{"id":88302,"date":"2017-03-13T12:00:23","date_gmt":"2017-03-13T12:00:23","guid":{"rendered":"https:\/\/www.transcend.org\/tms\/?p=88302"},"modified":"2017-03-08T12:51:59","modified_gmt":"2017-03-08T12:51:59","slug":"wikileaks-reveals-vast-cia-spying-cyberwar-operation","status":"publish","type":"post","link":"https:\/\/www.transcend.org\/tms\/2017\/03\/wikileaks-reveals-vast-cia-spying-cyberwar-operation\/","title":{"rendered":"WikiLeaks Reveals Vast CIA Spying, Cyberwar Operation"},"content":{"rendered":"<p><em>8 Mar 2017 &#8211; <\/em>The bitter internecine struggle within the US state apparatus and ruling political establishment, featuring unsubstantiated Democratic claims of Russian hacking in support of Trump, on the one hand, and Trump\u2019s own charge that his campaign was bugged by Obama, on the other, was overshadowed Tuesday by a massive release of CIA documents by WikiLeaks.<\/p>\n<p>The 8,761 documents contained in what WikiLeaks has described as \u201cthe largest intelligence publication in history\u201d have begun to lay bare a vast system of surveillance, hacking and cyberwarfare directed against the people of the United States and the entire planet.<\/p>\n<p>The anti-secrecy organization called the first document trove \u201cYear Zero\u201d and said that further CIA data dumps are still to come under a larger project dubbed \u201cVault 7.\u201d<\/p>\n<p>The files were taken from the CIA\u2019s Center for Cyber Intelligence, a huge and little-known command that includes some 5,000 hackers, both CIA agents and private contractors. Much as in the case of Edward Snowden\u2019s leaking of secret documents exposing the global spying operation of the National Security Agency (NSA) in 2013, the CIA documents have apparently come from a former agency hacker or contractor concerned about the scope and purpose of the agency\u2019s cyberwar operations.<\/p>\n<p>The programs described in the documents indicate that the CIA, according to WikiLeaks, has developed \u201cmore than a thousand hacking systems, trojans, viruses and other \u2018weaponized\u2019 malware\u201d allowing it to seize control of devices, including Apple iPhones, Google\u2019s Android operating system (used by 85 percent of smart phones) and devices running Microsoft Windows. By hacking these devices, the CIA is also able to intercept information before it is encrypted on social media platforms such as WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman.<\/p>\n<p>The agency has apparently stockpiled so-called weaponized \u201czero-day\u201d threats that can be used to exploit unidentified vulnerabilities in a wide range of devices before their manufacturer is able to detect the flaw and correct it. Under the Obama administration, the White House had supposedly established a \u201cVulnerabilities Equities Process,\u201d under which the intelligence agencies would inform manufacturers of most software vulnerabilities while keeping some to itself for exploitation. In part, this was designed to prevent US companies from losing market share overseas. The vast character of the CIA arsenal establishes that this program was a sham from the outset.<\/p>\n<p>One of the programs developed by the CIA, codenamed \u201cWeeping Angel,\u201d turns Samsung smart televisions into the kind of technology envisioned by George Orwell in <em>1984<\/em>, in which \u201cthought police\u201d monitored \u201ctelescreens\u201d that served as both televisions, broadcasting the speeches of \u201cBig Brother,\u201d and security cameras, monitoring every word and action of the viewer. This surveillance technique places targeted TVs in a \u201cfake off\u201d mode, transmitting conversations in a room over the Internet to a covert CIA server.<\/p>\n<p>WikiLeaks reported that a large amount of information had been redacted from the leaked documents, including computer codes for actual cyberweapons as well as the identities of \u201ctens of thousands of CIA targets and attack machines throughout Latin America, Europe and the United States.\u201d<\/p>\n<p>That \u201ctargets\u201d exist in the US indicates that the agency is engaged in wholesale domestic spying in violation of its charter.<\/p>\n<p>The documents also establish that the CIA has developed these programs in collaboration with MI5, the British intelligence agency, and that it operates a covert cyberwarfare center out of the US Consulate in Frankfurt, Germany.<\/p>\n<p>One chilling revelation provided by the documents, according to WikiLeaks, is that, \u201cAs of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks.\u201d WikiLeaks notes that \u201cThe purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.\u201d<\/p>\n<p>While WikiLeaks does not specifically mention it, this was the scenario suggested by many in the 2013 fatal single-car accident in Los Angeles that claimed the life of journalist <a target=\"_blank\" href=\"https:\/\/www.wsws.org\/en\/articles\/2013\/08\/16\/hast-a16.html\" >Michael Hastings<\/a>. At the time of his death, Hastings, who had previously written an article that led to the removal of Gen. Stanley McChrystal as the top US commander in Afghanistan, was working on a profile of Obama\u2019s CIA director John Brennan. Before the accident, Hastings had informed colleagues that he was under government surveillance and had asked a neighbor to lend him her car, saying he feared his own vehicle had been tampered with.