It is the largest ever publication of confidential documents on the CIA, Wikileaks said in a press release.
What is #Vault7? pic.twitter.com/PrjBU0LSAF
— WikiLeaks (@wikileaks) 4 февраля 2017 г.
"The quantity of published pages in "Vault 7" part one ("Year Zero") already eclipses the total number of pages published over the first three years of the Edward Snowden NSA leaks."
RELEASE: Vault 7 Part 1 "Year Zero": Inside the CIA's global hacking force https://t.co/h5wzfrReyy pic.twitter.com/N2lxyHH9jp
— WikiLeaks (@wikileaks) 7 марта 2017 г.
The first part of the leaks dubbed "Year Zero" comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA's Center for Cyber Intelligence in Langley, Virgina.
How did #Vault7 make its way to WikiLeaks? pic.twitter.com/9lbEPhkR6w
— WikiLeaks (@wikileaks) 9 февраля 2017 г.
"Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized "zero day" exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive," Wikileaks stated.
"Year Zero" leaks reveals the scope and direction of the US intelligence agency's "global covert hacking program, its malware arsenal and dozens of "zero day" weaponized exploits against a wide range of U.S. and European company products, include Apple's iPhone, Google's Android and Microsoft's Windows and even Samsung TVs, which are turned into covert microphones."
CIA hacker malware a threat to journalists: infests iPhone, Android bypassing Signal, Confide encryption https://t.co/mHaRNCr3Df
— WikiLeaks (@wikileaks) 7 марта 2017 г.
"The CIA had created, in effect, its "own NSA" with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified."
Wikileaks stated citing the source of the leaks that "Once a single cyber 'weapon' is 'loose' it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike."