WikiLeaks To Release Software Code Of Central Investigating Agency Hacking Tools To Tech Firm: Julian Assange

WikiLeaks To Release Software Code Of Central Investigating Agency  Hacking Tools To Tech Firm: Julian Assange

WikiLeaks will release the code for technology companies of CIA software tools that are designed to compromise smartphones and other hacking products, founder of the group he said Thursday, seeking to position itself as a defender of computer security and, possibly, further distancing the community of intelligence.



"We decided to work with" companies, WikiLeaks founder Julian Assange, he said in a press conference, "to give them a little 'exclusive access to technical details that we have so that corrections can be developed and pushed out, so that people can be guaranteed. "

Once the patch is sent - or, as Assange put it, "once this material is effectively disarmed by us" - WikiLeaks will release details publicly, he said.

The Assange observed two days after the site radical transparency put a cache of files describing the technical secrets of the CIA and the methods that, for example, hacking, take control of the iPhone and Android phones Google, transforming some TVs Samsung bug and obtain data from devices that are not connected to the Internet. The release abruptly stopped before releasing the code itself.

The CIA continues to have no comment on the authenticity of the published documents that WikiLeaks has said it is the first tranche of more to come. Independent experts have said the files appear to describe "exploit", authentic, or tools that hackers can use to break into a device, but many of them are dated and seems to have already been changed by technology companies. And the researchers said they have long been aware of a number of techniques.

A CIA spokesman, Jonathan Liu, suggested that the scope of the statements and the impact of its release Tuesday "Volta 7" Wikileaks' are exaggerated. "As we stated earlier, Julian Assange is not exactly a bastion of truth and integrity," said Liu. "Despite the efforts of Assange and his people, the CIA continues to aggressively collect foreign intelligence abroad to protect America from terrorists, hostile states and other domestic opponents."

laws and bar CIA policies of the United States to conduct electronic surveillance targeting individuals on American soil. "And CIA does not," said Liu.

Inside the CIA, officials were aware before the WikiLeaks release of a leak of sensitive information, according to people familiar with the matter. internal security personnel of the CIA, who apparently had not told the FBI, were pursuing the matter, but the scope and severity of the problem was unclear until WikiLeaks posted online the approximately 9,000 documents on Tuesday, these people said .

An immediate challenge for the Bureai Federal Investigation investigators hunting a mole is posible to streamline a list of suspects from the group of people who have had full access to the leaked information - a challenging task, given that hundreds and potentially thousands of people have had access to the data.

After the press conference Assange Thursday, technology resolved the consequences of taking the data to WikiLeaks, according to a person familiar with the discussions. They have considered the legal implications of the use of information from documents obtained illegally and political fallout of doing so. They questioned whether Assange was trying to drive a wedge between the technology industry and the government of the Member State.

Some national security experts wondered why WikiLeaks had not already shared software defects.
"

And Alex Rice, chief executive of HackerOne, the start-ups that enlists hackers to share security concerns with technology companies for a profit, said, 
But others have praised the Wikileaks vote share data with technology companies. "And 'incredibly good news" for the personal computer security, said Nathan White, senior legislative director for Access Now, a group for digital rights. He noted how WikiLeaks also stands to gain from the move, since it has been criticized for publishing information without screening for privacy and security in the past.

Comments