The leaked documents detail a complex range of cyber weapons being developed by the CIA. WikiLeaks said they exploit vulnerabilities in devices like desktop computers, mobile phones, vehicle computers and even some TVs with voice activation features.
CGTN’s Daniel Ryntjes reports.
New criminal probe into WikiLeaks classified documents hackThe leaked documents detail a complex range of cyber weapons being developed by the CIA. WikiLeaks said they exploit vulnerabilities in devices like desktop computers, mobile phones, vehicle computers and even some TVs with voice activation features. CGTN's Daniel Ryntjes reports.
The White House isn’t confirming the authenticity of these documents, but is characterizing U.S. President Donald Trump’s response:
“He is extremely concerned about this, about these allegations of the potential that something, if this were true, would have on our national security. And make no mistake anyone who leaks classified information will be held to the highest degree of law.”
WikiLeaks said the documents show that the CIA can even bypass encryption systems on messaging apps designed for secrecy, by hacking the operating systems of mobile phones.
The leak threatens to undermine intelligence gathering and cooperation.
“This is all very highly classified information. When these kinds of leaks are made and other countries see this kind of sensitive information is being leaked, it can impact on our relationship with other intelligence agencies around the world,” former U.S. CIA Director Leon Panetta said.
So now many tech firms, including Apple, Google, Microsoft and Samsung are now scrambling to identify vulnerabilities that the CIA has been exploiting, in order to fix them.
Fmr Intelligence Analyst Mark Kagan discusses federal probe into WikiLeaks hack
For more on the FBI’s new probe into the Wikileaks CIA hack, CGTN’s Mike Walter spoke to International Strategic Studies Association Analyst Mark Kagan.
WikiLeaks published thousands of documents described as secret files about CIA hacking tools the government employs to break into users’ computers, mobile phones and even smart TVs from companies like Apple, Google, Microsoft and Samsung.