• Home
  • Mission
  • Federalist Papers
  • Foundation
  • U.S. Constitution
  • Bill of Rights

Federalist Press | Defending Liberty — Informing America

Breaking News and Political Commentary

  • All Stories
  • Economy
  • Elections
  • Entitlement
  • Ethics
  • Foreign
  • Gender
  • Religion
  • Sci-Tech

WikiLeaks Releases ‘Entire Hacking Capacity of the CIA’

March 7, 2017 By Editor Leave a Comment

WikiLeaks on Tuesday released what it said is the full hacking capacity of the CIA in a stunning 8,000-plus page disclosure the anti-secrecy website contends is “the largest ever publication of confidential documents on the agency.”

The 8,761 documents and files — released as “Vault 7 Part 1” and titled “Year Zero” — were obtained from an “isolated, high-security network” at the CIA’s Center for Cyber Intelligence in Langley, Va., a press release from the website said. The trove had been “circulated among former U.S. government hackers and contractors,” one of whom “recently” gave the archive to WikiLeaks.

“We do not comment on the authenticity or content of purported intelligence documents,” a CIA spokesperson told Fox News.

The collection of purported intelligence tools includes information on CIA-developed malware — bearing names such as “Assassin” and “Medusa” — intended to target iPhones, Android phones, smart TVs and Microsoft, Mac and Linux operating systems, among others. An entire unit in the CIA is devoted to inventing programs to hack data from Apple products, according to WikiLeaks.

WIKILEAKS OFFERS REWARD FOR INFO ON OBAMA MISDEEDS

Some of the remote hacking programs can allegedly turn numerous electronic devices into recording and transmitting stations to spy on their targets, with the information then sent back to secret CIA servers. One document appears to show the CIA was trying to “infect” vehicle control systems in cars and trucks for unspecified means.

WikiLeaks hinted that the capabilites revealed in Tuesday’s disclosure could have even darker utility than simply spying.

“It would permit the CIA to engage in nearly undetectable assassinations,” the release stated.

 

FLASHBACK: WIKILEAKS REVEALS CLINTON ‘HITS’ FILE ON SANDERS

The site said the CIA additionally failed to disclose security vulnerabilities and bugs to major U.S. software manufacturers, violating an Obama administration commitment made in January 2014. Instead, the agency used the software vulnerabilities — which could also be exploited by rival agencies, nations and groups — for its own ends, WikiLeaks said.

“As an example, specific CIA malware revealed in ‘Year Zero’ is able to penetrate, infest and control both the Android phone and iPhone software that runs or has run presidential Twitter accounts,” the WikiLeaks release stated.

WikiLeaks also revealed the U.S. Consulate in Frankfurt is a hacking base, and the website provided the methods by which agents obfuscate customs officers to gain entry to Germany, pretending to provide technical consultation.

WikiLeaks said its source released the files because they believed questions surrounding the CIA’s reach “urgently need to be debated in public,” echoing the motives of many previous leakers.

Some of the files include redacted information, such as tens “of thousands of CIA targets and attack machines throughout Latin America, Europe and the United States.”

By Cody Derespina

Filed Under: All Stories, Economy, Elections, Entitlement, Ethics, Foreign, Gender, Religion, Sci-Tech

Federalist Press Dispatch

Get breaking political news, investigations, and uncensored analysis delivered directly to your inbox.

Please wait...

Thank you for subscribing to the Federalist Press Dispatch.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Federalist Press Dispatch

Get breaking political news, investigations, and uncensored analysis delivered directly to your inbox.

Please wait...

Thank you for subscribing to the Federalist Press Dispatch.

Get free info to help your life

Get free info to help your life

Simple bite-sized guides for life, money, civics, and more . . . because some stuff school just didn’t cover.

Brit Axton Mysteries Series

Brit Axton Mysteries Series

Brit Axton Mysteries is a series of young adult adventure novels that lead young Brit Axton and her friends on whirlwind adventures to uncover hidden secrets and long lost treasures.

Byrna Non-lethal Self Protection

Byrna Non-lethal Self Protection

Byrna offers non-lethal self protection at an affordable price. Watch the short video, or click to learn more!

Understanding Cryptocurrency: Essentials for Building Wealth in Digital Currency

Understanding Cryptocurrency: Essentials for Building Wealth in Digital Currency

Understanding Cryptocurrency serves as a definitive guide for novice investors looking to understand the world of cryptocurrency and harness its potential for financial growth and prosperity.

Real Estate Wealth Strategies During High Inflation

Real Estate Wealth Strategies During High Inflation

Real Estate Wealth Strategies During High Inflation is a comprehensive guide on navigating the real estate market, offering strategies and insights for successful investing, during high inflation and interest rates.

Follow us

  • parler
  • welcome-widgets-menus
  • facebook
  • envato

Privacy Policy

Terms of Service

Economy

Tens of Billions Lost: Inside the Expanding Web of Dem Government Fraud From Minnesota to California

The Myth of the “Mandatory” Government Shutdown

YOU’RE FIRED! It’s Time to Pull the Plug and Drain the Swamp

Elections

Supreme Court Redistricting Shockwave May Have Just Changed the 2026 Midterms

Sen. Kelly Under Pentagon Review After Revealing Classified Briefing Details to Enemies

Virginia Supreme Court Blows Up Democrat Power Grab Over Congressional Maps

Foreign

Pro-Palestine-Anti-Israel Terrorist behind Attack on Penn. Gov. Shapiro

JONATHAN TURLEY: Biden DOJ behind even the Times in pursuing alleged Hunter corruption

The Human Cost of the Southern Border Crisis: Trafficking, Exploitation, and the U.S. Demand

Crime

May Day in America: A Radical Tradition Returns—and Raises Hard Questions

After the Gunfire: What Comes Next for a Nation on Edge

Tens of Billions Lost: Inside the Expanding Web of Dem Government Fraud From Minnesota to California

Science Tech

Trump’s Decisive Strike: Ending Iran’s Nuclear Threat and Exposing Decades of Diplomatic Failure

Unlocking the Unseen: UAP Propulsion, Hidden Fields, and the Dimensional Fabric of Reality

“Forced to Comply: The Lasting Consequences of America’s COVID Vaccine Mandates”

Reader Responses

  • Linda Livaudais on Trump’s UFO Disclosure Has Changed the Conversation — But Not Yet Answered the Biggest Question
  • T059736 on Trump and Musk Announce Plans to Shut Down USAID
  • C.Josef.D on ‘Pay to Play’ at Clinton Foundation Under Investigation
  • John D Cole on Biden Says ‘You ain’t black’ If You Don’t Vote for Him
  • Ed on U.S. Attorney Huber Moving to Indict Clintons and Others

Copyright © 2026 by Federalist Press · All rights reserved · Website design by RoadRunner CRM · Content Wiriting by GhostWriter · Log in