Grouped under the name "Vault 7", several thousand documents of the American intelligence agency were put online. They reveal an arsenal of tools created to spy on citizens, especially via connected objects.
WikiLeaks: CIA, eyes behind the screen
"Year zero." WikiLeaks promises to open a new era with the publication, started Tuesday, of thousands of CIA documents, the main American foreign intelligence service. Already 8,761 files, at various classification levels (non-classified, secret, top secret), are available on the organization's website. All of them, dating from 2012 to 2016, document the capabilities of piracy and digital espionage of the famous agency of Langley, Virginia. A division is entirely dedicated to these activities, the Center for E-Learning (CCI), which opened a secret branch in the US Consulate in Frankfurt for operations in Europe, the United States and Africa. Other documents will follow, promises the organization of Julian Assange, who baptized operation "Vault 7". Review of cyber beneath the CIA.
Are the US agencies stuck?
This is at least the third major leak of American secret information in a few years. There had been the War Logs on the wars in Iraq and Afghanistan in the United States, thousands of army documents provided by Bradley Manning (now Chelsea Manning). Then the revelations of Edward Snowden on the sprawling surveillance of the National Security Agency (NSA). It is the turn of the CIA to find itself undressed on the Internet. The number of people holding classified information is one of the factors explaining this propensity to see its secrets exposed in the public square. In the United States, one person in 71 is entitled, compared to one in 160 in France. But most of all, about 30% of the "top secret" licenses are given to private contractors, as did Snowden, who worked for Booz Allen Hamilton, a giant in the US military-industrial complex under contract with the NSA. After these revelations, the French officials had not failed to see a validation of the hexagonal model: no (or very few) subcontractors on the most sensitive cases, no (or less) risk of leaks.
Are Samsung TVs listening to us?
So-called intelligent objects are great talkers. The CIA offers a new illustration with its program called "Weeping Angel". The latest generation TVs from Samsung include a microphone to control through the voice its TV - like Siri for iPhones or Google Now for Android. With Weeping Angel, the CIA manages to hijack televisions to listen to what is said, obviously at the expense of the user who sees only fire: the TV seems to be on standby. The hacking procedure is not clear, but documents indicate that an infected USB flash drive must be connected to the TV. Suffice to say that not all Samsung are connected to the CIA. As The Intercept, the media created by journalists who revealed the Snowden documents, Weeping Angel is the latest illustration of the spies' appetite for any connected object. Last year, US intelligence chief James Clapper told the Senate without blush: "In the future, intelligence services could use [the Internet of objects] to identify, Surveillance, tracking, geolocation, targeting recruitment, or accessing networks or user IDs. "
Are encrypted messaging applications pirated?
A phrase in the introductory prose of WikiLeaks created a wave of panic: the applications of messaging deemed reliable and robust would be pirated. This is a rather quick reading of the analysis made by the organization of Julian Assange. A dedicated section, the Mobile Devices Branch (MDB) of the CIA, has developed a number of tools to fraudulently penetrate mobile phones. Two units are even specialized in piracy of Apple and Android products. Once infected, mobiles potentially swing everything they know: geolocation, written communications and audio. They can even be used as a microphone (like Samsung TVs) or take pictures ... As a result, communications that are encrypted between two phones (for example with the Signal application) but are clear in the phone, become accessible to bloodhounds Of the CIA. "These techniques allow the CIA to bypass the encryption of WhatsApp, Signal, Telegram, etc." writes WikiLeaks. Applications are not drilled, but device hacking gives access to content.
This kind of flaw has absolutely nothing new. Encryption, widely popularized after the revelations of Snowden, guards against the surveillance of