitter feed posted a photograph of the Svalbard Seed Vault, along with the message "What is #Vault7?" (shown below). Over the next month, the tweet gathered upwards of 4,100 likes and 3,000 retweets. The following day, @Wikileaks posted a second tweet featuring a photograph of Nazi gold stored in Merkers Salt Mine, along with the message "Where is #Vault7" (shown below, middle). Two days later, the account tweeted "Who is #Vault7," along with a series of spy posters featuring Chelsea Manning, Julian Assange and Edward Snowden (shown below, right).


→ WikiLeaks Follow @wikileaks What is #Vault7? 5:38 AM - 4 Feb 2017 わ 3,088雙4,160 $409 → WikiLeaks Follow @wikileaks Where is #Vault7? 1:58 AM-5 Feb 2017 わ£ 2,726 3,736 INFAMOUS INFAMOus INFAMOUS 5 pies pies BRABLEY MANNING 197 JULIAN ASSANGE197 EWARB SNOWDEN 19 b. 1971 LEAKED THE LARGEST CACHE OF CLASSIFIEDS THE HACK BENIND WIKILEAKS SPILLED THE BEANS AND RAN → WikiLeaks Follow @wikileaks Who is #Vaul17? 3:52 AM-7 Feb 2017 わ£+2,373 3,022

Release

On March 7th, 2017, Wikileaks released thousands of documents purportedly containing tools used by the CIA to hack various internet-connected devices.[1] In a press release about the leak, Wikileaks named the first portion of the leak "Year Zero," and claimed it provides information on the CIA's "global covert hacking program," including exploits that compromise the security of iPhone, Android and Windows operating systems, as well as Samsung televisions.[2] Additionally, the press release claimed the CIA had "zero day" exploits that could bypass the encryption of various messaging applications, including WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman.


WikiLeaks @wikileaks 6h → RELEASE: Vault 7 Part 1 "Year Zero". Inside the CIA's global hacking force wikileaks.org/ciav7p1 TELLIGEN NOWLEDO a b100101001001 01001111010 010100111101ot 00100000 000011 010 11 01000011 01 00011 00100000 010001 010010010 N OPERAT わ651 t711K 9.0K

Umbrage

In the documents, a library of cyberattack techniques codenamed "Umbrage" is described, which, according to Wikileaks, collects malware from countries like Russia to obfuscate or falsify the origin of various cyberattacks. On March 7th, Wikileaks tweeted about project Umbrage, claiming "CIA steals other groups virus and malware facilitating false flag attacks" (shown below).[15] In the coming days, many speculated that the CIA may have planted evidence to make it appear as if Russia hacked the Democratic National Committee in light of the Umbrage leak.


11-WikiLeaks* Follovw @wikileaks CIA steals other groups virus and malware facilitating false flag attacks #Vault7 wikileaks.ora/ciav7p1/ UMBRAGE The CIA's hand crafted hacking techniques pose a problem for the agency. Each technique it has created forms a "fingerprint" that can be used by forensic investigators to attribute multiple different attacks to the same entity. This is analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible. As soon one murder in the set is solved then the other murders also find likely attribution. The CIA's Remote Devices Branch's UMBRAGE group collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation. With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the "fingerprints of the groups that the attack techniques were stolen from. UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques. 4,830 4,159 OO RETWEETS LIKES

Weeping Angel

Documents about the a "Weeping Angel" program included information about a technology developed with British agency MI5, which captured audio from microphones on Samsung smart TVs after being placed in a "Fake-Off" mode.

Developments

Online Reaction

That day, Redditor icatalin submitted the Wikileaks page to /r/technology,[3] where it gathered upwards of 20,100 points (90% upvoted) and 4,700 comments within five hours. In the comments section, Redditor taylen42 commented that the leak suggested that the "CIA has more hacking capabilities than the NSA." Meanwhile, other threads reached the frontpage of the /r/Bitcoin,[6] /r/Android[7] and /r/netsec[5] subreddits. Meanwhile, Edward Snowden posted several tweets about the leaks, noting that they appeared to be "a big deal" and "authentic" (shown below).[9]


SHIl ra throudh the publication, but Edward Snowden@Snowden Still working through the publication, but what @Wikileaks has here is genuinely a big deal. Looks authentic わ233 t 5.9K 7.8K

Meanwhile, the Electronic Frontier Foundation published a statement criticizing the CIA for hiding security flaws in various devices.[10] Also on March 7th, YouTuber Philip DeFranco uploaded a video covering many of the relevant online discussions about the leaks (shown below). In less than 24 hours, the video received more than 389,000 views and 10,100 comments.



