WikiLeaks Says It Has Contacted Apple, Google, Others to Combat CIA Malware

image
Published: 14 Mar, 2017
2 min read

On Tuesday, March 14, WikiLeaks announced over Twitter that it had contacted major tech companies in the U.S. to help protect consumers from CIA malware:

https://twitter.com/wikileaks/status/841657897734033408

On March 7, WikiLeaks released part one of "Zero Year," a series of data dumps comprised of thousands of CIA documents detailing some of the surveillance programs conducted by the intelligence agency. There were some startling revelations from the massive publication that have mostly been overlooked by traditional media outlets.

READ MORE: 6 Scariest Finds from the WikiLeaks CIA Dump

For instance, according to WikiLeaks, internal documents suggest that the CIA's Center for Cyber Intelligence has developed numerous "backdoors, exploits, malicious payloads, trojans, viruses" to access remotely the most popular smart devices, including phones, tablets, Samsung TVs, and even vehicle control systems.

https://twitter.com/wikileaks/status/840632925863448579

CIA hackers even brag about having the "dankest trojans."

The Samsung TV hack from the program code-named "Weeping Angel" has garnered the most attention and has been turned into a punchline by late night comedians like Stephen Colbert. However, when looking at everything WikiLeaks alleges, it doesn't even scratch the surface of nefarious programs that could potentially be used against consumers or threaten their privacy.

The CIA explicitly denies that they are using these programs for broad surveillance on U.S. citizens. Assuming for a moment that is true, it doesn't mean consumers could not be potentially hurt by the CIA's actions. WikiLeaks alleges that the CIA often "hoards" vulnerabilities to software and tech in order to exploit them for their own cyber arsenal.

https://twitter.com/Snowden/status/840602409734922241

IVP Donate

"Serious vulnerabilities not disclosed to the manufacturers places huge swathes of the population and critical infrastructure at risk to foreign intelligence or cyber criminals who independently discover or hear rumors of the vulnerability. If the CIA can discover such vulnerabilities so can others," states WikiLeaks.

More document publications are expected from WikiLeaks. When exactly the rest of "Zero Year" will release, however, is unknown. Stay tuned.

Photo Credit: wk1003mike / Shutterstock.com

You Might Also Like

Trump sitting in the oval office with a piece of paper with a cannabis leaf on his desk.
Is Trump About to Outflank Democrats on Cannabis? Progressives Sound the Alarm
As President Donald Trump signals renewed interest in reclassifying cannabis from a Schedule I drug to Schedule III, a policy goal long championed by liberals and libertarians, the reaction among some partisan progressive advocates is not celebration, but concern....
08 Dec, 2025
-
5 min read
Malibu, California.
From the Palisades to Simi Valley, Independent Voters Poised to Decide the Fight to Replace Jacqui Irwin
The coastline that defines California’s mythology begins here. From Malibu’s winding cliffs to the leafy streets of Brentwood and Bel Air, through Topanga Canyon and into the valleys of Calabasas, Agoura Hills, and Thousand Oaks, the 42nd Assembly District holds some of the most photographed, most coveted, and most challenged terrain in the state. ...
10 Dec, 2025
-
6 min read
Ranked choice voting
Ranked Choice for Every Voter? New Bill Would Transform Every Congressional Election by 2030
As voters brace for what is expected to be a chaotic and divisive midterm election cycle, U.S. Representatives Jamie Raskin (Md.), Don Beyer (Va.), and U.S. Senator Peter Welch (Vt.) have re-introduced legislation that would require ranked choice voting (RCV) for all congressional primaries and general elections beginning in 2030....
10 Dec, 2025
-
3 min read