<\/p>\n<p>One other politically significant element of the revelations contained in the WikiLeaks documents concerns a CIA program known as \u201cUmbrage,\u201d which consists of a sizable \u201clibrary\u201d of malware and cyberattack techniques developed in other countries, including Russia. The agency is able to exploit these \u201cstolen\u201d tools to mask its own attacks and misdirect attribution to their originators. The existence of such a program underscores the lack of any foundation for the hysterical campaign alleging Russia\u2019s responsibility for the hacking and leaking of Democratic Party emails.<\/p>\n<p>While the Democrats continue to center their fire against Trump on the question of alleged ties to Russia\u2014rather than the reactionary policies his administration has unleashed against immigrants and the working class as a whole\u2014the WikiLeaks revelations about the CIA are being dismissed by sections of the media as another Moscow plot.<\/p>\n<p>Along similar lines, the <em>New York Times<\/em> Monday published a lengthy article mocking alleged \u201csigns of a White House preoccupation with a \u2018deep state\u2019 working to thwart the Trump presidency\u201d following Trump\u2019s charge that he had been bugged during the presidential campaign.<\/p>\n<p>Such a term might be appropriate for countries like Egypt, Turkey or Pakistan, the <em>Times<\/em> argued, but could not be applied to the US because it \u201csuggests an undemocratic nation where legal and moral norms are ignored.\u201d<\/p>\n<p>The reality is that the \u201cdeep state\u201d in the US is more massive and powerful than anywhere in the world and is the patron of similar military-intelligence complexes in countries like Egypt, Turkey and Pakistan. As for \u201clegal and moral norms,\u201d the latest revelations about the CIA, an organization long ago dubbed Murder, Inc., offer a glimpse of the real methods of the American state.<\/p>\n<p>That the <em>Times<\/em> attempts to dismiss concerns about the activities and influence of the military-intelligence apparatus only establishes its own role as a propaganda organ and ideological instrument of this \u201cdeep state,\u201d with the most intimate ties to the CIA, the Pentagon and other agencies.<\/p>\n<p>The documents released by WikiLeaks cover the period of 2013 to 2016, the last years of the Obama administration, which presided over the continuation and spread of the wars begun under Bush, a sweeping expansion of the power the US intelligence apparatus and a corresponding assault on democratic rights. This included the organization of an international drone assassination program under which the White House claimed the authority to order the extrajudicial murder of American citizens.<\/p>\n<p>This vast apparatus of war, repression and mass surveillance has now been handed over to the administration of Donald Trump, a government of billionaires, generals and outright fascists that is determined to escalate war abroad and carry out unprecedented attacks on the working class at home.<\/p>\n<p>While the Democratic Party is calling for a special prosecutor over alleged Russian \u201cmeddling\u201d in the US election\u2014a demand aimed at sustaining the US war drive against Russia and diverting the mass opposition to Trump into reactionary channels\u2014and Trump is calling for a probe of the alleged bugging of his communications, neither side has called for investigation of the CIA spying operation. Both Democrats and Republicans are agreed that such police-state measures are required to defend the crisis-ridden capitalist system against the threat of a social revolution by the working class.<\/p>\n<p><a target=\"_blank\" href=\"http:\/\/www.wsws.org\/en\/articles\/2017\/03\/08\/pers-m08.html\" >Go to Original \u2013 wsws.org<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Amid Democrats&#8217; claims of Russian hacking in support of Trump and Trump&#8217;s charge that he was bugged by Obama, WikiLeaks has revealed a vast CIA operation directed against the people of the US and the world.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[],"class_list":["post-88302","post","type-post","status-publish","format-standard","hentry","category-whistleblowing-surveillance"],"_links":{"self":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/88302","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/comments?post=88302"}],"version-history":[{"count":0,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/88302\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media?parent=88302"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/categories?post=88302"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/tags?post=88302"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}