Meme Warfare Center

Also on March 7th, a page for a proposed "Meme Warfare Center" from Marine Corps Major Michael Prosser's 2005 Master of Operational Studies thesis "Memetics – A Growth Industry in US Military Operations"[13] began circulating online, with many incorrectly attributing it to the Vault 7 leaks (shown below).[14]


. The proposed Meme Warfare Center (MWC). The MWC as a staff organization has the primary mission to advise the Commander on meme generation, transmission, coupled with a detailed analysis on enemy, friendly and noncombatant populations. The MWC aims for a full spectrum capability of meme generation, analysis, quality control/assurance and organic transmission apparatus. The proposed MWC structure lays in stark contrast to the ad hoc nature of current IO and JPOTF formations. PROPOSED STRUCTURE FOR MEME WARFARE CENTER (MWC) PROPOSED STRUCTURE MEME MANAGEMENT OFFICER OR MEME & INFO INTEGRATION OFFICER INTERNAL MEME CENTER (IMC) INTERNAL MEMES COMMAND CLIMATE FEEDBACK ROE COMMANDERS GUIDANCE ASSESSMENT INTERNAL MEMES CENTER EXTERNAL MEMES CENTER KEME MEME ANALYSIS COMMANDERS GUIDANCE STRATEGIC COMM CELL FEEDBACK ASSESSMENT MEME COMMUNICATION ROE MEME ENGINEER CLIMATE MEME ASSESSMENT MEME ASSESSMENT Military Memes Military operations produce memes, both intended and unintended. The PROPOSED STRUCTURE unintended effects of memes are normally regarded as second and third order effects. On occasion, second and third order effects are the product of deliberate planning; however many times they cannot be accurately forecasted. Memes as defined above are cultural bits of information replicated and transmitted from mind to mind. Memes influence, affect, generate and alter ideas. A central theme behind this replication and transmission is individual and societal contact and interaction Contact in this sense connotes both and direct and indirect means. Contact with the enemy, 'friendlies' or the community at large provides a vehicle or medium for EXTERNAL MEME CENTER (EMC) EXTERNAL MEMES MEME STRATEGIC COMM MEME ENGINEER MEME ANALYSIs COMMUNICATIONS GLOBAL MEDIA HEME CONFLICT TERMINATION CELL FEEDBACK CIVIL AFFAIRS PUBLIC OPINION ANALYSIS PSYCHOLOGICAL MOE/MOP CELL OPERATIONS INOCULATION OR PREEMPTIVE CELL : EFFECTS CELI POBLIC AFFAIRS PUBLIC AFFAIRS CULTURAL ANTHROPOLOGISTS BLETCHLEY PARK BREAKING CELL ECONOMISTS QUALITY ASSURANCE CELL MEME ASSES SMENT LINGUISTS TARGETING AND DELIVERY CELL

Apple's Response

That day, Apple released a statement claiming that "many of the issues leaked today were patched in the latest iOS."[16] In response to a BuzzFeed article claiming that "Apple says it has patched the vulnerabilities mentioned in the Wikileaks dump," the @Wikileaks Twitter feed stated "No it doesn't" along with the hashtag "#FakeNews" (shown below).


BuzzFeed News@BuzzFeedNews Apple Says It Has Patched The Vulnerabilities Mentioned In The Wikileaks Dump Of CIA Cyber Tools buzzfeed.com/sheerafrenkel/ 8h NEWS → WikiLeaks Follow @wikileaks @BuzzFeedNews No it doesn't. #FakeNews 10:28 AM - 8 Mar 2017 わ 976 1,759

Wikileaks' Press Conference

On March 9th, 2017, Wikileaks held a press conference over livestream in which founder Julian Assange answered various questions regarding the leaks (shown below). During the livestream, Assange claimed that the CIA "lost control of its entire cyberweapons arsenal" and that Wikileaks would work with various technology companies to fix security vulnerabilities discovered in the leaks.



News Media Coverage

That day, the story was covered by dozens of news sites, including The New York Times,[4] The Washington Post[11] and The Wall Street Journal.[12]

Search Interest

External References

Recent Videos 18 total

Recent Images 24 total


Top Comments

JustSaiyan (aka good guy)
JustSaiyan (aka good guy)

>Trump hates CIA
>CIA hates Trump
>Remember Dark Knight Rises
>Remember Trump saying "giving it back to you the people"
>Bane also said that
>Remember CIA tried to pin Trump with Russia ties, thus "catching" him.
>Look at Vault 7 leaks
>Could be the ammo Trump needs to "crash" CIA
>Realize that reality is just one giant banepost
>mfw

+153

+ Add a Comment

Comments (204)


Display Comments

Add a Comment


Howdy! You must login or signup first!