The torrent series of dumps WikLeaks "Vault ." This installment includes ,761 documents d files from an isolated high-security network the CIA's Center for Cyber Intelligence in Langley, Virginia.
This batch , WikiLeaks, introduces the scope and direction of the CIA's covert hacking program, its malware arsenal, and dozens of zero-day weaponized exploits against of U.S. and European company -- among them, Apple's iPhone, Google's , Microsoft's Windows OS, and Samsung's TVs, covert microphones.
The the documents to WikiLeaks did policy the CIA's hacking program, the organization , and to open a discussion the agency's power government's oversight mechanisms it .
The offered a response to WikiLeak's actions: "We the or content of intelligence documents," agency Heather Fritz Horniak told TechNewsWorld.
According to WikiLeaks, by of 2016, the had hacking systems, trojans, viruses and weaponized malware.
"Such scale of the CIA's that by 2016, its hackers had code than that run Facebook," it .
"The had created, in effect, its 'own NSA' with even less and the question such on duplicating the capacities of a rival agency ," WikiLeaks contended.
In a departure from the previous dumps, WikiLeaks taken some steps to avoid from its latest revelations.
"One that strikes apparent care WikiLeaks took to redact sensitive ," Mark Graff, of Tellagraff.
"They were than past," he told TechNewsWorld.
Hurting North American nation Security
WikiLeaks claimed it redacted of thousands of targets and attack machines throughout , Europe , it avoided in its dump the distribution of "armed" cyberweapons.
No matter careful WikiLeaks have to be, its "Year Zero" dump undermines U.S. national security, Cattanach, with Dorsey & Whitney.
"WikiLeaks' rock the intelligence communities," he told TechNewsWorld.
The CIA's ability to access the target devices and technologies is compromised, Cattanach maintained, noting that to contain and operational internal .
The uses foreign intelligence services for such be , he added.
Then the threat of that actual tools the has used for hacking having been obtained not , Cattanach .
Although no for the hacking tools been batch , that has been be a weapon, noted John Hayes, CTO of BlackRidge Technology.
"There be some bright this, and if pointed right direction, be giving them enough hints to recreate have the ," he told TechNewsWorld.
The Vault leaks have the potential to be damaging to the U.S. , Adam Klein, a senior fellow with for Security.
"It mean the loss of some tools for the ," he told TechNewsWorld -- "tools be directed at adversaries: Russia and China, states like and , terrorist , drug traffickers, and criminal enterprises world."
The extent of the tempered if WikiLeaks has overplayed its hand.
"Given WikiLeaks' past record, unlikely most of the allegations true," maintained James Scott, a senior fellow at the Institute for Infrastructure Technology.
"If nothing else, the tools and malware capabilities provided exceptionally devastating over the tools and exploits already on Deep markets and forums," he told TechNewsWorld.
The first step the U.S. government take is to dump, Scott said.
"If the documents authentic, then the already what secure network was compromised, tools exposed, and what exploits be patched against adversarial use," he explained.
"After the Snowden incident platform leak, that the agency even has response for this ," Scott .
The Vault material turned over to WikiLeaks by a , of a nation state out.
"Some speculating that exfiltration at this scale would necessitate the involvement of a well-resourced nation state threat actor," Scott .
"These disclosures the adversaries of the ," Klein . "That's not for WikiLeaks, concern of -- and it be of all Americans."