FBI launches criminal investigation into WikiLeaks’ CIA disclosures

WikiLeaksThe United States federal government has launched a criminal investigation into the public disclosure of thousands of documents that purportedly belong to the Central Intelligence Agency. The documents were released on Tuesday by the anti-secrecy website WikiLeaks. They reveal what appear to be technical collection methods used by the CIA to extract information from digital applications and electronic devices, ranging from flash drives to smart screen televisions. WikiLeaks named the collection “Vault 7”, and said that it consists of nearly 8,000 web pages and 1,000 attachments. It also said that its editors redacted hundreds of pages of computer code, in order to prevent the public release of advanced cyberweapons allegedly used by the CIA to sabotage electronic devices and systems.

On Wednesday, former director of the CIA Michael Hayden told the BBC that the disclosure appeared “incredibly damaging”, because it revealed some of the methods that the CIA uses to acquire information. But some cybersecurity experts said that the techniques contained in the leaked documents did not appear to be uniquely advanced, and most focused on exploiting technical vulnerabilities that were generally known. Still, The New York Times reported on Wednesday that the CIA had begun to assess the damage caused by the release. The agency was also trying to contain the extent of the damage, and had even “halt[ed] work on some projects”, said The Times. Officials from the CIA are reportedly in communication with the Federal Bureau of Investigation, which on Wednesday launched a criminal investigation into the “Vault 7” release.

The main purpose of the FBI investigation is to find out how WikiLeaks acquired the files. The website said that the documents were leaked by a CIA contractor, which would imply that they were accessed from a server outside the CIA’s computer network. However, federal investigators are not excluding the possibility that the leaker of the information may be a full-time CIA employee. Reports suggest that the FBI is preparing to conduct hundreds, and possibly thousands, of interviews with individuals who are believed to have had access to the documents that were released by WikiLeaks. Meanwhile, neither the FBI nor the CIA have commented on the authenticity of the information contained in “Vault 7”. WikiLeaks said that Tuesday’s release, which it codenamed “Year Zero”, was the first part of several installments of documents that will be released under its Vault 7 program.

Author: Joseph Fitsanakis | Date: 09 March 2017 | Permalink

Files released by WikiLeaks show advanced CIA technical collection methods

Julian AssangeThousands of documents belonging to the United States Central Intelligence Agency, which were released on Tuesday by the international anti-secrecy website WikiLeaks, are almost certainly genuine. They reveal an entire universe of technical intelligence collection methods used by the CIA to extract information from digital applications and electronic devices, ranging from flash drives to smart screen televisions. WikiLeaks named the collection Vault 7, and said that it consists of nearly 8,000 web pages and 1,000 attachments. It also said that its editors redacted hundreds of pages of computer code, in order to prevent the public release of advanced cyberweapons that are allegedly used by the CIA to sabotage electronic devices and systems.

The information contained in the leaked documents is almost certainly genuine, and most likely belongs to the CIA —though many of the programs listed may be jointly run by the CIA and the National Security Agency (NSA). These programs, with names such as McNUGGET, CRUNCHYLIMESKIES, ELDERPIGGY, ANGERQUAKE and WRECKINGCREW, appear to be designed to compromise computer systems using a series of sophisticated methods that force entry or exploit built-in vulnerabilities or systems. Targets include popular communications systems like Skype and WhatsApp, smartphones produced by Google and Apple, commercial software like PDF and Microsoft Windows, and even so-called smart televisions that connect to the Internet.

The WikiLeaks revelations are most likely related to operations conducted under the auspices of the Special Collection Service (SCS), a joint CIA/NSA program that dates to the earliest days of the Cold War. The program was started by the United States Armed Forces but was eventually transferred to civilian hands and monitored by the CIA. It used advanced communications-interception facilities around the world to collect information. Over the years, the CIA collaborated with the NSA and developed many SCS projects targeting several foreign countries using technical and human means. In recent years the SCS has been primarily operated by the NSA, which oversees the program’s technical platforms.

