[Global Science and Technology Comprehensive Report] According to Taiwan’s “Union News†on March 9th, WikiLeaks announced on the 7th that “No. 7 Vault†was codenamed to release thousands of pages from the US Central Intelligence Agency (CIA). The document reveals how the CIA used sophisticated hacking software tools and technologies to invade smart phones, computers, smart cars, and smart TVs that could be connected to the Internet. This is the largest ever leaked CIA document.
Data map
This batch of documents is equal to the detailed catalog of tools used by the CIA. There are also detailed instructions on how to destroy the common computer tools: Skype, Wi-Fi networks, PDF files, and even commercial antivirus programs used by millions of people. The CIA can invade.
If the proof is true, part of the contents of the leaked documents will be confusing to the scientific and technological community. The CIA and allied intelligence agencies claim to have intruded into Apple and Android smart phones, allowing their members to bypass the encryption program and enter the popular WhatsApp communication software. And Telegram, etc., get chat data. However, the contents of these documents are different from those disclosed by former NSA employee Snowden. They do not list examples of these tools applied to foreign targets.
The CIA refused to comment on the authenticity of the document; former CIA employee Snowden said on Twitter that he is still reading the disclosed documents, but these documents appear to be “very important and it seems to be trueâ€.
The first batch of documents and archives released by WikiLeaks was from 2012 to 2016, including 7818 pages and 943 attachments, from the CIA's "Network Intelligence Center" in Virginia, prior to the CIA's 2012 presidential election in France. To steal information from French political parties and candidates. WikiLeaks stated that they had made slight modifications to avoid the real escape of the cyber weapon code.
These documents show that the CIA's hacking tools have shrouded the world. Apple's iPhone, Microsoft's Windows, Google's Android, and even Samsung's smart TVs are hard to spare.
The following are frequently asked questions concerning the latest "CIA hacker" incident organized by "Union News":
Is WikiLeaks file credible?
It seems to be at least partly true. The CIA did not comment, but the cyber security experts and former intelligence staff said that the documents used in the CIA intrusion plan had appeared to be credible.
What is the content of the document?
Wikileaks published a document describing the tools used by the CIA to invade devices such as mobile phones, computers, and smart TVs.
How to invade TV?
U.S. and British intelligence agencies have developed a variety of methods to control Samsung Smart TVs equipped with microphones so that they can record peripheral conversations when they seem to be off.
CIA can invade mobile communications software?
No system is foolproof. The WikiLeaks file describes how to obtain data from Android device software, provided that the full control of these phones is obtained first.
Is iPhone also dangerous?
The document shows the list of Apple IOS security checkpoints purchased by U.S. intelligence agencies for the acquisition of money, allowing them to gain access to these devices.
How to prevent being invaded by the CIA?
Most people do not need to worry about being targeted by intelligence agencies. However, everyone should fully grasp the patch software so that computers and mobile devices have the latest security updates.
How does WikiLeaks get this information?
Not sure. Perhaps it was the inside information of a certain unit that leaked the news. It may also be a way for outsiders to find information. (Internship Editor: Mana Review: Tan Li Ya)
Photo Studio Kit,Photography Lighting Kit,Photography Studio Kit,Photography Studio Lighting Kit
SHAOXING SHANGYU FEIXIANG PHOTOGRAPHIC CO.,LTD , https://www.flying-photography.com