|
- Vault 7 - Wikipedia
Vault 7 is a series of documents that WikiLeaks began to publish on 7 March 2017, detailing the activities and capabilities of the United States Central Intelligence Agency (CIA) to perform electronic surveillance and cyber warfare
- Vault 7: CIA Hacking Tools Revealed - WikiLeaks
Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U S Central Intelligence Agency Code-named "Vault 7" by WikiLeaks, it is the largest ever publication of confidential documents on the agency
- Former CIA engineer who sent Vault 7 secrets to Wikileaks sentenced . . .
The bulk of the sentence imposed on Joshua Schulte, 35, in Manhattan federal court came for an embarrassing public release of a trove of CIA secrets by WikiLeaks in 2017 He has been jailed
- WikiLeaks - Vault 7: Projects
Today, September 7th 2017, WikiLeaks publishes four secret documents from the Protego project of the CIA, along with 37 related documents (proprietary hardware software manuals from Microchip Technology Inc ) The project was maintained between 2014 and 2015
- CIA Statement on Claims by Wikileaks - The World Factbook
The American public should be deeply troubled by any Wikileaks disclosure designed to damage the Intelligence Community’s ability to protect America against terrorists and other adversaries
- WikiLeaks claims to reveal CIA cyber espionage methods
WikiLeaks claimed that the trove of CIA information it had obtained, which it called Vault 7, included “several hundred million lines of code”, including many of the agency’s cyber weapons
- WikiLeaks - Wikipedia
In 2014, FBI and CIA officials lobbied the White House to designate Wikileaks as an "information broker" to allow for more investigative tools against it and according to former officials "potentially paving the way" for its prosecution
- C. I. A. Scrambles to Contain Damage From WikiLeaks Documents
WASHINGTON — The C I A scrambled on Wednesday to assess and contain the damage from the release by WikiLeaks of thousands of documents that cataloged the agency’s cyberspying capabilities,
|
|
|