WikiLeaks did not reveal the source of the documents. But it said that they had been “circulated [by the CIA] among former US government hackers and contractors” and that it was one of the latter that leaked them to the anti-secrecy website. A statement by WikiLeaks said that Tuesday’s release, which it codenamed “Year Zero”, was part one of several installments of documents that will be released under its Vault 7 program. The site also claimed that the information in “Year Zero” has “eclipsed the total number of pages published over the first three years of the Edward Snowden NSA leaks”. The CIA, the NSA and the White House have not commented on this development.

Author: Joseph Fitsanakis | Date: 08 March 2017 | Permalink

American spies use NZ embassies to collect intelligence

NSA headquartersBy IAN ALLEN | intelNews.org
Embassies belonging to the government of New Zealand are secretly being used by the United States as part of a worldwide network of intelligence-collection facilities, according to documents leaked over the weekend. The documents were released by Edwards Snowden, an American former technical expert for the Central Intelligence Agency (CIA) and the National Security Agency (NSA), who is currently living in Russia and is responsible for countless leaks of classified information in recent years. The latest disclosure concerns Project STATEROOM, a highly secretive signals intelligence (SIGINT) collection program targeting international Internet, radio and telecommunications traffic. The existence of the program was disclosed in the summer of 2013 by Snowden, who told German newsmagazine Der Spiegel that it consisted of SIGINT collection facilities in nearly 100 US embassies and consulates in almost as many countries. According to the Snowden, STATEROOM operations are handled by a unit called Special Collection Service (SCS), which is jointly operated by the CIA and the NSA. In October of 2013, Professor Des Ball, an intelligence expert, claimed that Australian embassies served as collection sites for Project STATEROOM, by helping the SCS monitor the Asia Pacific region. Dr. Ball said the Australian Signals Directorate was sharing information with the NSA as part of the UKUSA agreement (also known as Five Eyes), an intelligence cooperation network comprising agencies from Australia, New Zealand, Britain, Canada and the United States. Now new documents made available by Snowden appear to show that New Zealand’s embassies and consulates around the world are also being used as part of Project STATEROOM. The documents date from 2003, and contain a synopsis of a number of NSA intelligence-collection programs, along with their operational titles and status. The list, which is marked “Top Secret” is titled “Exceptionally Controlled Information”, and contains several entries under the heading “STATEROOM”. Underneath the heading appears the description: “SIGINT from diplomatic missions abroad”. The document then states that “this activity is conducted by USA, AUS, CAN, GBR and NZL”. Although the existence of STATEROOM has been known for over a year, this is the first time that New Zealand diplomatic missions are specifically identified in documents as collection sites for the program. Read more of this post

NSA operates ‘secret collection program’ out of US embassies

NSA headquartersBy JOSEPH FITSANAKIS | intelNews.org |
Documents leaked by American intelligence defector Edward Snowden point to the existence of a sizable signals intelligence collection program operating out of dozens of United States embassies and consulates located around the world. The documents, given by Snowden to German newsmagazine Der Spiegel, contain details of a monitoring program known as the Special Collection Service (SCS), which appears to operate under the auspices of the National Security Agency (NSA). The NSA is America’s largest intelligence agency —it is bigger than the CIA and the FBI combined— and is tasked by the US government with intercepting electronic communications worldwide. Snowden was a technical contractor for the NSA before he defected to Russia this past summer, where he was offered political asylum. Der Spiegel says that Snowden’s documents point to the existence of the SCS, which allegedly operates covert listening posts in over 80 American embassies and consulates worldwide. These listening posts operate clandestinely, without the knowledge or permission of the host countries. The German newsmagazine identifies the United Nations (UN) headquarters in New York as being among the SCS’s principal listening targets. In the summer of 2012, says Spiegel, an SCS operation managed to compromise the UN headquarters’ internal video conferencing system, by breaking the encryption used to secure the communications of resident diplomats. One NSA document seen by Spiegel hails the “dramatic improvement of data [collected] from video teleconferencing and the ability to decrypt the traffic”. It goes on to state that intercepted communication exchanges rose from 12 to nearly 500 within three weeks following the SCS penetration. Read more of this post